Yasushi Shinjo

ORCID: 0000-0002-4096-3157
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Security and Verification in Computing
  • Caching and Content Delivery
  • Distributed and Parallel Computing Systems
  • Parallel Computing and Optimization Techniques
  • Advanced Data Storage Technologies
  • Internet Traffic Analysis and Secure E-voting
  • Distributed systems and fault tolerance
  • Access Control and Trust
  • Service-Oriented Architecture and Web Services
  • Real-Time Systems Scheduling
  • Embedded Systems Design Techniques
  • Cloud Computing and Resource Management
  • Peer-to-Peer Network Technologies
  • Advanced Malware Detection Techniques
  • Network Security and Intrusion Detection
  • Cryptography and Data Security
  • IPv6, Mobility, Handover, Networks, Security
  • IoT and Edge/Fog Computing
  • Opportunistic and Delay-Tolerant Networks
  • Advanced Database Systems and Queries
  • Advanced Software Engineering Methodologies
  • User Authentication and Security Systems
  • Mobile Agent-Based Network Management
  • Software-Defined Networks and 5G
  • Logic, programming, and type systems

University of Tsukuba
2014-2025

Japan Science and Technology Agency
2005-2014

The University of Tokyo
2014

Tohoku University
2014

Toyohashi University of Technology
2005

Institute of Information Science
1997-2003

University of the Ryukyus
1995

Virtual machine monitors (VMMs), including hypervisors, are a popular platform for implementing various security functionalities. However, traditional VMMs require numerous components providing virtual hardware devices and sharing protecting system resources among machines (VMs), enlarging the code size of reducing reliability VMMs.This paper introduces hypervisor architecture, called parapass-through, designed to minimize hypervisors by allowing most I/O access from guest operating (OS)...

10.1145/1508293.1508311 article EN 2009-03-10

VPN Gate is a public relay service designed to achieve blocking resistance censorship firewalls such as the Great Firewall (GFW) of China. To resistance, we organize many volunteers provide service, with changing IP addresses. block their firewalls, authorities must find addresses all volunteers. prevent this, adopted two techniques improve resistance. The first technique mix number innocent into server list provided public. second collaborative spy detection. volunteer servers work together...

10.5555/2616448.2616470 article EN Networked Systems Design and Implementation 2014-04-02

Journal Article Lysophosphatidylserine analogues differentially activate three LysoPS receptors Get access Akiharu Uwamizu, Uwamizu 1Department of Molecular and Cellular Biochemistry, Graduate School Pharmaceutical Sciences, Tohoku University, 6-3, Aoba, Aramaki, Aoba-ku, Sendai, Miyagi 980-8578, Japan; 2PRESTO, Japan Science Technology Corporation, 4-1-8, Honcho, Kawaguchi, Saitama 332-0012, 3Laboratory Organic Medicinal Chemistry, University Tokyo, 7-3-1, Hongo, Bunkyo-ku, Tokyo 113-0033,...

10.1093/jb/mvu060 article EN The Journal of Biochemistry 2014-10-14

This paper proposes a novel method of achieving fast networking in hosted virtual machine (VM) environments. method, called socket-outsourcing, replaces the socket layer guest operating system (OS) with host OS. Socket-outsourcing increases network performance by eliminating duplicate message copying both OS and Furthermore, socket-outsourcing significantly enhances inter-VM communication within same since it enables packets to bypass protocol stack OSes. was implemented two representative...

10.1145/1529282.1529350 article EN 2009-03-08

We present a new access control model for XML Web-Services that provides users with two kinds of authorities: the authority to delegate their authorities other and create based on own authorities. developed this by introducing capability- Web services. A capability consists an object identifier list permitted operations object. map express as description in Services Description Language (WSDL). Delegation corresponds distribution capability, which is done passing WSDL description. Creation...

10.1109/icn.2008.72 article EN 2008-04-01

Virtualized environments are important building blocks in consolidated data centers and cloud computing. Full virtualization (FV) allows unmodified guest OSes to run on virtualization-aware microprocessors. However, the significant overhead of device emulation FV has caused high I/O overhead. Current implementations based paravirtualization can only reduce such partially. This paper describes Linsock approach that applies outsourcing method speed up by combining different OS host OS....

10.1109/nca.2009.49 article EN 2009-07-01

In this study, we describe obtaining hard real-time performance and rich Linux features together in a compounded operating system (cRTOS). This creates two realms with partitioning hypervisor: normal realm of swift RTOS (sRTOS). A process running the can use not only but also through remote calls. Unlike existing approaches for including PREEMPT_RT patch using interrupt-dispatching layers, approach requires no modifications to Linux.

10.1145/3381052.3381323 article EN 2020-03-03

In conventional egress network access control (NAC) using lists (ACLs), modifying ACLs is a heavy task for administrators. To enable rapid configuration without large amount of effort by administrators, we introduce capabilities to NAC. our NAC, user can transfer his/her rights (capabilities) other persons asking realize capability-based use DNS messages and IP options carry capabilities. A resolver the client sends name, domain service name as query cache server, which issues according...

10.1109/icita.2005.92 article EN 2005-08-03

The recent interest in runtime attestation requires modeling of a program’s behavior to formulate its integrity properties. In this paper, we study the possibility employing static source code analysis derive models commodity operating systems kernel. We develop precis

10.4108/icst.collaboratecom.2011.247087 article EN 2011-01-01

Most existing collaborative applications on the Web require centralized servers for storing shared data and relaying communication messages among browsers. This paper proposes building a distributed browser as platform Web-based to address these problems wit

10.4108/icst.collaboratecom.2011.247088 article EN 2011-01-01

Recently, the variety and vastness in networks have increased rapidly. To keep stable reliable, network administrators to understand nature of traffic flows. In this paper, we propose a method analyze using firewall logs. The characteristics our are 1) use aggregate flow information, 2) cardinality information Here, shows number servers/clients, contributes finding P2P software Intranet viruses. experimental results confirm that session level acquired by proposed can find other types applications.

10.1109/saint.2010.98 article EN 2010-07-01

Since centralized Social Networking Services (SNSs) inherently have privacy concerns, researchers are working on decentralized SNSs for solving them. However, it is very difficult to replace all the roles of with decentralize ones. This paper describes Friend News System, a messaging system that works together SNS while maintaining necessary level privacy. an implementation Usenet using existing small groups. It inherits architecture, robustness, and rich news readers from Usenet. allows...

10.1109/bdcloud.2014.66 article EN 2014-12-01

This paper proposes an anti-spam scheme that uses capability-based access control. In this scheme, rights to bypass spam filters are represented as capabilities, and email message containing a valid capability bypasses the filter goes straight receiver's inbox. As result, false positive problem inherent in existing is eliminated. allows user delegate another person compatible with systems applications. It was implemented client, Mozilla Thunderbird, along tool, basket, provides API for...

10.1109/lcn.2009.5355039 article EN 2009-10-01

As centralized social networking services (SNSs) or online networks (OSNs) have inherent privacy concerns, researchers are working on decentralized SNSs as alternatives for addressing these problems. However, it is very difficult to decentralize all the functions of SNSs. This paper describes a SNS using virtual private (VPNs) that work together with In this SNS, members can share information friends through VPNs while hiding from run applications and servers their PCs, allow access contents...

10.1109/pst.2016.7906984 article EN 2016-12-01

Object-stacking is a model for structuring object-based systems and mechanism integrating multiple servers. The paper describes the object-stacking structure of distributed operating system based on this model. In object-stacking, objects are classified into stackable bottom objects. These have uniform interfaces. Each holds identifiers other or as lower Functions implemented by calling their Bottom provided system. Complex created stacking those each server provides single high-level...

10.1109/iwooos.1992.252964 article EN 2003-01-02

Portable (standards-compliant) systems software is usually associated with unavoidable overhead from the standards-prescribed interface. For example, consider POSIX Threads standard facility for using thread-specific data (TSD) to implement multithreaded code. The first TSD reference must be preceded by pthread/spl I.bar/getspecific( ), typically implemented as a function or macro 40-50 instructions. This paper proposes method that uses runtime specialization'facility of Tempo program...

10.1109/tse.2005.98 article EN IEEE Transactions on Software Engineering 2005-09-01

Kernel scripting is a technique to run an extension code in script language operating system kernel. Conventional kernel has two limitations. First, it affects entire and only privileged users are allowed install new script. This prohibits developers from running their own application-specific the Second, its performance not sufficient for some time-sensitive applications. In this paper, we address these problems. Our call allows without root privilege. runs with less overhead because use...

10.1145/2818302.2818305 article EN 2015-09-29

Network-booting is widely adopted in universities that have to maintain many client computers. In conventional network-booting systems, the primary bottleneck disk image distribution servers and network these servers. To eliminate this bottleneck, peer-to-peer (P2P) methods must work. However, existing P2P methods, including BitTorrent, do not work well for because they are highly optimized distributing an entire large file, while requires certain parts of a file. present study, aiming solve...

10.1109/icnc.2012.38 article EN 2012-12-01

Conventional mobile applications are built based on a client-server modal and require central servers for storing shared data processing confidential information. If the accessed by an attacker, curious administrator or government, private information will be revealed because is often stored in form of cleartext. This paper presents Grouper, framework developing without trusted servers. To provide object synchronization among devices, Grouper uses secret sharing scheme to create several...

10.1145/3171592.3171628 article EN 2017-12-08
Coming Soon ...