| 11301134 |
Using attack trees to reduce memory consumption by rule engines |
Yoichi Hatsutori, Takuya Mishina, Naoto Sato |
2022-04-12 |
| 10586051 |
Automatic transformation of security event detection rules |
Yoichi Hatsutori, Takuya Mishina, Naoto Sato |
2020-03-10 |
| 10176436 |
Extracting skill-level-based command execution patterns from CATIA command log |
Michiharu Kudoh |
2019-01-08 |
| 10049220 |
Automatic transformation of security event detection rules |
Yoichi Hatsutori, Takuya Mishina, Naoto Sato |
2018-08-14 |
| 8650608 |
Method for model based verification of security policies for web service composition |
Kouichi Ono, Yuhichi Nakumura, Takaaki Tateishi |
2014-02-11 |
| 8386998 |
Software development apparatus for model that requires security |
Yuichi Nakamura, Kouichi Ono |
2013-02-26 |
| 8245191 |
Policy application rules for automated configuration of software components |
Shinichi Hirose, Nirmal K. Mukhi, Yuichi Nakamura |
2012-08-14 |
| 8209262 |
Pattern-based policy application mechanism for SCA |
David A. Booz, Francisco P. Curbera, Shinichi Hirose, Nirmal K. Mukhi, Yuichi Nakamura |
2012-06-26 |
| 8095918 |
Software development apparatus for model that requires security |
Yuichi Nokomuru, Kouichi Ono |
2012-01-10 |
| 7774450 |
Method for creating and processing a soap message, and method, apparatus and program for processing information |
Takeshi Imamura, James Andrew Clark, Hiroshi Maruyama, Yumi Yamaguchi, Masayoshi Teraguchi +1 more |
2010-08-10 |
| 7539683 |
Systems, methods, and computer products for information sharing using personalized index caching |
Toyotaro Suzumura, Issei Yoshida |
2009-05-26 |
| 7440952 |
Systems, methods, and computer products for information sharing using personalized index caching |
Toyotaro Suzumura, Issei Yoshida |
2008-10-21 |
| 7349959 |
Method for creating and processing a soap message, and method, apparatus and program for processing information |
Takeshi Imamura, Andy Clak, Hiroshi Maruyama, Yumi Yamaguchi, Masayoshi Teraguchi +1 more |
2008-03-25 |