Ikuya Morikawa

Learn More
Threat trees are notable tools in the security analysis process called "threat modeling"'. The trees are used to identify how and under what condition threats can be realized, which will help proper estimation of risks and planning of countermeasures. However, it is difficult for an average analyst to construct adequate trees, because security expertise,(More)
We have developed a mechanism which prevents abuse of trusted Java applets, such as digitally signed applets. A signed applet is usually permitted by a user to perform certain functions. However, an attacker may improperly recompose the signed applet to include malicious components and harm the user by abusing such functions of a signed applet. In this(More)
The discussion of patients' rights in Japan began in 1968 when a surgeon was accused of violating a potential organ donor's right to life by arbitrarily employing brain-based criteria in the determination of his death. A proliferation of documents that articulate and endorse patients' rights occurred in the 1980s and early 1990s. The doctrine of informed(More)
  • 1