Information Security Lab. Website
情報セキュリティ研究室 ホームページ

Ryoichi Sasaki

Brief career history

Publications - Books

Publications - Journals

Publications - International conferences (refereed)

Publications - Invited Talks

Prizes

Some Professional Activities

Other activities

 

Brief career history

Prof.Sasaki

 He is a specialized full-time professor and a director of Cyber Security Laboratory of Tokyo Denki University.

 He received his B.S. Degree in health science and Ph.D Degree in system engineering from Tokyo University in 1971 and 1981, respectively.

 From April of 1971 to March of 2001, he was engaged in the research and research management on systems safety, network management and information security at Systems Development Laboratory of Hitachi Ltd.

 From April of 2001 to March of 2018, he is a professor of Tokyo Denki University, and engaged in the research and education on information security.

Return to top

Publications

Books

  1. Ryoichi Sasaki (edited) "Fundamentals and Practice of Digital Forensics" Publisher in Tokyo Denki University, 2017 (Japanese)
  2. Ryoichi Sasaki (supervised) “Revised Digital Forensic Encyclopedia” Nikka Giren Publication 2014 (Japanese)
  3. Ryoichi Sasaki (supervised) “Network Security” Ohmsha 2014 (In Japanese)
  4. Ryoichi Sasaki (edited) "IT Risk Studies - Beyond the Security - " Kyouritsu Pablishing, 2013 (Japanese)
  5. Ryoichi Sasaki (supervised) Satoru Tezuka (edited) “Fundamentals of Information Security” Kyouritsu Pablishing, 2011 (Japanese)
  6. Isao Echizen, Noboru Kunihiro and Ryoichi Sasaki Advances in Information and Computer Security, 5th International Workshop on Security, IWSEC 2010, Kobe, Japan, November 22-24, 2010. Proceedings,Springer Lecture Notes in Computer Science Volume 6434, 2010, DOI: 10.1007/978-3-642-16825-3
  7. Mitsuhiro Taniyama,Rryoichi Sasaki Edited by Maurizo A. Strangio“Advanced Technologies” Chapter26 “Application and Education of “Multiple Risk Communicator”IN-TECH 2010
  8. Ryoichi Sasaki (Ed), Kazuhiro Aida,
    "Introduction to Information Security", Kyoritsu, 2009 (Japanese)
  9. Ryoichi Sasaki (Ed), Japan Network Security Association
    "Information Security Professional Textbook "ASCII,2008 (Japanese)
  10. Ryoichi Sasaki
    "How to Deal with IT Risk" IWANAMI Shinsho. 2008 (Japanese)
  11. Ryoichi Sasaki, Sihan Qing, Eiji Okamoto, Horoshi Yoshiura,(Eds)
    "Security and Privacy in the Age of Ubiquitous Computing" Springer,2005
  12. Ryoichi Sasaki, Hiroshi Yajima, Takayuki Sasaki,
    "Introduction to Information Science (Second Edition)"Nihon Rikou Syupankai, 2006 (Japanese)
  13. Ryoichi Sasaki, Katsuya Uchida, Eiji Okamoto, Hiroaki Kikuchi, Masato Terada, Yuuko Murayama
    "Information Security Encyclopedia" Kyoritsu, 2003 (Japanese)
  14. Ryoichi Sasaki, Hiroshi Yoshiura, Satoru Tezuka, Hisanori Mishima,
    "Information Security I Internet Era" Kyoritsu, 2000 (Japanese)
  15. Ryoichi Sasaki,
    "Introduction to Internet Security" IWANAMI Shinsho. 1999 (Japanese)
  16. Ryoichi Sasaki, Takaragi Kazuo, Taketoshi Sakuraba, Masato terada, Nariyasu Hamada,
    "Internet Security" Ohmu Sya, 1996 (Japanese) (Best Author Award)
Return to top

Journal

  1. 1.Yoshio KAKIZAKI, Shiomi NISHIBIRO,Ryoichi SASAKI A Mixed Content Awareness Tool for Safe Browsing Journal of Computers vol. 13, no. 1, pp. 90-99 , 2018.
  2. Ryoichi Sasaki Proposal for a Risk Communication-Based Approach to IT Risk Journal of Disaster Research,Vol.12,No.5 2017 pp1040-1049
  3. MASAHIRO KUYAMA, YOSHIO KAKIZAKI, RYOICHI SASAKI Method for detecting a malicious domain by using only well-known information International Journal of Cyber-Security and Digital Forensics (IJCSDF) 5(4): 166-174 2016
  4. Yoshio Kakizaki,Takumi Akiyama,Kazuya Otani,Ryoichi Sasaki Online Accounts Management Method using Risk-based Approach Journal of Computer and Communications 2016,4,26-36
  5. Shota Fukushima and Ryoichi Sasaki Proposal and Evaluation of Method for Establishing Consensus on Combination of Measures Based on Cybersecurity Framework International Journal of Cyber-Security and Digital Forensics (IJCSDF) 5(3): 155-165 2016
  6. Takashi Shitamichi,Ryoichi Sasaki A Proposal and Evaluation of User Centric Trusted Log Archival Architecture International Journal of Cyber-Security and Digital Forensics (IJCSDF) 4(3): 442-452(ISSN: 2305-0012)2015
  7. Masaki Samejima, Ryoichi Sasaki Chance-Constrained Programming Method of IT Risk Countermeasures for Social Consensus Making IEEE TRANSACTIONS ON SYSTEMS, MAN, AND CYBERNETICS: SYSTEMS, VOL. 45, NO. 5, MAY 2015 pp725-733
  8. Naoki Kobayashi, Ryoichi Sasaki Proposal and evaluation of an evidence preservation method for use in a common number system Journal of Electronic Commerce Studies vol.6,no.1,pp51-68,2015
  9. Ichiro Matsunaga,Ryoichi Sasaki Development and Evaluation of a Continuity Operation Plan Support System for an Information Technology System International Journal of Cyber-Security and Digital Forensics (IJCSDF) 4(2): 327-338, 2015 (ISSN: 2305-0012)
  10. Takashi Shitamichi,Ryoichi Sasaki Technology of Federated Identity and Secure Loggings in Cloud Computing Environment International Journal of Electronic Commerce Studies Vol.5, No.1, pp. 39-62, 2014 doi: 10.7903/ijecs.1157
  11. Hayaki Ando,Yuusuke Inose,Hidetaka Masuda,Ryoichi Sasaki Proposal and Evaluation of Method for Automatically Extracting Useful Opinions Relating to Risk Communication in Micro-blogs Journal of Information Processing and Management, Vol.5,No.2, May, 2014,pp1-13
  12. Ryoichi Sasaki, Trial Application of the Multiple Risk Communicator to internal Control Problem International Journal of Information Processing and Management Vol.4,No.6,September,2013 pp40-49
  13. Shuhui Hou,Ryoichi Sasaki,Tetsutaro Uehara,Siuming Yiu Double Encryption for Data Authenticity and Integrity in Privacy-preserving Cofidential Forensic Investigation Journal of Wireless Mobile Networks,Ubiquitous Computing and Dependable Application Vol.4 NO.2 pp104-113 2013
  14. Shuhui Hou, Siuming Yiu,Tetsutaro Uehara,Ryoichi Sasaki, A Privacy-Preserving Approach for Collecting Evidence in Forensic Investigation InternationalJournal of Cyber-Security and Digital Forensics (IJCSDF) (Vol.2,No.1-pp70-78)2013
  15. Ryoichi Sasaki Consideration on Risk Communication for IT Systems and Development of Support Systems(Invited Paper) Journal of Information Processing Vo.20(2012)-4, pp814-822 (https://www.jstage.jst.go.jp/browse/ipsjjip/
  16. Ryoichi Sasaki,ShokoSugimoto,Hiroshi Yajima,Hidetaka Masuda,Hiroshi Yoshiura,Masaki Samejima Proposal for Social-MRC: Social Consensus Formation Support System Concerning IT Risk Countermeasures International Journal of Information Processing and ManagementVol.2,No.2Pp48-58 2011
  17. Jigang Liu,Tesutaroh Uehara,Ryoichi Sasaki Development of digital forensics practice and research in Japan Wireless Communications And Mobile Computing(Wiley InterScience) 2010 www.interscience.wiley.com
  18. Kunihiko Miyazaki, M Mitsuru Iwamura, Tsutomu Matsumoto, Ryoichi Sasaki, Hiroshi Yoshiura, Satoru Tezuka, Hideki Imai,
    " Digitally Signed Document Sanitizing Scheme with Disclosure Condition Control"
    EICE Transaction on Fundamentals of Electronics, Communications and Computer Sciences, vol. E88-A, no. 1, pp.239-246 Jan. 2005
  19. Tsutomu Nakamura, Nobuyuki Fujikura, Ryoichi Sasaki, Hiroshi Morita, Satoru Nishino, Hiroaki Takahashi, Akio Matsuura
    " Development and Performance Evaluation of Point to Multipoint Communication Control Scheme via Satellite"
    Performance Evaluation (An International Journal), Vol.12,No3, pp169-179, June 1991
  20. Kazuo Takaragi,Ryoichi Sasaki,Sadanori Singai,
    "A Probability Bounds Estimation Method in Markov Reliability Analysis",
    IEEE trans. on Reliability Vol R-3 5,No.3,pp257-261 1985
  21. Kazuo Takaragi,Ryoichi Sasaki,Sadanori Singai,
    "A Method of Rapid Markov Reliability Calculation",
    IEEE trans. on Reliability Vol R-35,No.3,pp262-268 1985
  22. Kazuo Takaragi,Ryoichi Sasaki,Sadanori Singai,
    "An Algorithm for Obtaining Simplified Prime Impricant Sets in Fault-Tree and Event-Tree Analysis",
    IEEE trans. on Reliability Vol R-32,No.4,pp386-390 1983
  23. Ryoichi Sasaki,Tateo Okada,Sadanori Shingai,
    "A New Technique to Optimize System Reliability",
    IEEE trans. on Reliability Vol R-32,No2,pp175-182 ,1983
  24. Kazuo Takaragi,Ryoichi Sasaki,Sadanori Singai,
    "An Improved Moment-Matching Algorithm for Evaluating Top-Event Probability Bounds",
    IEEE trans. on Reliability Vol R-31,No.1,pp45-48,1982

<Note>Papers written in Japanese are listed in
http://www.isl.im.dendai.ac.jp/res_lob/

Return to top

International conferences (refereed)

  1. Ryoichi Sasaki Digital Forensics in Japan IWIN2017 (International Workshop on Informatics)
  2. Ryota Suzuki, Atsuo Inomata, Ryoichi Sasaki Filtering Avoidance Using Web Translation Service and its Countermeasures The Third International Conference on Digital Security and Forensics (DigitalSec2016)Malaysia
  3. Masahiro Kuyama, Yoshio Kakizaki, Ryoichi Sasaki Method for Detecting a Malicious Domain by Using WHOIS and DNS Features The Third International Conference on Digital Security and Forensics (DigitalSec2016)Malaysia
  4. Tadashi Kimura, Ryoichi Sasaki Countermeasure against Drive by Download Attack by Analyzing Domain Information The Third International Conference on Digital Security and Forensics (DigitalSec2016)Malaysia
  5. Naoki Matsutaka, Masato Eguchi, Takuya Okazaki, Tahashi Matsumoto, Tetsutaro Uehara, Ryoichi Sasaki Proposal of Unified Data Management and Recovery Tool Using Shadow Copy The Third International Conference on Digital Security and Forensics (DigitalSec2016)Malaysia
  6. Ryo Aihara, Ryohei Ishii, Ryoichi Sasaki Proposal of an Improved Event Tree and Defense Tree Combined Method for Risk Evaluation with Common Events The Third International Conference on Digital Security and Forensics (DigitalSec2016)Malaysia
  7. Motoharu Sekine, Yuki Ashino, Shigeyoshi Shima, Yoshimi Teshigawara, Ryoichi Sasaki Development and Evaluation of a Dynamic Security Evaluation System for the Cloud System Operation The Third International Conference on Digital Security and Forensics (DigitalSec2016)Malaysia
  8. Shota Fukushima, Ryoichi Sasaki Application and Evaluation of Method for Establishing Consensus on Measures Based on Cybersecurity Framework The Third International Conference on Digital Security and Forensics (DigitalSec2016)Malaysia
  9. Hiroshi Horikawa,Hisamichi Ohtani,Yuji Takahashi,Takehisa Kato,Fumihiko Magata,Yoshimi Teshigawara,Ryoichi Sasaki,Masatatsu Nishigaki Delta ISMS model to enhance company-wide information security management using accident database:The concept WIN2016 (International Workshop on Informatics)
  10. Takumi Akiyama,Kuzaya Otani,Yoshio Kakizaki,Ryoichi Sasaki, Evaluation of a Risk-based Management Method for Online Accounts CyberSec 2015
  11. Naoto Nakagawa,Yoshimi Tshigawara,Ryoichi Sasaki, Development of Detection and Responding System for Malware Communications by Using Open Flow and Its Evaluation CyberSec 2015
  12. Makoto Sato,Ryoichi Sasaki,Akihiko Sugimoto,Naoki Hayashi,Yoshiaki Isobe Proposal of a Method for Identififying the Infection Route for Targeted Attacks Based on Malware Behavior in a Netwaork CyberSec 2015
  13. Ryouhei Koizumi,Ryoichi Sasaki, Study on Countermeasures using Mitigation Software against Vulnerability Attacks CyberSec 2015
  14. Kazuki Hashimoto, Hiroyuki Himura,Takashi Matsumoto,Kosetu Kayama,Yoshio Kakizaki,Hiroshi Yamaki, Ryoichi Sasaki,Tetsutaro Uehara Development of intellectual networks forensic system LIFT against targeted attacks yberSec2015
  15. Yifan Wang, Tetsutaro Uehara,Ryoichi Sasaki Fog Computing: Issues and Challenges in Security and Forensics COMPSAC2015
  16. Yuhei Umehara, Hayai Ando, Ryoichi Sasaki Proposal for combinatorial optimization technology in consideration of the dynamic characteristic of IT risks COMPSAC2015
  17. Syota Okayasu Ryoichi Sasaki Proposal and Evaluation of Methods using the Quantification Theory and Machine Learning for Detecting C&C Server used in a Botnet COMPSAC2015
  18. Takashi Shitamichi , Ryoichi Sasaki, User Centric Trusted Log Archival Architecture in Cloud Computing Environments The International Conference on Information Security and Cyber Forensics (InfoSec2014)
  19. Takamichi Amano, Tetsutaro Uehara and Ryoichi Sasaki Extension and Evaluation of Guideline Total Support System for Digital Forensics The International Conference on Information Security and Cyber Forensics (InfoSec2014)
  20. Satoshi Mimura, Ryoichi Sasaki Method for Estimating Unjust Communication Causes Using Network Packets Associated with Process Information The International Conference on Information Security and Cyber Forensics (InfoSec2014)
  21. Ichiro Matsunaga, Ryoichi Sasaki Development and trial application of a continuity operation plan support system for Information Technology System The International Conference on Information Security and Cyber Forensics (InfoSec2014)
  22. Makoto Sato, Yoshimi Teshigawara, Ryoichi Sasaki Proposal for Knowledge Model using RDF-based Service Control for Balancing Security and Privacy in Ubiquitous Sensor Networks IWIN(International Workshop on Informatics) 2014
  23. Naoki Kobayashi, Ryoichi sasaki Proposal and evaluation of safe and efficient log signature scheme for the preservation of evidence CFSE2014 Held in Conjunction with COMPSAC2014
  24. Hiroshi Yajima,Tomohiro Watanabe,Ryoichi Sasaki,Manabu Kurosawa,Noriko kando Information Acquisition Support for Decision-maker Using the Multiplex Risk Communicator System CINTI2013(14th International Symposium on Computational Intelligence and Informatics(Budapest,Hungary)
  25. Satoshi Ichikawa,Kazuhiro AIda,Ryoichi Sasaki Development and Evaluation of the Security Sugoroku Hybrid System for Information Security Education ATISR2013(台湾)
  26. Takamichi Amano,Wataru Takahashi,Tetsutaro Uehara,Ryoichi Sasaki Development and Evaluation of Guideline Total Support System for Supporting Evidence Preservation ATISR2013(台湾)
  27. Kazuki Wakai,Taisuke Okada,Yusuke Kamata,Ryoichi Sasaki Development and Evaluation of the Application Program ”LookUpper” to improve the Spam Discovery Function and Display Function of Twitter ATISR2013(台湾)
  28. Katsunori Sato, Masaki Samejima and Ryoichi Sasaki Chance-constrained Programming Method by Constraints Aggregation for Social Consensus Making on IT Risk Countermeasure in Proc. of 2013 IEEE Int. Conf. on Systems, Man & Cybernetics (SMC 2013), pp.4789-4793 (2013.10.13-16, Manchester, UK)
  29. Hiroshi Yajima,Tomohiro Watanabe,Ryoichi Sasaki,Manabu Kurosawa,Noriko Kando Information Acquisition Support for Decision-makers Using the Multiplex Risk Communicator System CINTI2013,14th IEEE International Symposium on Computional intelligence and Informatics (Budapest Hungary)
  30. Shushui Hou, Siuming Yui,Tetsutaro Uehara,Ryoichi Sasaki, Application of Secret Sharing Techniqres on Confidential Forensic Investigation SDIWC2013
  31. Sasaki,Wataru Takahashi,Tetsuro Uehara Development and Evaluation of Guideline Total Support System for Evidence Preservation by Using an Android Phone CFSE2013  in COPMSAC2013(Kyoto)
  32. Shushui Hou,Ryoichi Sasaki,Tetsutaro Uehara,Siuming Yui, Verifying Data Authenticity and Integrity in Server-Aided Confidential Forensic Investigation Asia ARES Coference held in conjunction with ICT -EurAsia 2013
  33. Keiichi Ichikawa, Hiroshi Yajima, Hidetaka Masuda, Ryoichi Sasaki, Visualization of the opinions of opinion leaders in risk communication using mind maps Second ATISR2012(台湾)
  34. Naoki Kobayashi, Ryoichi Sasaki Proposal and Evaluation of an Evidence Preservation Method for Use in a Common Number System Second ATISR2012(台湾)
  35. Takashi Shitamichi, Ryoichi Sasaki Technology of Federated Authentication and Attribute Usage in Cloud Computing Second ATISR2012(台湾)
  36. Ishizuka, Ryoichi Sasaki Development of Learning-Tool to Identify Vulnerabilities of Website and Their Measures in Form of Traning Second ATISR2012(台湾)
  37. Tomoya Sakamoto,Ryoichi Sasaki Proposal and Evaluation of Countermeasures Focused on Priority of an unjust RA Attack in the IPV6 Enviroment Second ATISR2012(台湾)
  38. Hayaki Ando,Hidetaka Masuda,Ryoichi Sasaki Development and Evaluation of Functions for Automatic Classification of Information in Social Consensus Formation Support Systems Second ATISR2012(台湾)
  39. Masaki Samejima,Ryoichi Sasaki Approximation Methode for Chance-Constrained Programming of Social Consensus Formation Concerning IT Risk Countermeasure 2012 IEEE International Conference on Systems,Man,and Cybernetics
  40. TakashiSakuma,RyouichiSasaki, Proposal and evaluation of the digital certificate system with sumi-coating module for privacy protection CFSE2012(in Turkey
  41. HitoshiFumikura,TetsuroKobayashiRyouichi Sasaki, Statistical analysis and consideration of personal information leakage from the viewpoint of locality IC4E2012(Hongkong)
  42. Yuta Homma,MasatoshiKawakami,RyoichiSsaki Development of a Support Tool for Introducing a Filtering Service into a Personal Compute IC4E2012(Hongkong)
  43. TakashiShitamichi,RyoichiSasaki Development and Application of MRC-Lite to Support Easily Multiple Risk Communication IC4E2012(Hongkong)
  44. WataruTakahashi,RyoichiSasaki,TetsutaroUehara Development of an Application Program to Help Evidence Preservation by Using an Android Mobile Phone IC4E2012(Hongkong)
  45. Masaru Ohkawara, Kazusige Takakusaki, Hiroshi Yajima, Hidetaka Masuda, Ryouichi Sasaki, Tetsuro Kobayashi Application of Social Consensus Support System for IT Risk Measure”Social-MRC” to The Information Filtering Issue for Children IC4E2012(Hongkong)International Proceeding of IC4E2012
  46. Tatsuya Tanaka,Toshifumi Kai,Yusuke Tamura,Ryoichi Sasaki, efaced Sites Automatic Detection System DICE IIHMSP2011(in China)
  47. Ryoichi Sasaki, Security Measures under Environmental Changes Japan-ASEAN2011
  48. Takashi Uemura,Yusuke Kosuda,Shota takagi,Ryoichi Sasaki, A proposed Web access control system RequestPolicyFramework for cooperation of DNS and a Web browser FARES2011 in 2011Sixth International Conference on Availability,Reliability and Security (in Austria) pp549-554
  49. Ryoichi Sasaki,KazushigeTakakusaki,MasaruOhkawa,Hiroshi Yajima,Hidetaka Masuda,Tetsuro Kobayashi Development and Application of Prototype Program for” Social-MRC”: Social Consensus Formation Support System Concerning IT Risk Countermeasures FARES2011 in 011Sixth International Conference on Availability,Reliability and Security(in Austria)pp499-506
  50. Naoki Masashige,Ryoichi Sasaki,Hironori Koyama Proposal and Evaluation of Sound Storage Authentication System for the Visually Impaired ICIMT2010(HongKong)
  51. Koji Hasebe,Ryoichi Sasaki High-Grade Anti-Tamper Equipment for privacy protection in epidemiology investigation that use data from multiple organization ICIMT2010(HongKong)
  52. Hiromu Hijikata,Ryoichi Sasaki Communicator for consensus on personal information leakage measures considering digital forensics ICIMT2010(HongKong)
  53. Ryoichi Sasaki,Naoko Sugimoto,Hiroshi Yajima,Hidetaka Masuda,Hiroshi Yoshiura,Masaki Samejima,Motohisa Funahashi Proposal for a Social-MRC Social Consensus Formation Support System Concerning IT Risk Countermeasures IMS2010(Korea) Pp60-66
  54. Ryochi Sasaki How we should deal with “Risk vs.Risk” issues in CIIP? -Considering tradeoffs between risks- Medidian 2010(台湾)
  55. Ryochi Sasaki Development and Application of a Multiple Risk Communicator with its Future Direction Japan-Austria Joint Workshop
  56. Yui Sakurai,Yuki Ashino, Tetsutaro Uehara,Hiroshi Yoshiura,Ryouichi Sasaki HiGATE(High Grade Anti-Tamper Equipment)Prototype and Application to e-Discovery ADFSL2010
  57. Masatoshi Kawakami,HiroshiYasuda, Ryoichi Sasaki Development of an E-Learning Content-Making System for Information Security (ELSEC) and Its Application to Anti-Phishing Education 2010 International Conference on e-Business, e-Management and e-Learning pp7-11
  58. Maiko Furusawa, Daisuke Suzuki, Yuuki Ashino, Ryoichi Sasaki
    "Development of a system using the APIHook function to protect personal information leakage from USB memory"
    IWISA2009 in Korea (International Workshop on Information Security and Assurances ).
  59. Masanori Murakami, Toshifumi Kai, Hiroshi Irie, Ryoichi Sasaki
    "Extension and Evaluation of IP Traceback Method Using Departure Stamp in Edge Router"
    F2GC2009 in Korea (Forensics for Future Generation Communication environment)
  60. Yusuke Kosuda, Ryoichi Sasaki,
    "Proposal and Implementation of SSH Client System Using Ajax"
    I3E2009 (in France)
  61. Hirokazu Manabe, Yuta Yamakawa, Tomohiro Sasamoto, Ryoichi Sasaki,
    "Security Evaluation of Biometrics Authentications for Cellular Phones"
    IIHMSP2009 The Fifth International conference on Intelligent Information Hiding and Multimedia Signal Processing (in Kyoto)
  62. Koushou Yoshioka, Tatsuo Yoshida, Ryoichi Sasaki,
    "Proposal and evaluation of a high-speed data erasure method for mass storage devices"
    JWIS: Joint Workshop on Information Security 2009 (in Taiwan)
  63. Yuki Ashino, Keisuke Fujita, Maiko Furusawa, Tetsuro Uehara, Ryoichi Sasaki,
    "Extension and Evaluation of Boot Control for a Digital Forensic System"
    ICDF2009 (in Florida) 5th Annual IFIP WG11.9 International Conference on Digital Forensics
  64. Mitsuhiro Taniyama, Yuu Hidaka, Masato Arai, Satoshi Kai, Hiromi Igawa, Hiroshi Yajima Ryoichi Sasaki,
    "Application of "Multiple Risk Communicator" to Personal Information Leakage Problem"
    SSCS2008(The Fifth International Conference on Security and Safety of Complex Systems)
  65. Kenshi Uematsu, Ryoichi Sasaki,
    "A proposal of Falsiffication Detection System in Structural Design",
    IIHMSP2008 The Fourth International conference on Intelligent Information Hiding and Multimedia Signal Processing (in China)
  66. Ryoichi Sasaki, Yuu Hidaka, Takasi Moriya, Mmituhiro Taniyama, Hiroshi Yajima,Kiyomi Yaegashi, Yasumasa Kawashima, Hiroshi Yoshiura,
    "Development and applications of a multiple risk communicator"
    Sixth International Conference on RISK ANALYSIS 2008(in Greece)
  67. Mitsuhiro Taniyama, Ryoichi Sasaki,
    "Analysis of the Y2K problem from the viewpoint of risk communication" Sixth International Conference on RISK ANALYSIS 2008 (in Greece)
  68. Yasuo Hatano, Kunihiko Miyazaki, Mitsuru Iwamura, Tsutomu Matsumoto, Ryoichi Sasaki, Hiroshi Yoshiura, Yoshinori Honda,
    "Novel Criterion Based on Log Inflation for Fraudulent Audit Log Preservation" ICDF2008(in Kyoto) 4th Annual IFIP WG11.9 International Conference on Digital Forensics
  69. Keisuke Fujita, Yuki Ashino, Tetsuro Uehara, Ryoichi Sasaki,
    "Proposal of Digital Forensic System with a Boot Control Function against Unauthorized Programs " ICDF2008(in Kyoto) 4th Annual IFIP WG11.9 International Conference on Digital Forensics
  70. Mitsuyuki Takatsuka, Masataka Tada, Ryoichi Sasaki,
    "Proposal of the e-Discovery System for Sanitizing Disclosure Information and for Securing Evidenc" F2GC2007 in Korea) The 2007 International Workshop on Forensics for Future Generation Communication Environment
  71. Mariko Irisawa, Yuki Ashino, Keisuke Fujita, Ryoichi Sasaki,
    "Development and Application of Digital Forensic Logging System for Data from a Keyboard and Camera" IIHM2007 in Taiwan (The Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing)
  72. Yuki Ashino, Ryoichi Sasaki,
    "Proposal of Digital Forensic System Using Security Device and Hysteresis Signature" IIHM2007 in Taiwan (The Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing)
  73. Masataka Tada, Mitsuyuki Takatsuka, Takanobu Masubuchi, Ryoichi Sasaki,
    " Proposal of a Whistleblower Protection System to Prevent the Exposure of an Accuser from Signing an Indictment Document" 7th IFIP Conference e-Commerce, e-Business, and e-Government (I3E 2007 in China)
  74. Hiroshi Yajima, Tomohiro Watanabe, Ryoichi Sasaki,
    " Supportn System for Decision Maker in Multiplex Risk Communicator" 12TH ETFA 12th IEEE International Conference on Emerging Technologies and Factory Automation pp255-pp260, 2007
  75. Hiroshi Yajima, Tomohiro Watanabe, Ryoichi Sasaki "Evaluation of the Participant-Support Method for Information Acquisition in the "Multiplex Risk Communicator"" 12th International Conference on Human- Computer Interaction pp195-pp203, 2007
  76. Takanobu Masubuchi, Mitsuyuki Takatsuka, Ryoichi Sasaki,
    "A Digital Document Flexible Snitizing Schheme" IIHMSP2006: IEEE International Conference on Intelligent Information Hiding and Multimedia Signal Processing 2006
  77. Satoshi Seki, Ryoichi Sasaki, Mitsuru Iwamura, Hiroshi Motosugi,
    "Epidemiologic Approach against Computer Viruses - Application of a model of measures against mass - mail viruses" IWSEC2006(1st International Workshop on Security)Short Papers PP37-44 October 23-24 2006
  78. Kenji Yasu, Yasuhiko Akahane, Masashi Ozaki, Koji Semoto, Ryoichi Sasaki,
    "Development and Evaluation of a System for Checking for Improper Sending of Personal Information in Encrypted E-mail", 5th IFIP Conference e-Commerce, e-Business, and e-Government (I3E 2005)"Challenges of Expanding e-Commerce, e-Business, and e-Government" Springer pp203-217
  79. Ryoichi Sasaki, Saneyuki Ishii, Yuu Hidaka, Hiroshi Yajima, Hiroshi Yoshiura, Yuuko Murayama,
    "Development Concept for and Trial Application of a " Multiple Risk Communicator"" 5th IFIP Conference e-Commerce, e-Business, and e-Government (I3E 2005)"Challenges of Expanding e-Commerce, e-Business, and e-Government" Springer pp203-217
  80. Yusuke Ueda, Ryoichi Sasaki, Hiroshi yoshiura, Seichi Susaki, Kunihiko miyazaki,
    "Evaluation of Total Cost in Hysteresis Sigature Systems" IWAP2004(in Fukuoka) Proceeding pp60-71,2004
  81. Hiroshi Yoshiura, Ryoichi Sasaki, Kazuo Takaragi,
    "Secure Fingerprinting Using Public - Key Cryptography", The 1998 Cambridge International Workshop on Security Protocols 1998 (in Cambridge)
  82. Hiroshi Yoshiura, Seiichi Susaki, Yasuhiko Nagai, Tsukasa Saito, Ryoichi Sasaki, Satoru Tezuka,
    "INTERNET-MARKS : Clear, Secure, and Portable Marks for Cyber Worlds", The 1999 Cambridge International Workshop on Security Protocols 1999 (in Cambridge )
  83. Satoru Tezuka, Ryoichi Sasaki, Masahiko Kataoka,
    "Seamless Object Authentication in Different Security Policy Domains " Thirty-third Hawaii International Conference on System Sciences (HICSS-33).2000
  84. Ryoichi Sasaki
    "An Evaluation Model on Optimal Allocation of Emergency Ambulances in Hiroshima City - Considering Equality and Efficiency ",Operational Research '75 (1975) <National Contribution Paper>
  85. Ryoichi Sasaki, Ryozo Tsuruoka, Koichi Haruna,
    "A Combinatorial OptimizationMethod of Systems with Fuzzy Objectives and Uncertain Parameters and Its Application",ICCS'78 pp715-719
  86. Ryoichi Sasaki, Kenji Tominaga, Kazuo Takaragi, Sadanori Shingai,
    "Development Computer Program to Assist Event Tree Analysis ", American Nuclear Society 1979 Annual Meeting
  87. Yoshio Tsuji, Keizo Nukada, Masakazu Honma, Ryoichi Sasaki,
    "Approachability Analysis(APA)", 1981 Proc. of Reliability and Maintainability Symposium pp1-7
  88. Ryoichi Sasaki, Sadanori Singai, Katsushige Onodera,
    "Two Level Allocation Method of System Reliability", 1983 Proc. of Reliability and Maintainability Symposium pp78-83
  89. Tsutomu Nakamura,Kousuke Shinnai,Ryoichi Sasaki,Nobuyuki Fujikura,
    "Applications of a Store-and-Forward Network Simulator for Analysis of Optimal Message Lengths for File Transfer via Satellite and Terrestrial Links" ICC'87,(June7-10,1987)8.6.1-8.6.8
  90. Kousuke Shinnai,Tsutomu Nakamura,Ryoichi Sasaki,Nobuyuki Fujikura,
    "Sensitivity Analysis of Optimal Message Lengths for File Transfer via Satellite and Terrestrial Links" ICC'88,(June12-15 1988)
  91. Kousuke Shinnnai,Ryoichi Sasaki,Michi Suzuki,Sadao Niinobe,
    "An Expert System for Failure Diagnosis of High Speed Digital Network"NOMS '90 PP14.4-1〜10
  92. Ryoichi Sasaki, Tutomu Nakamura, Michio Suzuki, Takashi Kagei,
    "OptimizationMethod for Reconfiguration of High Speed Network under Transit Trunk Failure Conditions", Fourth International Conference on Data Communication Systems and their Performance (1990)
  93. Tsutomu Nakamura, Nobuyuki Fujikura, Ryoichi Sasaki, Hiroshi Morita, Satoru Nishino, Hiroaki Takahashi, Akio Matsuura
    "Development and Performance Evaluation of Point to Multipoint Communication Control Scheme via Satellite" Fourth International Conference on Data Communication Systems and their Performance (1990) (One of Best Papers)
  94. Michio Suzuki,Ryoichi Sasaki,Yasuhiko Nagai,Keizoh Mizuguchi,Masato Saito,Hidehiko Kobayashi "Development of Integrated Network Management System NETM Based OSI Standard ",Proc. of the IFIP TC6/WG6.6 Second International Symposium on Integrated Network Management pp189-200 1-5 April 1991
Return to top

Invited Talks

  1. Ryoichi Sasaki
    "Approach to IT risks - Considering Privacy and Security -", First International Privacy and Security Conference (Nov.2008)Japan
  2. Ryoichi Sasaki
    "Security Technologies and their Applications to Electronic Commerce in Japan", Conference on Multilateral Security in Communications, Invited Talk (July, 1999)Germany
  3. Ryoichi Sasaki
    "Security Requirements and Countermeasures in Japan in the Electronic Commerce Era", VIS' 97 (Reliable Information System Conference in Germany) Invited Talk (1997) Germany

<Note>Invited Talks in Japanese are listed in
http://www.isl.im.dendai.ac.jp/res_lob/

Return to top

Prizes

  1. Certification from the Institute of Electronics, Information and Communication as a milestone: Feat "Researches of Digital Forensics and IT Risk Studies" 2017
  2. Awards from Minister for Internal Affairs and Communications in 2017
  3. Contribution award from the Society of Security Management 2016
  4. Invitation to the party to see the cherry blossoms with the prime minister 2016,2017
  5. Best Paper Award in The International Conference on Information Security and Cyber Forensics (InfoSec2014) with Mr. Ichiro Matsunaga 2014
  6. Society Activity Contribution Award from Information Processing Society 2014
  7. Invitation to the autumn garden party organized by the Emperor, 2012
  8. Best Paper Award at Information Processing Society's DICOMO 2010, 2010
  9. AWARD for the contribution to Information Processing Society of Japan in 2009
  10. AWARD for the contribution to CULTURE of SECURITY from Information Security University in 2009
  11. AWARD for the contribution to Security from the Cabinet Secretariat in 2008
  12. AWARD from Minister for Internal Affairs and Communications in 2007
  13. Best Paper Award from Information Processing Society of Japan in 2002
  14. Best Author Award of the Institute of Electrical Engineering Society of Japan in 1998
  15. Best Paper Award of the Institute of Electrical Engineering Society of Japan in 1983
Return to top

Some Professional Activities

  1. Part-time director of Japan Agency for Local Authority Information Systems from 2014
  2. Chair of Institute of Digital Forensics from 2011 to 2017
  3. Chair of Japan society of Security management from 2008 to 2016
  4. General Chair of F2GC 2009 (The 2009 International Workshop on Forensics for Future Generation Communication environments) in Korea
  5. General Chair of I3E 2008 (IFIP 8th International Conference on e-Commerce, e-Business, and e-Government) in Japan
  6. General Chair of ICDF 2008(IFIP Fourth Digital Forensics Conference) in Japan
  7. General Chair of SEC 2005 (IFIP 20th International Information Security Conference) in Japan
  8. Chair of Japan Society of Security Management (From 2008)
  9. Chief Director of Information Network Law Association Japan (From 2007)
  10. Director of Information Processing Society of Japan (From 2003 to 2005)
  11. IFIP TC11 Representative from Japan (From 2001 to 2006)
  12. IFIP TC11 Additional Representative from Japan (From 2006)
  13. Member of Science Council of Japan (From 2007)
  14. Editor of International Journal of Information Security (From 2007)
  15. Member of CRYPTREC(http://www.cryptrec.go.jp/english/index.html) (From 2001)
  16. Chair of the Committee for Security Technology Strategy in NISC (National Information Security Center), Cabinet Secretariat (From 2006)
  17. Member of Security Advisory Committee of Setagaya (From 20059
Return to top

Other activities

  1. Member of Japan P.E.N. Club(http://www.japanpen.or.jp/en/) (From 2008)
  2. Chair of Japan Network Security Association (http://www.jnsa.org/en/aboutus/) (From 2007)
  3. Representative Director of E-PARTS (NPO)(From 2002)
Return to top
Copyright (C) 2009 Information Security Laboratory, All rights reserved.
omo