Sachiko Yoshihama  Sachiko Yoshihama photo       

contact information

Senior Manager, FSS & Blockchain Solutions
Tokyo Research Laboratory, Yamato, Japan
  +81dash3dash3808dash5385dash5385

links

Professional Associations

Professional Associations:  ACM  |  Information Processing Society of Japan (IPSJ)

more information

More information:  Publications


2013

ICHIGAN Security-A Security Architecture That Enables Situation-Based Policy Switching
Hiroshi Maruyama, Kiyoshi Watanabe, Sachiko Yoshihama, Naohiko Uramoto, Yoichiro Takehora, Kazuhiro Minami
Availability, Reliability and Security (ARES), 2013 Eighth International Conference on, pp. 525--529


2011

Security for Mashups
Sachiko Yoshihama
Encyclopedia of Cryptography and Security, pp. 1146--1147, Springer, 2011


2010

Agenda and response to information security management in cloud computing
Masashi Une, Masataka Suzuki, and Sachiko Yoshihama,
INSTITUTE FOR MONETARY AND ECONOMIC STUDIES (IMES) Discussion Paper No. 2010-J-24

Web-based Data Leakage Prevention
Sachiko Yoshihama, Takuya Mishina, Tsutomu Matsumoto
International Workshop on Security (IWSEC) 2010, Nov 22-24, 2010, Kobe, Japan.


2009

Adaptive Security Dialogs for Improved Security Behavior of Users
Frederik De Keukelaere, Sachiko Yoshihama, Scott Trent, Yu Zhang, Lin Luo, Mary Ellen Zurko
proceedings of the 12th IFIP TC 13 International Conference on Human-Computer Interaction (INTERACT 2009) Part I, pp.510-523, Uppsala, Sweden, August 2009.

Information-flow-based Access Control for Web Browsers
Sachiko Yoshihama, Takaaki Tateishi, Naoshi Tabuchi, Tsutomu Matsumoto
IEICE Transactions Vol.E92-D,No.5: May. 2009. E92(5)


2008

Integrity Management Infrastructure for Trusted Computing
Seiji Munetoh, Megumi Nakamura, Sachiko Yoshihama, Michiharu Kudo
IEICE Transactions Vol. E91-D, No.5: pp.1242-1251, May 2008. E91(5), 1242-1251

SMash: Secure Cross-Domain Mashups on Unmodified Browsers
F De Keukelaere, S Bhola, MICHAEL STEINER, Suresh N Chari, Sachiko Yoshihama
Proceedings of the 17th International World Wide Web, ACM., 2008


2007

Fine-grained sticky provenance architecture for office documents
Takuya Mishina, Sachiko Yoshihama, Michiharu Kudo
Advances in Information and Computer Security, pp. 336--351, Springer, 2007

Beyond XSS-Towards Universal Content Filtering
Sachiko Yoshihama, Ai Ishida, Naohiko Uramoto
2007 - domino.research.ibm.com

Dynamic information flow control architecture for web applications
Sachiko Yoshihama, Takeo Yoshizawa, Yuji Watanabe, Michiharu Kudoh, Kazuko Oyanagi
Computer Security--ESORICS 2007, pp. 267--282, Springer

WS-attestation: enabling trusted computing on web services
Sachiko Yoshihama, Tim Ebringer, Megumi Nakamura, Seiji Munetoh, Takuya Mishina, Hiroshi Maruyama
Test and analysis of web services, pp. 441--469, Springer, 2007

Security Model for the Client-Side Web Application Environments
Sachiko Yoshihama, Naohiko Uramoto, Satoshi Makino, Ai Ishida, Shinya Kawanaka, Frederik De Keukelaere
IBM Tokyo Research Laboratory presentation, 2007


2006

Language-based information flow control in dynamic approach
Sachiko Yoshihama, Michiharu Kudoh, Kazuko Oyanagi
Technical Report, IBM Research Report TR0694, IBM Research, 2006

Bridging the gap between inter-communication boundary and internal trusted components
Yuji Watanabe, Sachiko Yoshihama, Takuya Mishina, Michiharu Kudo, Hiroshi Maruyama
Computer Security--ESORICS 2006, pp. 65--80, Springer

Layering negotiations for flexible attestation
Yasuharu Katsuno, Yuji Watanabe, Sachiko Yoshihama, Takuya Mishina, Michiharu Kudoh
Proceedings of the first ACM workshop on Scalable trusted computing, pp. 17--20, 2006

Towards multi-layer trusted virtual domains
Yasuharu Katsuno, Michiharu Kudo, Ronald Perez, Reiner Sailer, Yuji Watanabe, Sachiko Yoshihama, Leendert Doorn
the 2nd Workshop on Advances in Trusted Computing, 2006


2005

Trusted Virtual Domains: Secure foundations for business and IT services
Anthony Bussani, John Linwood Griffin, Bernhard Jansen, Klaus Julisch, Genter Karjoth, Hiroshi Maruyama, Megumi Nakamura, Ronald Perez, Matthias Schunter, Axel Tanner, others
Science23792, 2005

WS-Attestation: Efficient and Fine-Grained Remote Attestation on Web Services.
Sachiko Yoshihama, Tim Ebringer, Megumi Nakamura, Seiji Munetoh, Hiroshi Maruyama
ICWS, pp. 743--750, 2005


2004

Trusted platform on demand (TPod)
Hiroshi Maruyama, Frank Seliger, Nataraj Nagaratnam, Tim Ebringer, S Munetho, Sachiko Yoshihama, Taiga Nakamura
Technical Report, Citeseer, 2004


2003

Assurance of Web Services
Sachiko Yoshihama, Paula K Austel, Hiroshi Maruyama
2003 - domino.research.ibm.com

Managing behavior of intelligent environments
Sachiko Yoshihama, Paul Chou, Danny Wong
Pervasive Computing and Communications, 2003.(PerCom 2003). Proceedings of the First IEEE International Conference on, pp. 330--337

MyTeam: Availability Awareness Through the Use of Sensor Data.
Jennifer Lai, Sachiko Yoshihama, Thomas Bridgman, Mark Podlaseck, Paul B Chou, Danny C Wong
INTERACT, 2003


2002

Personalizing Behavior in Context-Aware Workspaces
Sachiko Yoshihama, Paul Chou, Danny Wong
domino.research.ibm.com, 2002


2001

BlueSpace: Creating a personalized and context-aware workspace
Paul Chou, Marco Gruteser, Jennifer Lai, Anthony Levas, Scott McFaddin, Claudio Pinhanez, Marisa Viveros, Danny Wong, Sachiko Yoshihama
Relat\'orio t\'ecnico1, 10--75, 2001




Technical Areas