Kouta Sasaki

According to our database1, Kouta Sasaki authored at least 4 papers between 2003 and 2006.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2006
PORTAM: Policy, Requirements and Threats Analyzer for Mobile Code Application.
Proceedings of the Sixth International Conference on Quality Software (QSIC 2006), 2006

A Supporting Tool to Identify both Satisfied Requirements and Tolerant Threats for a Java Mobile Code Application.
Proceedings of the ICEIS 2006, 2006

2004
A Method to Develop Feasible Requirements for Java Mobile Code Application.
IEICE Trans. Inf. Syst., 2004

2003
Trade-off Analysis between Security Policies for Java Mobile Codes and Requirements for Java Application.
Proceedings of the 11th IEEE International Conference on Requirements Engineering (RE 2003), 2003


  Loading...