Haruhiko Kaiya
Orcid: 0000-0001-9816-8001
According to our database1,
Haruhiko Kaiya
authored at least 115 papers
between 1995 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
IEICE Trans. Inf. Syst., 2024
2023
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 27th International Conference KES-2023, 2023
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 27th International Conference KES-2023, 2023
2022
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 26th International Conference KES-2022, 2022
A Proposal to Find Mutually Contributable Business or Life Activities Using Conformance Checking.
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 26th International Conference KES-2022, 2022
A Study on Analyzing Learner Behaviors in State Machine Modeling Using Process Mining and Statistical Test.
Proceedings of the Knowledge-Based Software Engineering: 2022, 2022
2021
CSPM: Metamodel for Handling Security and Privacy Knowledge in Cloud Service Development.
Int. J. Syst. Softw. Secur. Prot., 2021
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 25th International Conference KES-2021, 2021
Proceedings of the 28th Asia-Pacific Software Engineering Conference Workshops, 2021
2020
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 24th International Conference KES-2020, 2020
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 24th International Conference KES-2020, 2020
Proceedings of the Knowledge-Based Software Engineering: 2020, 2020
Proceedings of the Knowledge-Based Software Engineering: 2020, 2020
2019
A System for Seamless Support from Security Requirements Analysis to Security Design Using a Software Security Knowledge Base.
Proceedings of the 27th IEEE International Requirements Engineering Conference Workshops, 2019
Proceedings of the 23rd Pan-Hellenic Conference on Informatics, 2019
Towards A Knowledge Base for Software Developers to Choose Suitable Traceability Techniques.
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 23rd International Conference KES-2019, 2019
Proceedings of the 1st International Workshop on Software Engineering Research & Practices for the Internet of Things, 2019
2018
Cloud Security and Privacy Metamodel - Metamodel for Security and Privacy Knowledge in Cloud Services.
Proceedings of the 6th International Conference on Model-Driven Engineering and Software Development, 2018
Meta-Requirements for Information System Requirements: Lesson Learned from Software Ecosystem Researches.
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 22nd International Conference KES-2018, 2018
Tool to Automatically Generate a Screen Transition Model Based on a Conceptual Model.
Proceedings of the Knowledge-Based Software Engineering: 2018, 2018
Requirements Exploration by Comparing and Combining Models of Different Information Systems.
Proceedings of the Knowledge-Based Software Engineering: 2018, 2018
Proceedings of the 2018 IEEE 42nd Annual Computer Software and Applications Conference, 2018
Restructuring Attack Trees to Identify Incorrect or Missing Relationships between Nodes.
Proceedings of the International Workshop on Evidence-based Security and Privacy in the Wild and the 1st International Workshop on Machine Learning Systems Engineering co-located with 25th Asia-Pacific Software Engineering Conference (APSEC 2018), 2018
2017
Int. J. Secur. Softw. Eng., 2017
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 21st International Conference KES-2017, 2017
A CASE tool for Goal Dependency Model with Attributes based on An Existing UML Editor.
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 21st International Conference KES-2017, 2017
Generalizing and composing goals and objects in a scenario together for requirements analysis.
Proceedings of the 8th International Conference on Information, 2017
Proceedings of the 41st IEEE Annual Computer Software and Applications Conference, 2017
Identifying Fundamental Goals from Objects in a Scenario to Facilitate System Introduction.
Proceedings of the 41st IEEE Annual Computer Software and Applications Conference, 2017
Proceedings of the Requirements Engineering for Internet of Things, 2017
2016
Requirements Analysis for Privacy Protection and Third Party Awareness Using Logging Models.
Proceedings of the New Trends in Software Methodologies, Tools and Techniques, 2016
Proceedings of the New Trends in Software Methodologies, Tools and Techniques, 2016
Proceedings of the IEEE World Congress on Services, 2016
Proceedings of the 24th IEEE International Requirements Engineering Conference, 2016
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 20th International Conference KES-2016, 2016
2015
A Case-based Management System for Secure Software Development Using Software Security Knowledge.
Proceedings of the 19th International Conference in Knowledge Based and Intelligent Information and Engineering Systems, 2015
Proceedings of the 8th IEEE International Conference on Software Testing, 2015
Proceedings of the ICSOFT-EA 2015, 2015
Proceedings of the Software Technologies - 10th International Joint Conference, 2015
Proceedings of the 39th Annual Computer Software and Applications Conference, 2015
2014
J. Inf. Process., 2014
Int. J. Secur. Softw. Eng., 2014
Proceedings of the Product-Focused Software Process Improvement, 2014
Security Driven Requirements Refinement and Exploration of Architecture with Multiple NFR Points of View.
Proceedings of the 15th International IEEE Symposium on High-Assurance Systems Engineering, 2014
Proceedings of the Advanced Information Systems Engineering Workshops, 2014
Proceedings of the Advanced Information Systems Engineering Workshops, 2014
Proceedings of the Ninth International Conference on Availability, 2014
2013
Eliciting Security Requirements for an Information System using Asset Flows and Processor Deployment.
Int. J. Secur. Softw. Eng., 2013
Enhancing Goal-Oriented Security Requirements Analysis using Common Criteria-Based Knowledge.
Int. J. Softw. Eng. Knowl. Eng., 2013
Goal-Oriented Security Requirements Analysis for a System Used in Several Different Activities.
Proceedings of the Advanced Information Systems Engineering Workshops, 2013
Proceedings of the 2013 International Conference on Availability, Reliability and Security, 2013
2012
Analyzing Impacts on Software Enhancement Caused by Security Design Alternatives with Patterns.
Int. J. Secur. Softw. Eng., 2012
IEICE Trans. Inf. Syst., 2012
Finding Incorrect and Missing Quality Requirements Definitions Using Requirements Frame.
IEICE Trans. Inf. Syst., 2012
Validating Quality Requirements Considerations in a Design Document using Spectrum Analysis.
Proceedings of the Knowledge-Based Software Engineering, 2012
Proceedings of the 36th Annual IEEE Computer Software and Applications Conference Workshops, 2012
Proceedings of the 36th Annual IEEE Computer Software and Applications Conference Workshops, 2012
Facilitating Business Improvement by Information Systems using Model Transformation and Metrics.
Proceedings of the CAiSE'12 Forum at the 24<sup>th</sup> International Conference on Advanced Information Systems Engineering (CAiSE), 2012
Proceedings of the 19th Asia-Pacific Software Engineering Conference, 2012
2011
Proceedings of the 11th International Conference on Quality Software, 2011
Proceedings of the Workshop Proceedings of the 35th Annual IEEE International Computer Software and Applications Conference, 2011
Exploring How to Support Software Revision in Software Non-intensive Projects Using Existing Techniques.
Proceedings of the Workshop Proceedings of the 35th Annual IEEE International Computer Software and Applications Conference, 2011
Proceedings of the Sixth International Conference on Availability, 2011
2010
Improving Reliability of Spectrum Analysis for Software Quality Requirements Using TCM.
IEICE Trans. Inf. Syst., 2010
An Integrated Support for Attributed Goal-Oriented Requirements Analysis Method and its Implementation.
Proceedings of the 10th International Conference on Quality Software, 2010
Towards an Integrated Support for Traceability of Quality Requirements using Software Spectrum Analysis.
Proceedings of the ICSOFT 2010, 2010
Proceedings of the 17th Asia Pacific Software Engineering Conference, 2010
2009
Proceedings of the 2009 ACM Symposium on Applied Computing (SAC), 2009
Proceedings of the ASE 2009, 2009
Proceedings of the Software and Data Technologies - 4th International Conference, 2009
Detecting Regulatory Vulnerability in Functional Requirements Specifications.
Proceedings of the ICSOFT 2009, 2009
Proceedings of the Forum at the CAiSE 2009 Conference, 2009
Proceedings of the Advanced Information Systems Engineering, 21st International Conference, 2009
Extracting Conceptual Graphs from Japanese Documents for Software Requirements Modeling.
Proceedings of the Conceptual Modelling 2009, 2009
2008
Identifying Stakeholders and Their Preferences about NFR by Comparing Use Case Diagrams of Several Existing Systems.
IEICE Trans. Inf. Syst., 2008
Proceedings of the 2008 ACM Symposium on Applied Computing (SAC), 2008
Proceedings of the 2008 ACM Symposium on Applied Computing (SAC), 2008
Proceedings of the 16th IEEE International Requirements Engineering Conference, 2008
Proceedings of the 4th International Workshop on Predictor Models in Software Engineering, 2008
Proceedings of the Workshop on Modeling Security ( MODSEC08 ) held as part of the 2008 International Conference on Model Driven Engineering Languages and Systems ( MODELS ) Toulouse, 2008
Proceedings of the Models in Software Engineering, Workshops and Symposia at MODELS 2008, Toulouse, France, September 28, 2008
Measuring Characteristics of Models and Model Transformations Using Ontology and Graph Rewriting Techniques.
Proceedings of the Evaluation of Novel Approaches to Software Engineering, 2008
Metrics for a Model Driven Development Context.
Proceedings of the ENASE 2008, 2008
So/M: A Requirements Definition Tool Using Characteristics of Existing Similar Systems.
Proceedings of the 32nd Annual IEEE International Computer Software and Applications Conference, 2008
Proceedings of the 4th ACM Workshop on Quality of Protection, 2008
Proceedings of the Advanced Information Systems Engineering, 20th International Conference, 2008
2007
Effects of Thesaurus in Requirements Elicitation.
Proceedings of the First International Conference on Research Challenges in Information Science, 2007
Proceedings of the Software and Data Technologies - Second International Conference, 2007
An Integrated Tool for Supporting Ontology Driven Requirements Elicitation.
Proceedings of the ICSOFT 2007, 2007
Proceedings of the Advances in Conceptual Modeling - Foundations and Applications, 2007
Proceedings of the CAiSE'07 Forum, 2007
2006
IEICE Trans. Inf. Syst., 2006
Proceedings of the 14th IEEE International Conference on Requirements Engineering (RE 2006), 2006
Proceedings of the Sixth International Conference on Quality Software (QSIC 2006), 2006
Proceedings of the 21st IEEE/ACM International Conference on Automated Software Engineering (ASE 2006), 2006
A Supporting Tool to Identify both Satisfied Requirements and Tolerant Threats for a Java Mobile Code Application.
Proceedings of the ICEIS 2006, 2006
2005
Requir. Eng., 2005
Practical and Incremental Maintenance of Software Resources in Consumer Electronics Products.
IEICE Trans. Inf. Syst., 2005
Modeling Software Characteristics and Their Correlations in A Specific Domain by Comparing Existing Similar Systems.
Proceedings of the Fifth International Conference on Quality Software (QSIC 2005), 2005
Proceedings of the Fifth International Conference on Quality Software (QSIC 2005), 2005
2004
IEICE Trans. Inf. Syst., 2004
FC Method: A Practical Approach to Improve Quality and Efficiency of Software Processes for Embedded System Revision.
Proceedings of the 28th International Computer Software and Applications Conference (COMPSAC 2004), 2004
Proceedings of the 11th Asia-Pacific Software Engineering Conference (APSEC 2004), 30 November, 2004
2003
Trade-off Analysis between Security Policies for Java Mobile Codes and Requirements for Java Application.
Proceedings of the 11th IEEE International Conference on Requirements Engineering (RE 2003), 2003
VDM over PSP: A Pilot Course for VDM Beginners to Confirm its Suitability for Their Development.
Proceedings of the 27th International Computer Software and Applications Conference (COMPSAC 2003): Design and Assessment of Trustworthy Software-Based Systems, 2003
Proceedings of the 10th Asia-Pacific Software Engineering Conference (APSEC 2003), 2003
2002
Proceedings of the 10th Anniversary IEEE Joint International Conference on Requirements Engineering (RE 2002), 2002
Security Policy Checker and Generator for Java Mobile Codes.
Proceedings of the Engineering Information Systems in the Internet Context, 2002
1999
Proceedings of the 6th Asia-Pacific Software Engineering Conference (APSEC '99), 1999
1997
Syst. Comput. Jpn., 1997
1996
Structuring utterance records of requirements elicitation meetings based on speech act theory.
Proceedings of the 2nd International Conference on Requirements Engineering, 1996
1995
Building the Structure of Specification Documents from Utterances of Requirements Elicitation Meetings.
Proceedings of the 2nd Asia-Pacific Software Engineering Conference (APSEC '95), 1995