Yoshiaki Takata
Orcid: 0000-0003-4982-0264
According to our database1,
Yoshiaki Takata
authored at least 40 papers
between 2000 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
A Subclass of Mu-Calculus with the Freeze Quantifier Equivalent to Büchi Register Automata.
IEICE Trans. Inf. Syst., 2024
Non-Cooperative Rational Synthesis Problem on Stochastic Games for Positional Strategies.
IEICE Trans. Inf. Syst., 2024
Proceedings of the Theoretical Aspects of Computing - ICTAC 2024, 2024
2023
A Subclass of Mu-Calculus with the Freeze Quantifier Equivalent to Register Automata.
IEICE Trans. Inf. Syst., March, 2023
IEICE Trans. Inf. Syst., March, 2023
A Game-Theoretic Approach to Indistinguishability of Winning Objectives as User Privacy.
Proceedings of the Theoretical Aspects of Computing - ICTAC 2023, 2023
2022
Reduction of Register Pushdown Systems with Freshness Property to Pushdown Systems in LTL Model Checking.
IEICE Trans. Inf. Syst., September, 2022
Theor. Comput. Sci., 2022
Proceedings of the Theoretical Aspects of Computing - ICTAC 2022, 2022
2021
IEICE Trans. Inf. Syst., 2021
Proceedings of the Theoretical Aspects of Computing - ICTAC 2021, 2021
2020
2019
2018
Proceedings of the Theoretical Aspects of Computing - ICTAC 2018, 2018
2014
A Formal Verification of a Subset of Information-Based Access Control Based on Extended Weighted Pushdown System.
IEICE Trans. Inf. Syst., 2014
2013
Proceedings of the 6th International Conference on Security of Information and Networks, 2013
2010
Automatic Generation of History-Based Access Control from Information Flow Specification.
Proceedings of the Automated Technology for Verification and Analysis, 2010
2009
IEICE Trans. Inf. Syst., 2009
Formal Language Theoretic Approach to the Disclosure Tree Strategy in Trust Negotiation.
IEICE Trans. Inf. Syst., 2009
2008
New Certificate Chain Discovery Methods for Trust Establishment in Ad Hoc Networks and Their Evaluation.
Inf. Media Technol., 2008
2007
Inf. Media Technol., 2007
A Labeled Transition Model A-LTS for History-Based Aspect Weaving and Its Expressive Power.
IEICE Trans. Inf. Syst., 2007
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007
2006
Proceedings of the 11th ACM Symposium on Access Control Models and Technologies, 2006
Proceedings of the Computer Security, 2006
2005
2004
Accessibility Verification of WWW Documents by an Automatic Guideline Verification Tool.
Proceedings of the 37th Hawaii International Conference on System Sciences (HICSS-37 2004), 2004
2003
Process Decomposition via Synchronization Events and Its Application to Counter-Process Decomposition.
Proceedings of the Parallel Processing and Applied Mathematics, 2003
Automatic Accessibility Guideline Validation of XML Documents Based on a Specification Language.
Proceedings of the Human-Computer Interaction: Universal Access in HCI: Inclusive Design in the Information Society, 2003
2002
Inf. Softw. Technol., 2002
Proceedings of the Information and Communications Security, 4th International Conference, 2002
2001
Proceedings of the 6th ACM Symposium on Access Control Models and Technologies, 2001
Formal Specification and Implemenation Using a Task Flow Diagram in Interactive System Design.
Proceedings of the World Multiconference on Systemics, Cybernetics and Informatics, 2001
An Efficient Information Flow Analysis of Recursive Programs Based on a Lattice Model of Security Classes.
Proceedings of the Information and Communications Security, Third International Conference, 2001
Proceedings of the CCS 2001, 2001
Analysis and Implementation Method of Program to Detect Inappropriate Information Leak.
Proceedings of the 2nd Asia-Pacific Conference on Quality Software (APAQS 2001), 2001
2000
Proceedings of the Conceptual Modeling for E-Business and the Web, 2000