24th CSEC Group Meeting

Date
March 04, 2004
March 05, 2004

Location
Tokai University Access MAP (Japanese)
Hiratsuka, Kanagawa 259-1292, JAPAN (Japanese)

Transportation
Toukai University Mae (Odakyu Line)


24th CSEC Group Meeting Program
(1) A Proposal of Hierarchical Secure Database Construction Technique
Shuji Yamazaki (Graduate school of system information science, Future University-Hakodate)
Yohtaro Miyanishi (Graduate school of system information science, Future University-Hakodate)

Recently, computer and computer network technologies have been developed rapidly, and individual information and company secret are flowing on the Internet. According to it, the technology of the illegal intruder to networks, such as a cracker, and a destroyer also progresses, and a crime is turning wicked. Therefore, security is becoming important, in order to prevent tapping or alteration etc. Moreover, the personnel system of a company etc. is the hierarchical database with which only in person and a superior can see data, and security is important also here. Then, in this paper, we propose construction technique of the hierarchical database of high security when creating a hierarchical database, using encryption program called PGP, it performs not only access control but also data authentication and data protection and data decision.

(2) A User Initiative Content Exchange Method for Secure Peer-to-Peer System
Yoshiharu IMAMOTO (Department of Instrumentation(Information), Faculty of Science and Technology, Keio University)
Shin-ya MATUMOTO (Department of Instrumentation(Information), Faculty of Science and Technology, Keio University)
Hiroshi SHIGENO (Department of Instrumentation(Information), Faculty of Science and Technology, Keio University)
Kenichi OKADA (Department of Instrumentation(Information), Faculty of Science and Technology, Keio University)

Peer-to-peer systems have the feature that distributes contents autonomously, and be in the spotlight for the new contents distribution system. But for the actual P2P system, there are problems about copyright, illegal copy and so on, so for not only content holders but also P2P users have the risk in the P2P system. Therefore we propose a content secure P2P system in which contents contain the information about the permission and they are distributed according to the poliscy set by P2P users. Moreover we implements the prototype, and evaluate it.

(3) A Method of Time Distribution using Time Evidence
Norikazu KUBOTERA
Shigeyoshi SHIMA
Kentaro Ishizaki
Ayako KOMATSU

A Time-Stamp is issued by Time-Stamping Authority (TSA) and is evidence of Time-of -existence of digital documents. Time-of-existence is used by a local clock of TSA. In order to keep accuracy of TSA's local clock, TSA synchronizes time of Time Authority (TA). But it is difficult to verify time guaranteed by synchronized time. A method of identifying TA is a task in "A Method of Time Certification using Time Evidence" [3]. In this paper, we propose method of identifying TA.

(4) Server-aided digital signature system
Nobuyuki Oguri (NTT DoCoMo, Inc.)
Chikako Tukada (NTT DoCoMo, Inc.)
Kimihiko Sekino (NTT DoCoMo, Inc.)

With the introduction of JPKI service, growth of digital signature is expected. Also, with the availability of mobile phones with SSL functionality, focus will be on PKI technology. In this paper, with the limitation of functionality of mobile phones, we propose server-aided digital signature system that generate digital signature by using SSL function of a mobile phone, and cooperative server.

(5) Genuineness Guarantee Method at Server-aided Digital Signature System
Chikako Tsukada (NTT DoCoMo,Inc.)
Kimihiko Sekino (NTT DoCoMo,Inc.)
Nobuyuki Oguri (NTT DoCoMo,Inc.)

With the growth of e-commerce, to insure security, use of digital signature is becoming popular. Still, there are some difficulties in using digital signature on small terminals such as mobile phones because XML which is common form of digital signature is not supported on these terminals. For this reason, server-aided digital signature system which transforms XML into HTML, which can be used by mobile phones, was proposed. In this paper, we discuss threats for the system, and then propose a guarantee method to overcome these threats.

(6) An Extension of causally ordered broadcast protocol supporting terminal mobility by way of subdividing a network hierarchically
Tetsushi Matsuda

Information Technology R&D Center, Mitsubishi Electric Corporation

(7) Moderate Concurrency Control in Distributed Object Systems
Yousuke Sugiyama (Dept. of Computers and Systems Engineering Tokyo Denki University, Japan)
Tomoya Enokido (Dept. of Computers and Systems Engineering Tokyo Denki University, Japan)
Makoto Takizawa (Dept. of Computers and Systems Engineering Tokyo Denki University, Japan)

In object-based systems, objects are distributed in multiple object servers like database servers interconnected with communication networks. Objects are manipulated only through their own methods. Methods are procedures for manipulating an object. We first extend traditional lock modes for read and write on simple objects like files and tables to methods on objects. We introduce new types of conflicting relations among methods, availability and exclusion ones. Then, we define a partially ordered relation on lock modes showing which one is weaker than another for a pair of modes. We discuss a moderate concurrency control algorithm for concurrently manipulating distributed objects. Before manipulating an object through a method, the object is locked in a weaker mode than a an intrinsic mode of the method. Then, the lock mode is escalated to the method mode. The weaker the initial mode is the more concurrency is obtained but the higher frequently deadlock occurs.

(8) Multi-Striping: Multicast Protocol with Network Striping Approach on Grid Computing Environment
Yasutaka Nishimura (Dept. of Computers and Systems Engineering Tokyo Denki University)
Tomoya Enokido (Dept. of Computers and Systems Engineering Tokyo Denki University)
Makoto Takizawa (Dept. of Computers and Systems Engineering Tokyo Denki University)

This paper discusses a novel type of high-performance data transmission protocol for multicasting multimedia messages in a Grid network. A Grid network is composed of various types of computers interconnected in types of networks. There can be multiple routes from a sender process to each of destination processes in a Grid network. Multimedia data can be in parallel transmitted to multiple processes by using multiple routes. In addition, messages can be replicated by not only in a same route but also in different routes. Some packets lost can be recovered from the redundant parity packets. We evaluate the protocol in terms of jitter and effective packet loss ratio, compared with traditional tree routing.

(9) A Proposal of Distributed Data Management Mechanism through Information Distribution Boards
Yasushi TAKAHATA (Information Technology R & D Center, Mitsubishi Electric Corporation)
Tsuyoshi IIZUKA (Information Technology R & D Center, Mitsubishi Electric Corporation)
Toshiharu AIURA (Information Technology R & D Center, Mitsubishi Electric Corporation)
Tadanori MIZUNO (Faculty of Information, Sizuoka University)

The Japanese government promotes the "e-Japan strategy II" and the deregulation of electricity market. They aim at higher-level services, which require real-time telemetering from huge number of consumers. We propose distributed data management and collection mechanism through information distribution boards described on the e-Japan strategy II. The proposal consists of two components; the first is hierarchical data management for huge number of distributed data, and the second is distributed snapshot to enable time-aligned data collection. We have implemented the basic functions of the former and checked the behavior and the feasibility. Finally, we mention on subjects to be solved for practical use.

(10) Subjects and Solutions on Huge-Scale Distributed Equipment Management System
Takehiko HOSOKAEA
Toshiharu AIURA
Yasushi TAKAHATA

Recently, as for factories and plants, costs for maintenance such as inspections and exchange of equipment rise more than the introduction costs of new equipment. To reduce these costs, the mentenance policy changes from time-based to condition-based. And the demand for management centers that serve with online-monitoring, remote maintenance, diagnosis and so on is increasing. In this paper, the subjects and solutions to realize these new management centers are studied and the considered implementation is described.

(11) An Access Control System for Protection from Disclosures of Information
Masato ARAI (Systems Development Lab. Hitachi, Ltd.)
Satoshi KAI (Systems Development Lab. Hitachi, Ltd.)
Yasuhiko NAGAI (Systems Development Lab. Hitachi, Ltd.)
Satoru TOMIDA (Mechatronics Systems Division, Hitachi, Ltd.)

Disclosures of information have been a serious issue in computer systems that store classified information such as personal data. Especially, the countermeasure for fraud caused by inside person is difficult. Mandatory file encryption will be able to solve the problem of taking hard disk or removable media includes classified information, but also limit the usage of unclassified information. We propose a system that has capabilities to separate unclassified information from classified information, encrypt classified files only, and prevent intentional plaintext transfer from classified files to unclassified files.

(12) A virus infection simulation under various conditions of virus's and vaccine's infection
TAICHI NAKAMURA (Shizuoka University)
ITUKAZU NAKAMURA (NTT Data Corp)
MASAKAZU SOGA (Iwate Prefectural University)
MASAKATSU NISHIGAKI (Shizuoka University)

This paper proposes to apply game theory for analyzing the offense and defense between a network manager and a cracker. As the first trial, several virus infection simulations under various conditions of virus's and vaccine's infection are carried out here. Simulation results shows that it would be effective to use vaccine tailored to virus's type.

(13) Worm Propagation Simulation Considering Online Hosts
Naohiro OBATA (Department of Instrumentation(Information), Faculty of Science and Technology, Keio University)
Reina MIYAJI (Department of Instrumentation(Information), Faculty of Science and Technology, Keio University)
Nobutaka KAWAGUCHI (Department of Instrumentation(Information), Faculty of Science and Technology, Keio University)
Hiroshi SHIGENO (Department of Instrumentation(Information), Faculty of Science and Technology, Keio University)
Kenichi OKADA (Department of Instrumentation(Information), Faculty of Science and Technology, Keio University)

In this paper, we propose Internet worm propagation simulation considering "Online Hosts" and worm scanning algorithm.There is no simulation model for the propagation of a worm that considers "Online Hosts" as a parameter and we beleive that this is the first attempt.

(14) Packet Loss Control for Continuous Media over Wireless Network
Ryosuke Igarashi
Kazuo Takahata
Noriki Uchida
Yoshitaka Shibata

In this paper, packet loss rate control of continuous multimedia communication system under heterogeneous envi-ronment by the wired and the wireless networks is presented and analyzed. In our suggested system, as channel coding, FEC (Forward Error Correction) method with Reed-Solomon coding is introduced to reduce the packet error rate on the wireless network. In order to verify the functionality and the efficiency in our suggested system, numerical simulation for packet loss on wireless network was carried out. As the result, packet loss could be im-proved by increase of the number of FEC redundant packet.

(15) Development Recovery Protocol for Dynamic Network Reconstruction on Disaster Information System
Hideaki Asahi (Faculty of Software and Information Science, Iwate Prefectural University)
Uchida Norio (Faculty of Software and Information Science, Iwate Prefectural University)
Kazuo Takahata (Department of Business Administration, Shinshu Junior College)
Yoshitaka Shibata (Faculty of Software and Information Science, Iwate Prefectural University)

So far, we have developed effective Wide area Disaster information Network (WDN) using Internet over the combination of both wired and wireless network. In this information network, two important functions including resident safety information system and bi-directional video communication system between evacuation places and disaster information center are provided. However, in this WDN, system failure of network and computing facilities by disaster was not considered. In order to recover the information system as soon as possible from the system failure, network protocol has to deal with those requirements. In this paper, we introduce Wireless Recovery Protocol (WRP) to temporally recover WDM with minimum configuration as soon as possible even though some of network and computing facilities were damaged by disaster, using network management and GPS functions. The design and implementation of the WRP is precisely described. The prototype system and its hardware and software environment to evaluate its functionality are also precisely described.

(16) Autonomous Topology Optimization and Recovery for Peer-to-Peer Networks
Haoyi Wan (Multimedia Laboratories, NTT DoCoMo Inc.)
Kato Takeshi (Multimedia Laboratories, NTT DoCoMo Inc.)
Norihiro Ishikawa (Multimedia Laboratories, NTT DoCoMo Inc.)
Johan Hjelm (Ericsson Research Ericsson Research, Japan)
Kazuhiro Miyatsu (Ericsson Research Ericsson Research, Japan)
Hajime Kasahara (Ericsson Research Ericsson Research, Japan)

This paper proposes an autonomous topology optimization and recovery mechanism for peer-to-peer networks. The general topology of peer-to-peer overlay networks is constructed randomly without considering the characteristics of physical links. Thus searching and routing between peer nodes is influenced. In our research, peer nodes optimize the topology of peer-to-peer networks based on the metrics of physical links. And under the assumption that peer nodes leave the network or fail, how to recover the split of the network topology by neighbor peer nodes is discussed.

(17) Implementation and Estimation of a Domain Name System with Access Control
Tatsuya BABA (Research and Development Headquarters, NTT Data Corporation)
Takayoshi KUSAKA (Research and Development Headquarters, NTT Data Corporation)
Masaki YAMAOKA (Research and Development Headquarters, NTT Data Corporation)
Shigeyuki MATSUDA (Research and Development Headquarters, NTT Data Corporation)

DNS (Domain Name System) plays an important role in the Internet. It provides the mechanism for translating internet domain names for network hosts into IP addresses. As the Internet has grown to become a business infrastructure, security extensions to the DNS have been discussed and developed. However, any sort of access control lists or other means to differentiate inquirers are not provided in these extensions. Therefore, the authors have been proposed the access control mechanism for DNS, which authenticates inquirers. In this paper, we show the development of the DNS with access control and the estimation results.

(18) The threat of information leak
Akira Watanae


(19) Web Service Security
Hiroshi Maruyama


(20) Agent-besed IDS for Dynamic Variation of Network Composition
Yuki KOTEGAWA (Graduate School of Information Science and Electrical Engineering, Kyushu University)
Toshihiro TABATA (Faculty of Information Science and Electrical Engineering, Kyushu University)
Kouichi SAKURAI (Faculty of Information Science and Electrical Engineering, Kyushu University)

Compared with IDS installed on a network, IDS installed on a host can use more information for intrusion detection. However, IDS installed on a host can detect intrusion into only the host. Therefore, when a host is newly connected to the network, it is necessary to newly install IDS into the connected host. In this paper, Agent-based IDS is proposed. The system can automatically install IDS into the connected host On the proposed system, the mobility of mobile agents can save the time and effort of introduction of IDS. Moreover, by simultaneous distribution of upgraded agents, efficient maintenance management is realized.

(21) A Cooperative P2P Environment for Network Intrusion Detection
Mehdi Salah (University of Tsukuba,University of 7th November at Carthage, INSAT)
Akira Kanaoka (University of Tsukuba)
Eiji Okamoto (University of Tsukuba)

In this project, we are trying to design, implement and deploy a cooperative P2P environment for Network Intrusion Detection. The P2P environment consists of multiple peers running the same NIDS (Network IDS); we called CoIDS (Cooperative IDS). CoIDS is a signature based NIDS using Snort rules, that we fully implemented in Java. CoIDS offers 3 types of functions namely packets analysis and intrusion detection in the local network, P2P functionalities using JXTA API, and Information sharing for cooperative intrusion detection.

(22) A quality improvement of anomaly-based network intrusion detection
Toru KONNO

In anomaly-based network intrusion detection, the accuracy of detection rate is critical to quality. By applying Taguchi method, we succeeded at 1) reducing the false detection rate to half, 2) enhancing the robustness of software design, and 3) optimizing the system parameters with opposite effect, such as successful detection rate and false detection rate, with measuring "the standardized S/N ratio of digital data".

(23) Estimations of Kolmogorov Complexity and Detection Performance of Denial-of-Service Attack
Takayuki Furuya (Institute of Industrial Science, the University of Tokyo)
Kanta Matsuura (Institute of Industrial Science, the University of Tokyo)
Anderson Nascimento (Institute of Industrial Science, the University of Tokyo)
Hideki Imai (Institute of Industrial Science, the University of Tokyo)

These days, the Internet accessibility makes it vulnerable in terms of security. Above all, Denial-of-Service (DoS) attacks have become one of the most serious threats. DoS attacks consume a network or remote host's resources and degrade service to legitimate users. Recently, it has been tried to introduce 'Kolmogorov Complexity' into a method to detect DoS attacks. Kolmogorov Complexity is a concept to measure the size of the smallest program capable of representing the given piece of data. In our study, we present availability of applying Kolmogorov Complexity to detect DoS attacks by introducing some estimation of Kolmogorov Complexity.

(24) Development of DDoS attack prevention system
Naohiro Tamura
Mayuko Morita
Takuya Habu
Satoru Torii
Osamu Koyano

It is effective to take measures at the network devices as close to DDoS agents as possible before attack starts, in order to protect not only target servers but also infrastructure of the Internet. In this paper, we propose a system which blocks DDoS attacks at the closest network devices to DDoS agents following forecasts issued by DDoS forecast system. And we present the results of applying our prototype to a pusedo Internet in our laboratory. The paper concludes by discussing the potential and limitation of this approach.

(25) An Accuracy Improvement Method of Distributed Cooperative Spam Filter Using Delayed Evaluation Technique
Ippei Sazanami (Faculty of Engineering, Okayama University)
Narioshi Yamai (Computer Center, Okayama University)
Kiyohiko Okayama (Faculty of Engineering, Okayama University)
Takuya Miyashita (Computer Center, Okayama University)
Shin Maruyama (Graduate School of Informatics, Kyoto University)
Motonori Nakamura (Academic Center for Computing and Media Studies, Kyoto University)

Spam filters are commonly used for a kind of protection measures of spam mail, which is one of the most serious problems on e-mail environment. As a kind of filtering methods, distributed cooperative filter is remarkable since its false positive rate is very small. However, this method has a significant drawback that its accuracy is considerably low. In this paper,in order to improve the accuracy of distributed cooperative filters, we propose a delayed evaluation technique such that filtering is performed when a Mail User Agent (MUA) has access to the mail server. This method can generate an additional period for registration of new spam mails received by other users, therefore we expect it improves the accuracy. We have also implemented the proposed method as a POP proxy, and shows that the accuracy may be improved in small overheads.

(26) Delivery of Information Customized to Mobile User's Taste from WebPages
Yuto Araki (Faculty of Engineering, Tokai University)
Osamu Uchida (School of Information Technology and Electronics, Tokai University)
Shohachiro Nakanishi (School of Information Technology and Electronics, Tokai University)

In late years, cellular phones that can access the Internet have spread explosively. However, the amount of information obtained from the Internet access using cellular phones is by far smaller than that obtained from the Internet access using PC. This arises from that cellular phones can not display a lot of web pages for PC. In this paper, we implement a system that enables acquisition of information from web pages for PC using cellular phone easily.

(27) A Proposal of Message Distribution Service with Incubation Period
Junpei Hato (Information Technology R&D Center, Mitsubishi Electric Corp.)
Mikio Sasaki (Information Technology R&D Center, Mitsubishi Electric Corp.)
Masashi Saito (Information Technology R&D Center, Mitsubishi Electric Corp.)

According to recent wireless network technology, we can dynamically connect our own mobile terminals to the Internet and access many kinds of information. In addition to this, wireless LAN enables us to communicate with other terminals directly. However, it is difficult for us to choose some valuable information from so much information in the Internet. In addition, direct e-mail messages bother us and often deal them with spam. In this paper, we propose message distribution service with incubation period. All messages are received using some push technologies, but it does not leads the notification of message receives to the users. These messages are set to dormant, and when some events which increase the value of messages occurs, then the receiving events are notified. To use this method, we can access valuable information timely.

(28) A Proposal and its Implementation of the Event Driven Animated Internet Commercial Distribution System
Minoru NAKAZAWA (Faculty of Engineering, Kanazawa Institute of Technology)
Yasushi IKEDA (Faculty of Engineering, Kanazawa Institute of Technology)
Tomonori NAKANO (Faculty of Engineering, Kanazawa Institute of Technology)
Shimmi HATTORI (Faculty of Engineering, Kanazawa Institute of Technology)

Along with the rapid spread of broadband, streaming style animation are being adopted in the field of internet commercial As proven by many studies, the current application of the animated internet commercial is quite effective. By considering the application from viewpoints such as cost and use case, however, there are still a lot of problems. This paper presents a new method of commercial broadcast and its implementation. Generally, traditional methods only read scheduled commercial contents and do commercial broadcast within a specified region. By contrast, the proposed method enables commercial broadcasting under various use cases and detailed timing for different users(customers).

(29) Realization of the 3-Dimensional Virtual Communication Environment Using User Information
Satoshi Oikawa (Faculty of Software and Information Science, Iwate Prefectural University)
Koji Hashimoto (Faculty of Software and Information Science, Iwate Prefectural University)
Yoshitaka Shibata (Faculty of Software and Information Science, Iwate Prefectural University)

Recently many communication systems based on three dimensional spaces are proposed. In those systems, in order to support many users in the same space, QoS control function based on the distance among the avatars is mainly applied. For this reason, the computing and network resources in the communication systems are wasted as the number of the users increases. In this paper, we propose a new QOS control to take account of user's interest and status information in addition to the distance among the avatars. Using this method, un-necessary communication and resources can be reduced and more interested communication can be attained with higher priority in the large communication space.

(30) Implementation and Evaluation of Feeling Communication System Based on Individual User Model
Kouhei Hayashi (Faculty of Software and Information Science, Iwate Prefectural University)
Ying Dai (Faculty of Software and Information Science, Iwate Prefectural University)
Yoshitaka Shibata (Faculty of Software and Information Science, Iwate Prefectural University)

Recently, as advent of Internet and broadband network technologies, remote communication system such as video conference system, has been popular to communicate each other at the remote places. In such system, although understanding of the real feeling of the partner can be usually understood from his facial expression, the difference of the individual facial expression is always generated and prevents them from the mutual understanding. This difference becomes more serious specially when both are not familiar each other. On order to resolve this problem, we suggest a feeling communication system to attain real and smooth communication by feeling in consideration of individual user model. In our system, the real feeling of the partner is extracted by recognition part, transmitted through the network and synthesize into the facial expression using individual user model. This paper describes the system architecture and design issued and methodology to realize a total system. In order to verify the usefulness of suggested method, a prototype system is constructed to evaluate its functionality and performance.

(31) A Detection Method for MITM Attack against Public-key Protocols and Its Appllication to SSH
Yu Inamura (NTT DoCoMo, Inc. Multimedia Laboratories)
Sadayuki Hongo (NTT DoCoMo, Inc. Multimedia Laboratories)

It is well known that the protocols to which public-key cryptography is naively applied are vulnerable to the so-called "{\em \{Man,MIG,Monkey\}-In-The-Middle (MITM)\/}" attack, which is conducted by an adversary sitting between the sender and the receiver and mediating transfered data with modification at her/his will. We present a neat method to counter such MITM attacks without relying upon the possibly overkilling frameworks such as PKI. The experimental results with its application to an Internet secure protocol SSH is also exhibited.

(32) TPod - Trusted Platform on demand
Hiroshi Maruyama
Seiji Munetoh
Sachiko Yoshihama
Tim Ebringer

In service-centric, "on demand" computing, establishing stronger trust on networked platforms is a key requirement because these remote platforms are often owned and managed by separate entities. The research described in this paper is an architecture and implementation called Trusted Platform on Demand (TPod), which increases the trustworthiness of networked platforms by combining dedicated security hardware, a secure operating system kernel and an open security protocol, to provide a secure software platform that may host a diverse range of distributed applications. Especially significant is the fact that the applications are better protected even if there are vulnerabilities in the application software or in the system software, or the system administrator is not completely trustworthy.

(33) The buffer overflow attack detection and the attack traces extraction in a binary program
MAKOTO IWAMURA (NTT Information Sharing Platform Laboratories, NTT Corporation)
DAI KASIWA (NTT Information Sharing Platform Laboratories, NTT Corporation)

The cases where vulnerabilities in PCs are abused via a network are increasing by the increase in the number of PCs connected to a network. The buffer overflow is one of the most serious vulnerabilities since the buffer overflow in such vulnerabilities is abused as the method of an intrusion or a DoS(Denial Of Service) attack. Especially in the Windows environment, the worm using the uniformity of the application code assignment, such as Slammer and Blaster, with high infection capability appeared. In this paper, the buffer overflow detection technique in the Windows environment and the experiment result by actual attack and its validity are described. Furthermore, we work on the further measures interlocked with the buffer overflow detection function, and describe their realization method.

(34) A user authentication system based on prior experience of the authentication task
Masaomi Hanai (Shizuoka University)
Itsukazu Nakamura (NTT Data Corp.)
Hideki Yoshida (NTT Data Corp.)
Masakazu Soga (Iwate Prefectural University)
Masakatsu Nishigaki (Shizuoka University)

Although password can be very useful and widely used in all kind of authentication, one problem with password is the human limitation to remember secure passwords. In recent years, several user authentication systems such as image-based authentication and episodic-memory-based authentication have been studied for reducing the load to human memory. Here we focus on another kind of human characteristic: the second trial is easier than the first trial. In general, when people face some task again which he/she has complete before, he/she would be able to finish the task faster than before. In this paper, this human characteristic is exploited to make authentication systems more effective.

(35) Customizable Hardware Implementation of IPsec With Respect to Its Function and Performance
Kazunori Yamaguchi
Takamichi Tateoka
Koki Abe

In this paper, we propose a method to customize the IPsec system, enabling to include/exclude each of the IPsec components and to predict the performance and area cost of the resulting entire hardware implementation. The customization is based on a design framework where IPsec functions are modularized and the interfaces between them are well defined. We illustrate the usefulness of our proposal by designing some of the hardware components satisfying the definitions and using them to customize the system for several specific applications. Evaluations of the effectiveness of the customizing in terms of making design tradeoffs among IPsec hardware realization with respect to the performance and area costs are also given.

(36) Secure Attribution Providing Method by the Communication Operator
Kentaro Kakami (Multimedia Development Department, NTT DoCoMo Inc.)
Nobuyuki Oguri (Multimedia Development Department, NTT DoCoMo Inc.)
Kimihiko Sekino (Multimedia Development Department, NTT DoCoMo Inc.)

With the popularity of mobile internet service for mobile phones, wide range of contents is becoming available. Information tied to the contractor and which is held by the communication operator can increase convenience for the user and variation of services. In this paper, we propose a method to provide attributes on behalf of the user. We define essential conditions of providing attributes and types of attributes held by the operator. We also show the system structures and the providing sequence of the two methods called "the push method", requested by the mobile phone, and "the pull method", requested by the contents provider. Moreover we show the basis and the operation method of the privacy control by which the user can reflect his/her own policy of providing attributes.

(37) Multimedia Remote Educational Support System Using High Resolution Panorama Video
Kawamura Noritaka (Faculty of Software and Information Science, Iwate Prefectural University)
Yuya Maita (Faculty of Software and Information Science, Iwate Prefectural University)
Koji Hashimoto (Faculty of Software and Information Science, Iwate Prefectural University)
Yoshitaka Shibata (Faculty of Software and Information Science, Iwate Prefectural University)

At present, as increase of the needs of long life learning, remote education systems have important increased as one of the educational techniques. Along with the popularization of the Internet and broadband, many people are exchanging more and more using video among remote sites. Even now communication by High definition video is possible and various remote educational systems are proposed. However, by order to realize a type of sophisticated lesson involving by exercise and practical training distantly, it is necessary to grasp during the lesson. Moreover, in the case where more interactive communication is performed on real time, high speed network is needed. In this paper, multiple video images with various angle are require, during the lesson is grasped using a panorama video. And Real time interactive communication is realized on IP network using by a transcoding function. The prototyped remote educational support system is constructed to evaluate described.

(38) Automatic Conversion of Web contents for Cellular Phone
Hiroaki Yoshikawa
Osamu Uchida
Shohachiro Nakanishi

By reason of spread of cellular phones that can accesss the Internet, the opportunity of web browsing by a cellular phone has been increased. However, the web pages that was made for the PC are not suited for browsing by cellular phones. Moreover, we can not browse the web site by cellular phones, in some cases. Ordinarily, website developers have to make over the web pages for cellular phone. But, this task is inefficient for administration of website. In this paper, to tackle this problem, we implement an automatic conversion system of the web pages for cellular phone.

(39) A study on a SIP-based Voice-Mail System with voice recognition
Yasutaka Otake (Graduate School of Technology, Tokyo University of Agriculture and Technology)
Yasuhiro Tajima (Depertment of Computer, Information and Communication Science, Tokyo University of Agriculture and Technology)
Matsuaki Terada (Depertment of Computer, Information and Communication Science, Tokyo University of Agriculture and Technology)

In this paper we propose a new voice mail service incorporating voice recognitio n,function notorealized in existing unified messaging systems.The proposed service,which we have also inplemented and evaluated,in characterized by email.A Web-based GUI(Graphical UserInterface)provides easy user accessto voice messages.Telephone calls to the service are VoIP(Voice over IP)useingSIP(Session Initiation Peotocol)call signaling.

(40) An Implementation of a Virtual "Sound Room" Based Communication-Medium Called Voiscape Using JMF and Java3D
Yasusi Kanada

The author researches toward establishing voice communication media called voiscape which shall replace telephone. A virtual "sound room" that is created by spatial audio technology is used in voiscape. We developed a prototype on PCs, in which 3-D graphic is used for supplementing spatial audio. In this prototype, JMF (Java Media Framework) was used for voice capturing and communication, and Java 3D was used for spatial audio and 3-D graphics. Before the development, the author had believed that the basic functions required for the prototype would be realized by connecting these APIs. However, in fact, they cannot be connected directly, so we used OpenAL through the interface of Java 3D. We also encountered problems of sound quality degradation and delay, but they have been almost solved by refining the program by trial and error.

(41) Reduction in Block Noises Using the Vector Synthesis Method in Wartermarking to Digital Audio Data
Masayuki Saito (Tokai university)
Hiroaki Kikuchi (Tokai university)
Shohachiro Nakanishi (Tokai university)

In watermarking and steganography, there are mainly two approches to embed a watermark data: frequency domain approch which is resistant to any attacks in the cost of processing time, a time domain approch which is fragile but requiresless computing time. The DCT or DFT, which is used to changes a digital audio into the frequency domain, generally, causes a block noise and deteriorats the quality. In order to deal with the issue, Iwakiri proposed a VSM (Vector Synthsis Method), in which wartermrking data on a frequency domain is transrated into a time domain using the MDCT before synthesizing. In this paper, we point out that the VSM causes a smaller block noise than the existing DCT method, and propose a lightweight watermrking method which uses the DCT instead of the MDCT.


[home]

Valid HTML 4.01! Valid CSS!