default search action
Yasunori Ishihara
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2020
- [j14]Yasunori Ishihara, Takashi Hayata, Toru Fujiwara:
The Absolute Consistency Problem for Relational Schema Mappings with Functional Dependencies. IEICE Trans. Inf. Syst. 103-D(11): 2278-2288 (2020) - [c28]Yasunori Ishihara:
Toward Appropriate Data Publishing in Relational Data Exchange Framework. SFDI/LSGDA@VLDB 2020: 131-137 - [c27]Yasuhito Asano, Zhenjiang Hu, Yasunori Ishihara, Makoto Onizuka, Masato Takeichi, Masatoshi Yoshikawa:
Data Integration Models and Architectures for Service Alliances. SFDI/LSGDA@VLDB 2020: 152-164 - [c26]Makoto Onizuka, Yasunori Ishihara, Masato Takeichi:
Towards Smart Data Sharing by Updatable Views. SFDI/LSGDA@VLDB 2020: 165-171
2010 – 2019
- 2019
- [c25]Yasuhito Asano, Dennis-Florian Herr, Yasunori Ishihara, Hiroyuki Kato, Keisuke Nakano, Makoto Onizuka, Yuya Sasaki:
Flexible Framework for Data Integration and Update Propagation: System Aspect. BigComp 2019: 1-5 - [c24]Yasuhito Asano, Zhenjiang Hu, Yasunori Ishihara, Hiroyuki Kato, Makoto Onizuka, Masatoshi Yoshikawa:
Controlling and Sharing Distributed Data for Implementing Service Alliance. BigComp 2019: 1-4 - [c23]Yasunori Ishihara, Hiroyuki Kato, Keisuke Nakano, Makoto Onizuka, Yuya Sasaki:
Toward BX-Based Architecture for Controlling and Sharing Distributed Data. BigComp 2019: 1-5 - [i4]Soichiro Hidaka, Yasunori Ishihara, Zachary G. Ives:
Proceedings of the Third Workshop on Software Foundations for Data Interoperability (SFDI2019+), October 28, 2019, Fukuoka, Japan. CoRR abs/1911.05900 (2019) - 2018
- [i3]Yasuhito Asano, Soichiro Hidaka, Zhenjiang Hu, Yasunori Ishihara, Hiroyuki Kato, Hsiang-Shang Ko, Keisuke Nakano, Makoto Onizuka, Yuya Sasaki, Toshiyuki Shimizu, Kanae Tsushima, Masatoshi Yoshikawa:
A View-based Programmable Architecture for Controlling and Integrating Decentralized Data. CoRR abs/1803.06674 (2018) - [i2]Yasuhito Asano, Soichiro Hidaka, Zhenjiang Hu, Yasunori Ishihara, Hiroyuki Kato, Hsiang-Shang Ko, Keisuke Nakano, Makoto Onizuka, Yuya Sasaki, Toshiyuki Shimizu, Van-Dang Tran, Kanae Tsushima, Masatoshi Yoshikawa:
Making View Update Strategies Programmable - Toward Controlling and Sharing Distributed Data -. CoRR abs/1809.10357 (2018) - 2017
- [j13]Yasunori Ishihara:
Foreword. IEICE Trans. Inf. Syst. 100-D(8): 1647-1648 (2017) - [c22]Hiroyuki Kato, Yasunori Ishihara, Torsten Grust:
DDO-Free XQuery. DBPL 2017: 4:1-4:13 - [c21]Yuuji Furuta, Naoto Yanai, Masashi Karasaki, Katsuhiko Eguchi, Yasunori Ishihara, Toru Fujiwara:
Towards Efficient and Secure Encrypted Databases: Extending Message-Locked Encryption in Three-Party Model. DPM/CBT@ESORICS 2017: 55-69 - 2016
- [j12]Kenji Hashimoto, Ryuta Sawada, Yasunori Ishihara, Hiroyuki Seki, Toru Fujiwara:
Determinacy and Subsumption of Single-Valued Bottom-Up Tree Transducers. IEICE Trans. Inf. Syst. 99-D(3): 575-587 (2016) - [c20]Kento Takahashi, Yasunori Ishihara:
Formalizations of secrecy of encrypted databases against realistic attackers. ISITA 2016: 423-427 - 2015
- [j11]Yasunori Ishihara, Yasuhiro Ushirozako, Kengo Mori, Jun Furukawa:
A Secrecy Criterion for Outsourcing Encrypted Databases Based on Inference Analysis. IEICE Trans. Inf. Syst. 98-D(6): 1161-1165 (2015) - [j10]Hiroyuki Kato, Soichiro Hidaka, Zhenjiang Hu, Keisuke Nakano, Yasunori Ishihara:
Context-preserving XQuery fusion. Math. Struct. Comput. Sci. 25(4): 916-941 (2015) - [j9]Hayato Kuwada, Kenji Hashimoto, Yasunori Ishihara, Toru Fujiwara:
The consistency and absolute consistency problems of XML schema mappings between restricted DTDs. World Wide Web 18(5): 1443-1461 (2015) - 2014
- [c19]Yasunori Ishihara, Hayato Kuwada, Toru Fujiwara:
The Absolute Consistency Problem of XML Schema Mappings with Data Values between Restricted DTDs. DEXA (1) 2014: 317-327 - 2013
- [c18]Hayato Kuwada, Kenji Hashimoto, Yasunori Ishihara, Toru Fujiwara:
The Consistency and Absolute Consistency Problems of XML Schema Mappings between Restricted DTDs. APWeb 2013: 228-239 - [c17]Kenji Hashimoto, Ryuta Sawada, Yasunori Ishihara, Hiroyuki Seki, Toru Fujiwara:
Determinacy and Subsumption for Single-Valued Bottom-Up Tree Transducers. LATA 2013: 335-346 - [c16]Yasunori Ishihara, Nobutaka Suzuki, Kenji Hashimoto, Shougo Shimizu, Toru Fujiwara:
XPath Satisfiability with Parent Axes or Qualifiers Is Tractable under Many of Real-World DTDs. DBPL 2013 - [i1]Ryo Iwase, Yasunori Ishihara, Toru Fujiwara:
Toward Security Verification against Inference Attacks on Data Trees. CoRR abs/1312.4833 (2013) - 2012
- [j8]Kenji Hashimoto, Hiroto Kawai, Yasunori Ishihara, Toru Fujiwara:
Decidability of the Security against Inference Attacks Using a Functional Dependency on XML Databases. IEICE Trans. Inf. Syst. 95-D(5): 1365-1374 (2012) - [c15]Kiyoshi Kiyokawa, Masahide Hatanaka, Kazufumi Hosoda, Masashi Okada, Hironori Shigeta, Yasunori Ishihara, Fukuhito Ooshita, Hirotsugu Kakugawa, Satoshi Kurihara, Koichi Moriyama:
Owens Luis - A context-aware multi-modal smart office chair in an ambient environment. VR 2012: 1-4 - [c14]Hironori Shigeta, Junya Nakase, Yuta Tsunematsu, Kiyoshi Kiyokawa, Masahide Hatanaka, Kazufumi Hosoda, Masashi Okada, Yasunori Ishihara, Fukuhito Ooshita, Hirotsugu Kakugawa, Satoshi Kurihara, Koichi Moriyama:
Implementation of a smart office system in an ambient environment. VR 2012: 1-2 - [c13]Yasunori Ishihara, Kenji Hashimoto, Shougo Shimizu, Toru Fujiwara:
XPath satisfiability with downward and sibling axes is tractable under most of real-world DTDs. WIDM 2012: 11-18 - 2011
- [j7]Yasunori Ishihara:
Foreword. IEICE Trans. Inf. Syst. 94-D(5): 945 (2011) - [c12]Kenji Hashimoto, Yohei Kusunoki, Yasunori Ishihara, Toru Fujiwara:
Validity of Positive XPath Queries with Wildcard in the Presence of DTDs. DBPL 2011 - 2010
- [c11]Hiroyuki Kato, Soichiro Hidaka, Zhenjiang Hu, Keisuke Nakano, Yasunori Ishihara:
Context-Preserving XQuery Fusion. APLAS 2010: 255-270 - [c10]Yasunori Ishihara, Shougo Shimizu, Toru Fujiwara:
Extending the Tractability Results on XPath Satisfiability with Sibling Axes. XSym 2010: 33-47
2000 – 2009
- 2009
- [j6]Kenji Hashimoto, Kimihide Sakano, Fumikazu Takasuka, Yasunori Ishihara, Toru Fujiwara:
Verification of the Security against Inference Attacks on XML Databases. IEICE Trans. Inf. Syst. 92-D(5): 1022-1032 (2009) - [c9]Yasunori Ishihara, Takuji Morimoto, Shougo Shimizu, Kenji Hashimoto, Toru Fujiwara:
A Tractable Subclass of DTDs for XPath Satisfiability with Sibling Axes. DBPL 2009: 68-83 - 2008
- [j5]Akinari Yamaguchi, Shougo Shimizu, Yasunori Ishihara, Toru Fujiwara:
Bag-based data models for incomplete information and their closure properties. J. Intell. Inf. Syst. 30(2): 115-135 (2008) - [c8]Kenji Hashimoto, Fumikazu Takasuka, Kimihide Sakano, Yasunori Ishihara, Toru Fujiwara:
Verification of the Security Against Inference Attacks on XML Databases. APWeb 2008: 359-370 - 2007
- [j4]Yasunori Ishihara, Toshiyuki Morita, Hiroyuki Seki, Minoru Ito:
An equational logic based approach to the security problem against inference attacks on object-oriented databases. J. Comput. Syst. Sci. 73(5): 788-817 (2007) - 2005
- [j3]Yasunori Ishihara, Shuichiro Ako, Toru Fujiwara:
Security against Inference Attacks on Negative Information in Object-Oriented Databases. IEICE Trans. Inf. Syst. 88-D(12): 2767-2776 (2005) - [c7]Kenji Hashimoto, Yasunori Ishihara, Toru Fujiwara:
Schema update operations preserving the expressive power in XML databases. ICDE Workshops 2005: 1229 - 2004
- [j2]Yasunori Ishihara, Shin Ishii, Hiroyuki Seki, Minoru Ito:
Temporal Reasoning about Two Concurrent Sequences of Events. SIAM J. Comput. 34(2): 498-513 (2004) - [c6]Yasunori Ishihara, Yumi Shimakawa, Toru Fujiwara:
Type Inferability and Decidability of the Security Problem Against Inference Attacks on Object-Oriented Databases. ICICS 2004: 145-157 - 2002
- [c5]Yasunori Ishihara, Shuichiro Ako, Toru Fujiwara:
Security against Inference Attacks on Negative Information in Object-Oriented Databases. ICICS 2002: 49-60 - 2001
- [j1]Yasunori Ishihara, Shougo Shimizu, Hiroyuki Seki, Minoru Ito:
Refinements of Complexity Results on Type Consistency for Object-Oriented Databases. J. Comput. Syst. Sci. 62(4): 537-564 (2001)
1990 – 1999
- 1999
- [c4]Yasunori Ishihara, Toshiyuki Morita, Minoru Ito:
The Security Problem against Inference Attacks on Object-Oriented Databases. DBSec 1999: 303-316 - 1997
- [c3]Yasunori Ishihara, Hiroyuki Seki, Minoru Ito:
Type-Consistency Problems for Queries in Object-Oriented Databases. ICDT 1997: 364-378 - 1995
- [c2]Hiroyuki Seki, Yasunori Ishihara, Minoru Ito:
Authorization Analysis of Queries in Object-Oriented Databases. DOOD 1995: 521-538 - 1993
- [c1]Yasunori Ishihara, Hiroyuki Seki, Tadao Kasami:
A translation method from natural language specifications into formal specifications using contextual dependencies. RE 1993: 232-239
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:19 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint