• Search Research Projects
  • Search Researchers
  • How to Use
  1. Back to previous page

Management and access control method for secret documents in the public database center

Research Project

Project/Area Number 02452152
Research Category

Grant-in-Aid for General Scientific Research (B)

Allocation TypeSingle-year Grants
Research Field 電子通信系統工学
Research InstitutionWaseda University

Principal Investigator

TOMINAGA Hideyoshi  Waseda Univ. Elec. and Comm. Eng. Professor, 理工学部, 教授 (20063688)

Co-Investigator(Kenkyū-buntansha) SUZUKI Joe  Waseda Univ. Industrial Eng. and Manag. Assistant, 理工学部, 助手 (50216397)
KAMEYAMA Wataru  Waseda Univ. Elec. and Comm. Eng・Assistant, 理工学部, 助手 (20214562)
KOMATSU Naohisa  Waseda Univ. Elec. and Comm. Eng・. Associate Professor, 理工学部, 助教授 (30195846)
HIRASAWA Shigeichi  Waseda Univ. Industrial Eng. and Manag. Professor, 理工学部, 教授 (30147946)
KASAHARA Masao  Kyoto Inst. of Tech. Elec. Eng. Professor, 工芸学部, 教授 (30029045)
李 裕子  早稲田大学, 理工学研究所, 嘱託研究員
Project Period (FY) 1990 – 1991
Project Status Completed (Fiscal Year 1991)
Budget Amount *help
¥6,400,000 (Direct Cost: ¥6,400,000)
Fiscal Year 1991: ¥2,000,000 (Direct Cost: ¥2,000,000)
Fiscal Year 1990: ¥4,400,000 (Direct Cost: ¥4,400,000)
KeywordsDatabase / Security / Document image / ISDN / IC card / Access control / Workstation / FAX / TSDN / アクセスコントロ-ル
Research Abstract

In these a few years, there are a lot of workstations and termiinals connected into single universal network. These workstations will proceed a lot of variety documents such as very personal information, published data, electric magazine, private mail and so on. Establishing a public common database connected to open network will be important subject to realize a high efficient system shared by mass of customers at reasonable cost. A safe-deposit box is very convenient facility, because many kind of assets and important docments of indivisuals are stored with hight security at reasonable cost. The same function of this system will bave to be exist in future information society in the single universal network system. We have proposed secure document image management system which manages private information at resonable cost with high security.
To realize real secure system in such open facility, there are two main problem. They are leakage and illegal occupation. The leakage means the content of document can be thrown out by somebody who is not the autliorized person. The illegal occupation means an injured function of database management occurred by mass of prescribed message that have been kept and are increasing in the database storage.
To solve above problems, we have studied following items.
1. Concreat system configuration and basic functions
2. Network access protocol in deposit and takeout procedure to keep high security
3. Database management protocol for secure document management
4. Customer identificaion scheme using feature of physical characteristics such as sensed data of fingerprint
5. Secure key sharing schemes using smartcard with no pre-communication
6. Scramble algorithm for document image using Soace Filling Curve
And we have constructed real simulation system using G4 FAX, ISDN network, workstations and smart card system in order to evaluate the protocols of proposed system at the point of security atid efficiency.

Report

(3 results)
  • 1991 Annual Research Report   Final Research Report Summary
  • 1990 Annual Research Report
  • Research Products

    (42 results)

All Other

All Publications (42 results)

  • [Publications] 平澤 茂一,笠原 正雄: "Coding and Decoding Schemes with Unequal Symbol Reliability" IEEE Trans,7. 7. 1176-1180 (1990)

    • Description
      「研究成果報告書概要(和文)」より
    • Related Report
      1991 Final Research Report Summary
  • [Publications] 西島 利尚,石井 博章,稲積 宏誠,平澤 茂一: "不均一な誤り訂正能力を有する畳込み符号の漸近的な能力の評価に関する考察" 電子情報通信学会信学論(A). J74ーA. 1085-1091 (1991)

    • Description
      「研究成果報告書概要(和文)」より
    • Related Report
      1991 Final Research Report Summary
  • [Publications] 山田 道夫,富永 英義: "探索的位置整合の不要な指紋画像照合方式(仮題)" 電子情報通信学会論文誌(D).

    • Description
      「研究成果報告書概要(和文)」より
    • Related Report
      1991 Final Research Report Summary
  • [Publications] 山田 道夫,伊藤 典男,富永 英義: "照合用指紋画像の特徴抽出符号化方式(仮題)" 電子情報通信学会論文誌(D).

    • Description
      「研究成果報告書概要(和文)」より
    • Related Report
      1991 Final Research Report Summary
  • [Publications] 稲葉 宏幸,寺島 史雄,若杉 耕一郎,笠原 正雄,松岡 武彦,村田 正: "ベクトル量子化による音声認識とその高信頼化" 電子情報通信学会技術研究報告,IT90ー14. 9-16 (1990)

    • Description
      「研究成果報告書概要(和文)」より
    • Related Report
      1991 Final Research Report Summary
  • [Publications] 村上 恭通,笠原 正雄: "ID情報に基づく鍵共有の一方式" 電子情報通信学会技術研究報告ISEC90ー26. 33-40 (1990)

    • Description
      「研究成果報告書概要(和文)」より
    • Related Report
      1991 Final Research Report Summary
  • [Publications] 山田 道夫,富永 英義: "公共デ-タベ-スにおける機密文書管理システムーアクセス制御方式とプロトコルの一検討ー" 平2 電子情報通信学会秋季全国大会,Dー172. 6-174 (1990)

    • Description
      「研究成果報告書概要(和文)」より
    • Related Report
      1991 Final Research Report Summary
  • [Publications] 富永 英義,山田 道夫,坂本 岳文: "音声からの個人確認情報の一生成手法" 平3 電子情報通信学会春季全国大会,SAー8ー4. 1-436 (1991)

    • Description
      「研究成果報告書概要(和文)」より
    • Related Report
      1991 Final Research Report Summary
  • [Publications] 富永 英義,木村 正二,横里 純一,山田 道夫: "動き特徴量を加えた顔画像個人照合の検討" 平3 電子情報通信学会春季全国大会,Dー604. 7-316 (1991)

    • Description
      「研究成果報告書概要(和文)」より
    • Related Report
      1991 Final Research Report Summary
  • [Publications] 富永 英義,池田 昌人,横里 純一,山田 道夫: "顔の起状情報を用いた個人照合の基礎実験" 平3 電子情報通信学会春季全国大会,Dー605. 7-317 (1991)

    • Description
      「研究成果報告書概要(和文)」より
    • Related Report
      1991 Final Research Report Summary
  • [Publications] 南 憲明,若杉 耕一郎,笠原 正雄: "画像情報のセキュリティ確保に関する考察" 電子情報通信学会技術研究報告,ISEC91ー8. 55-64 (1991)

    • Description
      「研究成果報告書概要(和文)」より
    • Related Report
      1991 Final Research Report Summary
  • [Publications] 前間 孝久,新家 稔史,平澤 茂一: "逐次復号に関する一考察" 電子情報通信学会技術研究報告IE. 13-16 (1991)

    • Description
      「研究成果報告書概要(和文)」より
    • Related Report
      1991 Final Research Report Summary
  • [Publications] 山田 道夫,富永 英義: "公共デ-タベ-スにおける機密文書管理システムーシミュレ-ションシステムの作成ー" 平3 電子情報通信学会秋季大会,Dー96. 6・98 (1991)

    • Description
      「研究成果報告書概要(和文)」より
    • Related Report
      1991 Final Research Report Summary
  • [Publications] 金子 敏充,西島 利尚,稲積 宏誠,平澤 茂一: "ある最尤復号とそのq元符号への拡張" 情報理論とその応用学会第14回資料. 45-48 (1991)

    • Description
      「研究成果報告書概要(和文)」より
    • Related Report
      1991 Final Research Report Summary
  • [Publications] 宮戸 良和,若杉 耕一郎,笠原 正雄: "誤り訂正符号を用いたデ-タ分散保管方式の信頼性評価" 第14回情報理論とその応用シンポジウム(SITA'91)予稿. pp.727-730 (1991)

    • Description
      「研究成果報告書概要(和文)」より
    • Related Report
      1991 Final Research Report Summary
  • [Publications] Michio Yamada,Jyun-ichi Yokosato and Hideyoshi Tominaga: "Secure Document Management Facilities in Telematics" Proc.6th International Workshop on Telematics(IWT),C.3. 80-82 (1991)

    • Description
      「研究成果報告書概要(和文)」より
    • Related Report
      1991 Final Research Report Summary
  • [Publications] T.Matsushima,H.Inazumi S.Hirasawa: "A Class of Distortionless Codes Designed by Bayes Decision Theory" IEEE Trans.on Information Theory. 37. 1288-1293 (1991)

    • Description
      「研究成果報告書概要(和文)」より
    • Related Report
      1991 Final Research Report Summary
  • [Publications] 小舘 亮之,伊藤 典男,山田 道夫,富永 英義: "複雑度を尺度とする筆者照合の試み" 電子情報通信学会春季大会,Dー571. (1992)

    • Description
      「研究成果報告書概要(和文)」より
    • Related Report
      1991 Final Research Report Summary
  • [Publications] M. Yamada, N. Itoh, H. Nagamori and H. Tominaga: "Secure Document Management for Public Database-A simulation system for real experiment-" IEICE, 1991 Fall Nat. Convention rec.D-96. 6.98 (1991)

    • Description
      「研究成果報告書概要(欧文)」より
    • Related Report
      1991 Final Research Report Summary
  • [Publications] T. Kaneko, T. Nishijima, H. Inazumi, and S. Hirasawa: "Notes on Certain MLD Algarithm and Its Extension to Q-ary Codes" The 14th Symposium on Information Theory and its Application (SITA'91). 45-48 (1991)

    • Description
      「研究成果報告書概要(欧文)」より
    • Related Report
      1991 Final Research Report Summary
  • [Publications] Y. Miyako, K. Wakasugi and M. Kasahara: "Performance on Reliability of a File Sharing System using an Error-Correcting Code" The 14th Symposium on Information Theory and its Application (SITA'91). 727-730 (1991)

    • Description
      「研究成果報告書概要(欧文)」より
    • Related Report
      1991 Final Research Report Summary
  • [Publications] M. Yamada, J. Yokosato and H. Tominaga: "Secure Document Management Facilities in Telematics" Proc. 6th International Workshop on Telematics (IWT). C. 3. (1991)

    • Description
      「研究成果報告書概要(欧文)」より
    • Related Report
      1991 Final Research Report Summary
  • [Publications] T. Matsushima, H. Inazumi and S. Hirasawa: "A Class of Distortionless Codes Designed by Bayes Decision Theory" IEEE Trans. on Information Theory. 37. 5 (1991)

    • Description
      「研究成果報告書概要(欧文)」より
    • Related Report
      1991 Final Research Report Summary
  • [Publications] A. Kodate, N. Ito, M. Yamada and H. Tominaga: "An Attempt of Writer Verification Using Region's Complexity" IEICE, 1992 Spring Convention rec.D-571. (1991)

    • Description
      「研究成果報告書概要(欧文)」より
    • Related Report
      1991 Final Research Report Summary
  • [Publications] M. yamada and H. Tominaga: "Secure Document Management for Public Database" IEICE, 1991 Fall Nat. Convention rec.D-172. 6-174 (1991)

    • Description
      「研究成果報告書概要(欧文)」より
    • Related Report
      1991 Final Research Report Summary
  • [Publications] H. Tominaga, M. Yamada, T. Sakamoto: "On Generation of speech authentication by voice information" IEICE, 1991 Spring Nat. Convention rec.SA-8-4. 1-436 (1991)

    • Description
      「研究成果報告書概要(欧文)」より
    • Related Report
      1991 Final Research Report Summary
  • [Publications] H. Tominaga, S. Kimurad, J. Yokosato and M. Yamada: "Personal Verification of Facial Images Considering Movements Features." IEICE, 1991 Spring Nat. Convention rec.D-604. 7-316 (1991)

    • Description
      「研究成果報告書概要(欧文)」より
    • Related Report
      1991 Final Research Report Summary
  • [Publications] H. Tominaga, M. Ikeda, J. Yokosato and M. Yamada: "Personal Verification Using 3D Face Shape" IEICE, 1991 Spring Nat. Convention rec.D-605. 7-317 (1991)

    • Description
      「研究成果報告書概要(欧文)」より
    • Related Report
      1991 Final Research Report Summary
  • [Publications] N. Minami, K. Wakasugi and M. Kasahara: "A Note on Information Security for Image Source" IEICE, Tech. Rep. on ISEC91-8. 55-64 (1991)

    • Description
      「研究成果報告書概要(欧文)」より
    • Related Report
      1991 Final Research Report Summary
  • [Publications] T. Maema, T. Niinomi, and S. Hirasawa: "A Note on Sequential Decoding" IEICE, Tech. Rep. on IT91-43. 13-16 (1991)

    • Description
      「研究成果報告書概要(欧文)」より
    • Related Report
      1991 Final Research Report Summary
  • [Publications] S. Hirasawa and M. Kasahara: "Coding and Decoding Schemes with Unequal Symbol Reliability" IEEE Trans. 7. 1176-1180 (1990)

    • Description
      「研究成果報告書概要(欧文)」より
    • Related Report
      1991 Final Research Report Summary
  • [Publications] T. Nishijima, H. Ishii, H. Inazumi, and S. Hirasawa: "On Asymptotic Free Distance Ratios for the Constructive Convolutional Codes with Unequal Error Protection" IEICE Trans.J74-A, 7. 1085-1091 (1991)

    • Description
      「研究成果報告書概要(欧文)」より
    • Related Report
      1991 Final Research Report Summary
  • [Publications] M. Yamada and H. Tominaga: "Personal verification method using finger print matching with no location adjustment" IEICE Trans. D. (1992)

    • Description
      「研究成果報告書概要(欧文)」より
    • Related Report
      1991 Final Research Report Summary
  • [Publications] M. Yamada, N. Itoh and H. Tominaga: "Data Compression of fingerprint Image by feature Extraction for fingerprint Identification Database" IEICE Trans. D. (1992)

    • Description
      「研究成果報告書概要(欧文)」より
    • Related Report
      1991 Final Research Report Summary
  • [Publications] H. Inaba, N. Terashima, K. Wakasugi, M. Kasahara, T. Matsuoka and T. Murata: "Speech Recognition using Vector Quantization and Improvement of its Reliability" IEICE, Tech. Rep. on IT90-14. 9-16 (1990)

    • Description
      「研究成果報告書概要(欧文)」より
    • Related Report
      1991 Final Research Report Summary
  • [Publications] N. Murakami and M. Kasahara: "An ID-Based Key Distribution System." IEICE, Tech. Rep. on ISEC90-26. 9-16 (1990)

    • Description
      「研究成果報告書概要(欧文)」より
    • Related Report
      1991 Final Research Report Summary
  • [Publications] 平澤 茂一,笠原 正雄: "Coding and Decoding Schemes with Unequal Symbol Reliability" Trarsaction of IEICE(電子情報通信学会英文論文誌). 7. 1176-1180 (1990)

    • Related Report
      1990 Annual Research Report
  • [Publications] 山田 道夫,横里 純一,富永 英義: "指紋画像を用いた個人認証方式" 電子情報通信学会論文誌.

    • Related Report
      1990 Annual Research Report
  • [Publications] 伊藤 典男,山田 道夫,富永 英義: "2値画像におけるコンシ-ルドイメ-ジの一実現手法" 電子情報通信学会技術研究報告 情報理論研究会資料. 83-86 (1990)

    • Related Report
      1990 Annual Research Report
  • [Publications] 横里 純一,木村 正二,池田 昌人,山田 道夫,富永 英義: "時間軸特徴量を加えた顔画像個人照合方式の提案" 暗号と情報セキュリティシンポジウム予稿集. 18C1-9 (1991)

    • Related Report
      1990 Annual Research Report
  • [Publications] 羽田 亭,笠原 正雄: "ReedーSolomon符号の消失誤り訂正を用いた暗号化方式" 情報理論とその応用シンポジウム予稿集. 1-6 (1991)

    • Related Report
      1990 Annual Research Report
  • [Publications] 村上 恭通,笠原 正雄: "合成数を法とする離散対数問題と一応用例" 情報理論とその応用シンポジウム予稿集. 17-22 (1991)

    • Related Report
      1990 Annual Research Report

URL: 

Published: 1990-04-01   Modified: 2016-04-21  

Information User Guide FAQ News Terms of Use Attribution of KAKENHI

Powered by NII kakenhi