Yasuharu Katsuno

Learn More
We address the fine-grained control of information flow between distributed applications to protect transactions. Confining transactions in distributed untrusted environments is crucial for Web services, distributed computing, and most e-commerce applications relying on those technologies. Applications must be protected from rogue peer applications but at(More)
Recently, there is appearing a multi Infrastructure as a Service (IaaS) cloud site environment. It makes server users/administrators annoying because each cloud site is managed separately by each cloud owner and they have to make use of cloud sites individually. In this paper, we propose the Multi Cloud Management Platform that locates between cloud users(More)
An agent augmented community is a new framework that uses agent technologies for the augmentation of our community activities by integrating cyberspace, the real world, and personal contexts. We have been developing a mobile agent system that can recognize real world situations, move to remote computers, and process information through communication among(More)
Identifying the source address of an IP packet is difficult with the IP protocol. Consequently it has been difficult to resolve distributed denial of service (DDoS) attacks on the Internet. This paper presents an autonomous system (AS) methodology for IP trace back based on the probabilistic packet marking (PPM) scheme. Although many PPM mechanisms have(More)
Recently, much attention has been paid to research on distributed coalitions that establish trust among the members of groups of computing components in distributed environments. The Trusted Virtual Domains (TVD) that our research division is proposing is a new model of a distributed coalition for establishing multiple trusted coalitions of components on(More)
A distributed coalition supports distributed mandatory access controls for resources whose security policies differ for each group of components over nodes, and provides secure information operations and exchanges with nodes that handle information over which conflicts of interest may occur. Many projects have proposed distributed coalitions using a virtual(More)
Infrastructure as a Service (IaaS) generally provides a standard vanilla server that contains an OS and basic functions, and each user has to manually install the required applications for the proper server deployments. We are working on a composite application deployment approach to automatically install selected applications in a flexible manner, based on(More)
This paper proposes an autonomic network configuration (ANC) technology, which uses autonomic technologies for the network configuration in order for electronics consumer appliances to improve usability and security. ANC provides networkable digital appliances (NDAs) with a network environment detection service and enables them to automatically configure(More)
Recently, much attention has been paid to research on distributed coalitions, as a possible mechanism to embody distributed information flow control which can apply security policies to distributed components over nodes by making the components enforce mandatory access controls for resources based on the policies. Some projects have proposed prototype(More)
A public cloud platform offers economy of scale, ease of management, and elasticity to solutions. In addition, regulatory compliance and security must be assured for solutions handling sensitive data, such as student and healthcare data. With the steep rise in data breaches at large enterprises, it is a requirement to emphasize the security, privacy, and(More)