Japanese Edition

List of Publications

Journal Papers

  1. Kenji Hashimoto, Ryuta Sawada, Yasunori Ishihara, Hiroyuki Seki and Toru Fujiwara, ``Determinacy and Subsumption of Single-valued Bottom-up Tree Transducers,'' IEICE Transactions on Information and Systems, Vol. E99-D, No. 3, pp. 575-587 (2016-03).
  2. Hayato Kuwada, Kenji Hashimoto, Yasunori Ishihara and Toru Fujiwara, ``The Consistency and Absolute Consistency Problems of XML Schema Mappings between Restricted DTDs,'' World Wide Web Journal, Vol. 18, Issue 5, pp. 1443-1461 (2015-09). [PDF]
  3. Yasunori Ishihara, Yasuhiro Ushirozako, Kengo Mori and Jun Furukawa, ``A Secrecy Criterion for Outsourcing Encrypted Databases Based on Inference Analysis,'' IEICE Transactions on Information and Systems, Vol. E98-D, No. 6, pp. 1161-1165 (2015-06).
  4. Hiroyuki Kato, Soichiro Hidaka, Zhenjiang Hu, Keisuke Nakano and Yasunori Ishihara, ``Context-Preserving XQuery Fusion,'' Mathematical Structures in Computer Science, Vol. 25, No. 4, pp. 916-941 (2015-05). [PDF]
  5. Kenji Hashimoto, Hiroto Kawai, Yasunori Ishihara and Toru Fujiwara, ``Decidability of the Security against Inference Attacks using a Functional Dependency on XML Databases,'' IEICE Transactions on Information and Systems, Vol. E95-D, No. 5, pp. 1365-1374 (2012-05).
  6. Kenji Hashimoto, Kimihide Sakano, Fumikazu Takasuka, Yasunori Ishihara and Toru Fujiwara, ``Verification of the Security against Inference Attacks on XML Databases,'' IEICE Transactions on Information and Systems, Vol. E92-D, No. 5, pp. 1022-1032 (2009-05).
  7. Akinari Yamaguchi, Shougo Shimizu, Yasunori Ishihara and Toru Fujiwara, ``Bag-based Data Models for Incomplete Information and Their Closure Properties,'' Journal of Intelligent Information Systems, Vol. 30, No. 2, pp. 115-135 (2008-04). [PDF]
  8. Yasunori Ishihara, Toshiyuki Morita, Hiroyuki Seki and Minoru Ito, ``An Equational Logic Based Approach to the Security Problem against Inference Attacks on Object-Oriented Databases,'' Journal of Computer and System Sciences, Vol. 73, No. 5, pp. 788-817 (2007-08). [PDF]
  9. Yasunori Ishihara, Shuichiro Ako and Toru Fujiwara, ``Security against Inference Attacks on Negative Information in Object-Oriented Databases,'' IEICE Transactions on Information and Systems, Vol. E88-D, No. 12, pp. 2767-2776 (2005-12).
  10. Yasunori Ishihara, Shin Ishii, Hiroyuki Seki and Minoru Ito, ``Temporal Reasoning about Two Concurrent Sequences of Events,'' SIAM Journal on Computing, Vol. 34, No. 2, pp. 498-513 (2005-02). [PDF]
  11. Yasunori Ishihara, Kengo Mori and Toru Fujiwara, ``Sufficient Conditions for Update Operations on Object-Oriented Databases to Preserve the Security against Inference Attacks,'' IEICE Transactions on Information and Systems, Vol. E86-D, No. 10, pp. 2187-2197 (2003-10).
  12. Yoshihiro Murata, Yasunori Ishihara and Minoru Ito, ``An Approximation Algorithm for the Task-Coalition Assignment Problem,'' IEICE Transactions on Information and Systems, Vol. E85-D, No. 4, pp. 685-693 (2002-04).
  13. Yasunori Ishihara, Shougo Shimizu, Hiroyuki Seki and Minoru Ito, ``Refinements of Complexity Results on Type Consistency for Object-Oriented Databases,'' Journal of Computer and System Sciences, Vol. 62, No. 4, pp. 537-564 (2001-06). [PDF]
  14. Shougo Shimizu, Yasunori Ishihara, Junji Yokouchi and Minoru Ito, ``Complexity of the Type-Consistency Problem for Acyclic Object-Oriented Database Schemas,'' IEICE Transactions on Information and Systems, Vol. E84-D, No. 5, pp. 623-634 (2001-05).
  15. Yeon-Dae Kwon, Yasunori Ishihara, Shougo Shimizu and Minoru Ito, ``Computational Complexity of Finding Highly Co-occurrent Itemsets in Market Basket Databases,'' IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol. E83-A, No. 12, pp. 2723-2735 (2000-12).
  16. Yasunori Ishihara, Kiichiro Ninomiya, Hiroyuki Seki, Daisuke Takahara, Yutaka Yamada and Shigesada Omoto, ``Verification of a Microcomputer Program Specification Embedded in a Reactive System,'' IEICE Transactions on Information and Systems, Vol. E83-D, No. 5, pp. 1082-1091 (2000-05).
  17. Toshiyuki Morita, Yasunori Ishihara, Hiroyuki Seki and Minoru Ito, ``A Formal Approach to Detecting Security Flaws in Object-Oriented Databases,'' IEICE Transactions on Information and Systems, Vol. E82-D, No. 1, pp. 89-98 (1999-01).
  18. Toshiyuki Morita, Yasunori Ishihara, Hiroyuki Seki and Minoru Ito, ``An Authorization Model for Object-Oriented Databases and Its Efficient Access Control,'' IEICE Transactions on Information and Systems, Vol. E81-D, No. 6, pp. 521-531 (1998-06).
  19. Hiroyuki Seki, Yasunori Ishihara and Hiroki Dodo, ``Testing Type Consistency of Method Schemas,'' IEICE Transactions on Information and Systems, Vol. E81-D, No. 3, pp. 278-287 (1998-03).
  20. Yasunori Ishihara, Atsushi Ohsaki, Hiroyuki Seki and Tadao Kasami, ``Assignment of Data Types to Words in a Natural Language Specification,'' IEICE Transactions on Information and Systems, Vol. E79-D, No. 6, pp. 820-828 (1996-06).
  21. Yasunori Ishihara, Hiroyuki Seki and Tadao Kasami, ``Implementation of Natural Language Specifications of Communication Protocols by Executable Specifications,'' Transactions of Information Processing Society of Japan, Vol. 36, No. 5, pp. 1114-1125 (1995-05). [PDF]
  22. Yasunori Ishihara, Hiroyuki Seki, Tadao Kasami, Jun Shimabukuro and Kazuhiko Okawa, ``A Translation Method from Natural Language Specifications of Communication Protocols into Algebraic Specifications Using Contextual Dependencies,'' IEICE Transactions on Information and Systems, Vol. E76-D, No. 12, pp. 1479-1489 (1993-12).

International Conference (Reviewed)

  1. Hiroyuki Kato, Yasunori Ishihara and Torsten Grust, ``DDO-Free XQuery,'' Proceedings of the 16th International Symposium on Database Programming Languages (2017-09) (accepted).
  2. Takashi Hayata, Yasunori Ishihara and Toru Fujiwara, ``The Absolute Consistency Problem of Graph Schema Mappings with Uniqueness Constraints,'' Proceedings of the 9th International Conference on Advances in Databases, Knowledge, and Data Applications, pp. 103-110 (2017-05).
  3. Kento Takahashi and Yasunori Ishihara, ``Formalizations of Secrecy of Encrypted Databases against Realistic Attackers,'' Proceedings of 2016 International Symposium on Information Theory and its Applications, pp. 428-432 (2016-11).
  4. Yasunori Ishihara, Hayato Kuwada and Toru Fujiwara, ``The Absolute Consistency Problem of XML Schema Mappings with Data Values between Restricted DTDs,'' Proceedings of the 25th International Conference on Database and Expert Systems Applications, Lecture Notes in Computer Science 8644, pp. 317-327 (2014-09).
  5. Ryo Iwase, Yasunori Ishihara and Toru Fujiwara, ``Toward Security Verification against Inference Attacks on Data Trees,'' 2nd International Workshop on Trends in Tree Automata and Tree Transducers, pp. 49-59, http://dx.doi.org/10.4204/EPTCS.134.6 (2013-10).
  6. Yasunori Ishihara, Nobutaka Suzuki, Kenji Hashimoto, Shogo Shimizu and Toru Fujiwara, ``XPath Satisfiability with Parent Axes or Qualifiers Is Tractable under Many of Real-World DTDs,'' Proceedings of the 14th International Symposium on Database Programming Languages, http://arxiv.org/abs/1308.0769 (2013-08).
  7. Nobuaki Yamazoe, Kenji Hashimoto, Yasunori Ishihara and Toru Fujiwara, ``Decidability of k-secrecy against Inference Attacks Using Functional Dependencies on XML Databases,'' Proceedings of the 2013 International Conference on Parallel and Distributed Processing Techniques and Applications, pp. 182-188 (2013-07).
  8. Hayato Kuwada, Kenji Hashimoto, Yasunori Ishihara and Toru Fujiwara, ``The Consistency and Absolute Consistency Problems of XML Schema Mappings between Restricted DTDs,'' Proceedings of the 15th International Asia-Pacific Web Conference, Lecture Notes in Computer Science 7808, pp. 228-239 (2013-04).
  9. Kenji Hashimoto, Ryuta Sawada, Yasunori Ishihara, Hiroyuki Seki and Toru Fujiwara, ``Determinacy and Subsumption for Single-valued Bottom-up Tree Transducers,'' Proceedings of the 7th International Conference on Language and Automata Theory and Applications, Lecture Notes in Computer Science 7810, pp. 335-346 (2013-04).
  10. Yasunori Ishihara, Kenji Hashimoto, Atsushi Ohno, Takuji Morimoto and Toru Fujiwara, ``Typing XPath Subexpressions With Respect to an XML Schema,'' Proceedings of the 5th International Conference on Advances in Databases, Knowledge, and Data Applications, pp. 128-133 (2013-01).
  11. Yasunori Ishihara, Kenji Hashimoto, Shogo Shimizu and Toru Fujiwara, ``XPath Satisfiability with Downward and Sibling Axes Is Tractable under Most of Real-world DTDs,'' Proceedings of the 12th International Workshop on Web Information and Data Management, pp. 11-18 (2012-11).
  12. Kenji Hashimoto, Yohei Kusunoki, Yasunori Ishihara and Toru Fujiwara, ``Validity of Positive XPath Queries with Wildcard in the Presence of DTDs,'' The 13th International Symposium on Database Programming Languages, http://www.cs.cornell.edu/conferences/dbpl2011/papers/dbpl11-hashimoto.pdf (2011-08).
  13. Hiroyuki Kato, Soichiro Hidaka, Zhenjiang Hu, Keisuke Nakano and Yasunori Ishihara, ``Context-Preserving XQuery Fusion,'' Proceedings of the 8th Asian Symposium on Programming Languages and Systems, Lecture Notes in Computer Science 6461, pp. 255-270 (2010-11).
  14. Yasunori Ishihara, Shogo Shimizu and Toru Fujiwara, ``Extending the Tractability Results on XPath Satisfiability with Sibling Axes,'' Proceedings of the 7th International XML Database Symposium, Lecture Notes in Computer Science 6309, pp. 33-47 (2010-09).
  15. Yasunori Ishihara, Takuji Morimoto, Shougo Shimizu, Kenji Hashimoto and Toru Fujiwara, ``A Tractable Subclass of DTDs for XPath Satisfiability with Sibling Axes,'' Proceedings of the 12th International Symposium on Database Programming Languages, Lecture Notes in Computer Science 5708, pp. 68-83 (2009-08).
  16. Hiroyuki Kato, Soichiro Hidaka, Zhenjiang Hu, Yasunori Ishihara and Keisuke Nakano, ``Rewriting XQuery to Avoid Redundant Expressions based on Static Emulation of XML Store,'' Programming Language Techniques for XML, An ACM SIGPLAN Workshop co-located with POPL 2009, http://db.ucsd.edu/planx2009/camera-ready/unpaginated/16.pdf (2009-01).
  17. Kenji Hashimoto, Fumikazu Takasuka, Kimihide Sakano, Yasunori Ishihara and Toru Fujiwara, ``Verification of the Security against Inference Attacks on XML Databases,'' Proceedings of the 10th Asia Pacific Web Conference, Lecture Notes in Computer Science 4976, pp. 359-370 (2008-04).
  18. Kenji Hashimoto, Yasunori Ishihara and Toru Fujiwara, ``Schema Update Operations Preserving the Expressive Power in XML Databases,'' Proceedings of the International Special Workshop on Databases for Next Generation Researchers, pp. 38-41 (2005-04).
  19. Yasunori Ishihara, Yumi Shimakawa and Toru Fujiwara, ``Type Inferability and Decidability of the Security Problem against Inference Attacks on Object-Oriented Databases,'' Proceedings of the 6th International Conference on Information and Communications Security, Lecture Notes in Computer Science 3269, pp. 145-157 (2004-10).
  20. Yasunori Ishihara, Shuichiro Ako and Toru Fujiwara, ``Security against Inference Attacks on Negative Information in Object-Oriented Databases,'' Proceedings of the Fourth International Conference on Information and Communications Security, Lecture Notes in Computer Science 2513, pp. 49-60 (2002-12).
  21. Shougo Shimizu, Yasunori Ishihara, Tomotaka Takarabe and Minoru Ito, ``A Probabilistic Database Model with Representability of Dependency among Tuples,'' Proceedings of the 4th World Multiconference on Systemics, Cybernetics and Informatics, Volume VIII, pp. 221-225 (2000-07). [PDF]
  22. Yasunori Ishihara, Toshiyuki Morita and Minoru Ito, ``The Security Problem against Inference Attacks on Object-Oriented Databases,'' Proceedings of the 13th IFIP Working Group 11.3 Conference on Database Security, pp. 245-258 (1999-07). [PDF]
  23. Yasunori Ishihara, Hiroyuki Seki and Minoru Ito, ``Type-Consistency Problems for Queries in Object-Oriented Databases,'' Proceedings of the 6th International Conference on Database Theory, Lecture Notes in Computer Science 1186, pp. 364-378 (1997-01). [PDF]
  24. Hiroyuki Seki, Yasunori Ishihara and Minoru Ito, ``Authorization Analysis of Queries in Object-Oriented Databases,'' Proceedings of the Fourth International Conference on Deductive and Object-Oriented Databases, Lecture Notes in Computer Science 1013, pp. 521-538 (1995-12). [PDF]
  25. Yasunori Ishihara, Hiroyuki Seki and Tadao Kasami, ``A Translation Method from Natural Language Specifications into Formal Specifications Using Contextual Dependencies,'' Proceedings of the IEEE International Symposium on Requirements Engineering, pp. 232-239 (1993-01). [PDF]

Domestic Conference (Reviewed)

  1. Akinari Yamaguchi, Shougo Shimizu, Yasunori Ishihara and Toru Fujiwara, ``A Bag-based Data Model with Global Conditions for Incomplete Information,'' Proceedings of the 16th Data Engineering Workshop, 1A-o5 (2005-02).
  2. Akinari Yamaguchi, Yasunori Ishihara and Toru Fujiwara, ``Closure Properties of a Bag-based Data Model for Incomplete Information,'' Proceedings of the 15th Data Engineering Workshop, http://www.ieice.org/iss/de/DEWS/proc/2004/paper/5-C/5-C-02.pdf (2004-03).
  3. Hiroaki Izuno, Yasunori Ishihara, Hiroyuki Seki and Minoru Ito, ``An Application of Type-Checking to Authorization Analysis of Queries in Object-Oriented Databases,'' Proceedings of the 6th Data Engineering Workshop pp. 15-22 (1995-03).

Domestic Conference (Unreviewed)

  1. Yasunori Ishihara, Hiroyuki Kato and Torsten Grust, ``XQuery Optimization by Avoiding Node Sorting and Duplicate Elimination,'' IEICE Technical Report, SS2015-83, Vol. 115, No. 508, pp. 43-48 (2016-03).
  2. Yasunori Ishihara, Shogo Shimizu, Kenji Hashimoto and Toru Fujiwara, ``Combining the Tractability of Duplicate-Free DTDs and Disjunction-Capsuled DTDs for XPath Satisfiability with Sibling Axes,'' IEICE Technical Report, SS2011-76, Vol. 111, No. 481, pp. 115-120 (2012-03).
  3. Kenji Hashimoto, Yasunori Ishihara and Toru Fujiwara, ``The Validity Problem of Positive XPath Queries in the Presence of DTDs,'' IEICE Technical Report, SS2010-47, Vol. 110, No. 336, pp. 49-54 (2010-12).
  4. Kenji Hashimoto, Yasunori Ishihara and Toru Fujiwara, ``XML Schema Evolution Preserving Information Based on User-Specified Relationship,'' IPSJ SIG Notes, 2008-MPS-72(10), pp. 37-40 (2008-12).
  5. Kenji Hashimoto, Yasunori Ishihara and Toru Fujiwara, ``Schema Update Operations Preserving the Expressive Power in XML Databases,'' IEICE Technical Report, DE2004-118, pp. 25-30 (2004-10).
  6. Yasunori Ishihara and Toru Fujiwara, ``A Formulation of the Security against Inference Attacks on Relational Databases,'' Computer Security Symposium 2001, pp. 25-30 (2001-10).
  7. Yeon-Dae Kwon, Shougo Shimizu, Yasunori Ishihara and Minoru Ito, ``Computational Complexity of Finding Correlated Itemsets,'' IEICE Technical Report, COMP99-89, pp. 81-88 (2000-03).
  8. Shougo Shimizu, Junji Yokouchi, Yasunori Ishihara and Minoru Ito, ``Complexity of the Type-Consistency Problem for Retrieval and Recursion-Free Acyclic Schemas,'' IEICE Technical Report, COMP99-88, pp. 73-80 (2000-03).
  9. Yasunori Ishihara, Shin Ishii, Hiroyuki Seki and Minoru Ito, ``Temporal Reasoning between Two Time Axes,'' IEICE Technical Report, COMP99-17, pp. 9-16 (1999-06).
  10. Toshiyuki Morita, Yasunori Ishihara and Minoru Ito, ``A Formal Approach to Detecting Security Flaws in Object-Oriented Database Schemas,'' IEICE Technical Report, COMP98-46, pp. 65-72 (1998-10).
  11. Toshiyuki Morita, Yasunori Ishihara, Hiroyuki Seki and Minoru Ito, ``On the Detection Problem of Data Flaws in Object-Oriented Databases,'' IEICE Technical Report, COMP97-66, pp. 49-56 (1997-11).
  12. Kazuaki Sakaguchi, Toshiyuki Morita, Yasunori Ishihara, Hiroyuki Seki and Minoru Ito, ``A Content-Based Authorization Model for Object-Oriented Databases,'' IEICE Technical Report, DE96-80, pp. 37-42 (1997-01).
  13. Yasunori Ishihara, Hiroyuki Seki and Minoru Ito, ``Type Consistency Problems for Queries in Object-Oriented Databases,'' LA Symposium '95 Winter (1996-02).
  14. Yasunori Ishihara, Hiroyuki Seki and Minoru Ito, ``Type Consistency Problems for Queries in Object-Oriented Databases,'' IPSJ SIG Notes, PRO-4-9, pp. 39-44 (1995-12).
  15. Yasunori Ishihara, Hiroyuki Seki and Tadao Kasami, ``An Algebraic Definition of a LOTOS-Like Language and Its Application,'' IPSJ SIG Notes, SE-99-1, pp. 1-8 (1994-07).

Valid CSS! Valid XHTML 1.1! Yasunori ISHIHARA