• Search Research Projects
  • Search Researchers
  • How to Use
  1. Back to previous page

Development of a Secure Proxy System with a Policy Distribution Mechanism for Machine-to-Machine Networks

Research Project

Project/Area Number 21700090
Research Category

Grant-in-Aid for Young Scientists (B)

Allocation TypeSingle-year Grants
Research Field Computer system/Network
Research InstitutionToyota National College of Technology

Principal Investigator

HIRANO Manabu  Toyota National College of Technology, 情報工学科, 講師 (50390464)

Project Period (FY) 2009 – 2010
Project Status Completed (Fiscal Year 2010)
Budget Amount *help
¥780,000 (Direct Cost: ¥600,000、Indirect Cost: ¥180,000)
Fiscal Year 2010: ¥130,000 (Direct Cost: ¥100,000、Indirect Cost: ¥30,000)
Fiscal Year 2009: ¥650,000 (Direct Cost: ¥500,000、Indirect Cost: ¥150,000)
Keywordsセキュアネットワーク / インターネット高度化 / ネットワーク / 情報システム / 計算機システム / 機器連携 / 機器認証 / ユビキタス / セキュリティ
Research Abstract

Recently, many computer-embedded things that can connect to the Internet have been increased in our daily living environment. These computers provide useful functions to users naturally. However, such small and invisible computers are integrated into many daily things. Therefore, it will be difficult to grasp such small invisible computers surrounding them and to ensure their security mechanisms. In this study, I proposed federation model based on rules using triggers and actions for Machine-to-Machine networks. I developed a prototype implementation of the proposed inter-device federation model using an Android-based GUI application and Wi-Fi-based proxy systems with basic security functions.

Report

(3 results)
  • 2010 Annual Research Report   Final Research Report ( PDF )
  • 2009 Annual Research Report
  • Research Products

    (10 results)

All 2011 2010 2009

All Journal Article (4 results) (of which Peer Reviewed: 4 results) Presentation (4 results) Book (2 results)

  • [Journal Article] A Two-step Execution Mechanism for Thin Secure Hypervisors2009

    • Author(s)
      Manabu Hirano, et al.
    • Journal Title

      Proceedings of the 3rd International Conference on Emerging Security Information, Systems and Technologies (IARIA SECURWARE 2009)(共著者11名,第一著者)

      Pages: 129-135

    • NAID

      120003184345

    • Related Report
      2010 Final Research Report
    • Peer Reviewed
  • [Journal Article] T-PIM : Trusted Password Input Method against Data Stealing Malware2009

    • Author(s)
      Manabu Hirano, et al.
    • Journal Title

      Proceedings of 6th International Conference on Information Technology : New Generations (ITNG 2009)(共著者4名,第一著者)

      Pages: 429-434

    • Related Report
      2010 Final Research Report
    • Peer Reviewed
  • [Journal Article] A Two-step Execution Mechanism for Thin Secure Hypervisors2009

    • Author(s)
      Manabu Hirano
    • Journal Title

      Proceedings of the 3rd International Conference on Emerging Security Information, Systems and Technologies(IARIA SECURWARE 2009)

      Pages: 129-135

    • NAID

      120003184345

    • Related Report
      2009 Annual Research Report
    • Peer Reviewed
  • [Journal Article] T-PIM : Trusted Password Input Method against Data Stealing Malware2009

    • Author(s)
      Manabu Hirano
    • Journal Title

      Proceedings of 6th International Conference on In formation Technology : New Generations(ITNG 2009)

      Pages: 429-434

    • Related Report
      2009 Annual Research Report
    • Peer Reviewed
  • [Presentation] 機器間の自律的な連携動作モデルと管理システムの提案2011

    • Author(s)
      松川朋樹, 平野学
    • Organizer
      情報処理学会マルチメディア通信と分散処理研究会
    • Place of Presentation
      関西大学(大阪府)
    • Year and Date
      2011-03-10
    • Related Report
      2010 Final Research Report
  • [Presentation] 機器間の自律的な連携動作モデルと管理システムの提案2011

    • Author(s)
      松川朋樹
    • Organizer
      情報処理学会 第146回 マルチメディア通信と分散処理・第52回コンピュータセキュリティ合同研究発表会
    • Place of Presentation
      関西大学千里山キャンパス
    • Year and Date
      2011-03-10
    • Related Report
      2010 Annual Research Report
  • [Presentation] 仮想マシンモニタBitVisorのためのロールヘースアクセス制御機構の設計と実装2010

    • Author(s)
      幾世知範, 平野学, 他
    • Organizer
      情報処理学会 コンピュータセキュリティ研究会(他に共著者 5名, 第二著者)
    • Place of Presentation
      東北大学(宮城県)
    • Year and Date
      2010-03-04
    • Related Report
      2010 Final Research Report
  • [Presentation] 仮想マシンモニタ BitVisor のためのロールヘースアクセス制御機構の設計と実装2010

    • Author(s)
      幾世知範
    • Organizer
      コンピュータセキュリティ研究会(CSEC)
    • Place of Presentation
      東北大学
    • Year and Date
      2010-03-04
    • Related Report
      2009 Annual Research Report
  • [Book] IN-TECH, Engineering the Computer Science and IT(Chapter 24 : Portable ID Management Framework for Security Enhancement of Virtual Machine Monitors)(共著者16名,第一著者)2009

    • Author(s)
      Manabu Hirano, et al.
    • Related Report
      2010 Final Research Report
  • [Book] "Engineering the Computer Science and IT"(Chapter 24 : Portable ID Management Framework for Security Enhancement of Virtual Machine Monitors)2009

    • Author(s)
      Manabu Hirano
    • Publisher
      IN-TECH
    • Related Report
      2009 Annual Research Report

URL: 

Published: 2009-04-01   Modified: 2016-04-21  

Information User Guide FAQ News Terms of Use Attribution of KAKENHI

Powered by NII kakenhi