Ikuya Morikawa

  • Citations Per Year
Learn More
The discussion of patients' rights in Japan began in 1968 when a surgeon was accused of violating a potential organ donor's right to life by arbitrarily employing brain-based criteria in the determination of his death. A proliferation of documents that articulate and endorse patients' rights occurred in the 1980s and early 1990s. The doctrine of informed(More)
Threat trees are notable tools in the security analysis process called "threat modeling"'. The trees are used to identify how and under what condition threats can be realized, which will help proper estimation of risks and planning of countermeasures. However, it is difficult for an average analyst to construct adequate trees, because security expertise,(More)
We have developed a mechanism which prevents abuse of trusted Java applets, such as digitally signed applets. A signed applet is usually permitted by a user to perform certain functions. However, an attacker may improperly recompose the signed applet to include malicious components and harm the user by abusing such functions of a signed applet. In this(More)
To provide more flexible and fine-grained end-to-end network services, Operational Support Systems (OSSs) should be interconnected across organization boundaries. Security for OSS interconnection is thereby required, and it must contain not only traditional channel-oriented security but also application-oriented security, such as user authentication and(More)
  • 1