Faculty Members

takata-yoshiaki-1.jpg

Associate Professor
TAKATA, Yoshiaki

Ph.D., Osaka University, Japan, 1997

  • Year of birth: 1969
  • Gender: Male
  • Affiliation:
    - School of Information
    - Information Systems Engineering Course, Department of Engineering, Graduate School of Enginering
    - Infomatics Course, Department of Engineering, Graduate School of Enginering
Areas of specialization Software verification and analysis
Laboratory/research office Software Verification and Analysis Laboratory
As computers are more and more widely utilized, software defects have a greater and greater influence on our daily life. Software that seems to have no defect may sometimes cause trouble when several rare events occur simultaneously. In this laboratory, we study (a) methodologies for verifying the functional correctness of software and (b) specification languages for the logical verification of software systems.
Current reseach topics Model checking of programs with language-based access control Access control models for XML databases
Educational background 1997: Doctor
Professional background 2001-2007: 
1997-2007: 
Licenses
Academic societies

You can see the continuation of the table with a side swipe.

Courses

* Courses provided in English are shown with (E) mark

Undergraduate school
  • Information Science 2
  • Software Engineering
  • Laboratory Work on Information Technology 2
  • Seminars on the School of Information
  • Project Research 1
  • Graduation Thesis
  • Project Research 2
  • Project Research 3
  • Software Engineering Project
  • Guide to the School of Information
  • Outline of Engineering
Graduate school
  • Individual Work for Graduate
  • Advanced Seminar 1
  • Advanced Seminar 2
  • Theory of Computation
  • Seminar on Infomatics I
  • Seminar on Infomatics II

You can see the continuation of the table with a side swipe.

Research activities

Research papers
  1. Authors: LAMILLA ALVAREZ Pablo, TAKATA Yoshiaki
    Title: A Formal Verification of a Subset of Information-Based Access Control Based on Extended Weighted Pushdown System
    Journal: IEICE Transactions on Information and Systems, Vol. E97-D, No. 5, pp. 1149-1159
    Year: 2014
  2. Authors: Yoshiaki Takata, Hiroyuki Seki
    Title: Automatic Generation of History-Based Access Control from Information Flow Specification
    Journal: 8th International Symposium on Automated Technology for Verification and Analysis (ATVA 2010), Lecture Notes in Computer Science 6252, pp. 259-275
    Year: 2010
  3. Authors: Yoshiaki Takata, Hiroyuki Seki
    Title: Comparison of the Expressive Power of Language-based Access Control Models
    Journal: IEICE Transactions on Information and Systems, Vol. E92-D, No. 5, pp. 1033-1036
    Year: 2009
  4. Authors: Yoshiaki Takata, Hiroyuki Seki
    Title: Formal Language Theoretic Approach to the Disclosure Tree Strategy in Trust Negotiation
    Journal:  IEICE Transactions on Information and Systems, Vol. E92-D, No. 2, pp. 200-210
    Year: 2009
  5. Authors: Hisashi Mohri, Ikuya Yasuda, Yoshiaki Takata, Hiroyuki Seki
    Title: New Certificate Chain Discovery Methods for Trust Establishment in Ad Hoc Networks and Their Evaluation
    Journal: 情報処理学会論文誌, Vol. 49, No. 1, pp. 362-374
    Year: 2008
  6. Authors: Isao Yagi, Yoshiaki Takata, Hiroyuki Seki
    Title: A Labeled Transition Model A-LTS for History-Based Aspect Weaving and Its Expressive Power
    Journal: IEICE Transactions on Information and Systems, Vol. E90-D, No. 5, pp. 799-807
    Year: 2007
  7. Authors: Isao Yagi, Yoshiaki Takata, Hiroyuki Seki
    Title: A Static Analysis using Tree Automata for XML Access Control
    Journal: コンピュータソフトウェア, Vol. 23, No. 3, pp. 51-65
    Year: 2006
  8. Authors: Jun Noda, Mie Takahashi, Itaru Hosomi, Hisashi Mouri, Yoshiaki Takata, Hiroyuki Seki
    Title: Integrating Presence Inference into Trust Management for Ubiquitous Systems
    Journal: 11th ACM Symposium on Access Control Models and Technologies (SACMAT 2006), pp. 59-68
    Year: 2006
  9. Authors: Jing Wang, Yoshiaki Takata, Hiroyuki Seki
    Title: HBAC: A Model for History-based Access Control and Its Model Checking
    Journal: 11th European Symposium On Research In Computer Security (ESORICS 2006), Lecture Notes in Computer Science 4189, pp. 263-278
    Year: 2006

You can see the continuation of the table with a side swipe.

Social activities

You can see the continuation of the table with a side swipe.