This page has only limited features, please log in for full access.

Prof. Hironori Washizaki
Waseda University

Basic Info


Research Keywords & Expertise

0 Computer Science
0 Software Quality Assurance
0 Smart Systems and Software Engineering
0 Machine Learning Engineering
0 Information Technology Education

Fingerprints

Computer Science

Honors and Awards

The user has no records in this section


Career Timeline

The user has no records in this section.


Short Biography

The user biography is not available.
Following
Followers
Co Authors
The list of users this user is following is empty.
Following: 0 users

Feed

Journal article
Published: 26 July 2021 in Information
Reads 0
Downloads 0

For effective vulnerability management, vulnerability and attack information must be collected quickly and efficiently. A security knowledge repository can collect such information. The Common Vulnerabilities and Exposures (CVE) provides known vulnerabilities of products, while the Common Attack Pattern Enumeration and Classification (CAPEC) stores attack patterns, which are descriptions of common attributes and approaches employed by adversaries to exploit known weaknesses. Due to the fact that the information in these two repositories are not linked, identifying related CAPEC attack information from CVE vulnerability information is challenging. Currently, the related CAPEC-ID can be traced from the CVE-ID using Common Weakness Enumeration (CWE) in some but not all cases. Here, we propose a method to automatically trace the related CAPEC-IDs from CVE-ID using three similarity measures: TF–IDF, Universal Sentence Encoder (USE), and Sentence-BERT (SBERT). We prepared and used 58 CVE-IDs as test input data. Then, we tested whether we could trace CAPEC-IDs related to each of the 58 CVE-IDs. Additionally, we experimentally confirm that TF–IDF is the best similarity measure, as it traced 48 of the 58 CVE-IDs to the related CAPEC-ID.

ACS Style

Kenta Kanakogi; Hironori Washizaki; Yoshiaki Fukazawa; Shinpei Ogata; Takao Okubo; Takehisa Kato; Hideyuki Kanuka; Atsuo Hazeyama; Nobukazu Yoshioka. Tracing CVE Vulnerability Information to CAPEC Attack Patterns Using Natural Language Processing Techniques. Information 2021, 12, 298 .

AMA Style

Kenta Kanakogi, Hironori Washizaki, Yoshiaki Fukazawa, Shinpei Ogata, Takao Okubo, Takehisa Kato, Hideyuki Kanuka, Atsuo Hazeyama, Nobukazu Yoshioka. Tracing CVE Vulnerability Information to CAPEC Attack Patterns Using Natural Language Processing Techniques. Information. 2021; 12 (8):298.

Chicago/Turabian Style

Kenta Kanakogi; Hironori Washizaki; Yoshiaki Fukazawa; Shinpei Ogata; Takao Okubo; Takehisa Kato; Hideyuki Kanuka; Atsuo Hazeyama; Nobukazu Yoshioka. 2021. "Tracing CVE Vulnerability Information to CAPEC Attack Patterns Using Natural Language Processing Techniques." Information 12, no. 8: 298.

Conference paper
Published: 10 June 2021 in Business Information Systems
Reads 0
Downloads 0

Participants’ feelings and impressions utilizing electroencephalography (EEG) and the effectiveness of code are compared for different types of programming sessions. EEG information is obtained as an alternate viewpoint during three programming sessions (solo, pair, and mob programming). MindWave Mobile 2 (brainwave detector) is equipped to collect the attention levels, meditation levels, and EEG brainwaves. These data are utilized to distinguish efficiencies, weaknesses, and points of interest by programming session. The results provide preliminary information to distinguish between the three sessions, but further studies are necessary to make firm conclusions. Additionally, alternative methods or systems are required to analyze the collected data.

ACS Style

Makoto Shiraishi; Hironori Washizaki; Daisuke Saito; Yoshiaki Fukazawa. Comparing Participants’ Brainwaves During Solo, Pair, and Mob Programming. Business Information Systems 2021, 200 -209.

AMA Style

Makoto Shiraishi, Hironori Washizaki, Daisuke Saito, Yoshiaki Fukazawa. Comparing Participants’ Brainwaves During Solo, Pair, and Mob Programming. Business Information Systems. 2021; ():200-209.

Chicago/Turabian Style

Makoto Shiraishi; Hironori Washizaki; Daisuke Saito; Yoshiaki Fukazawa. 2021. "Comparing Participants’ Brainwaves During Solo, Pair, and Mob Programming." Business Information Systems , no. : 200-209.

Journal article
Published: 23 May 2021 in Internet of Things
Reads 0
Downloads 0

Internet of Things (IoT) systems are exposed to a large variety of threats due to the inclusion of many devices which may have different owners and manufacturers. IoT applications often include parts in clouds and fogs as well as being part of larger cyber-physical systems; that is, these systems are very complex, which also contributes to their security problems. The design of IoT-based applications must be able to handle this complexity and heterogeneity; patterns are a good approach for this purpose because of their abstraction power. When using patterns, a good catalog is necessary. We survey and classify existing IoT security patterns to see their coverage and quality to evaluate how appropriate they are to be part of a useful catalog. A practical catalog must cover most of the standard security mechanisms. Pattern descriptions include several sections according to a template. We conclude that the number of existing patterns is insufficient for a working catalog and most of them are incomplete or use different descriptions; we need to build a unified catalog. We have started in that direction by creating new patterns or rewriting existing patterns to make them follow a common description. To use the patterns, we need a secure development methodology and we survey IoT development methodologies; we find that none of them considers security or uses patterns. As a solution, we propose modifying existing pattern-based methodologies for distributed systems, of which there is a good variety, using one of them as reference for concreteness. We provide a list of possible research directions about these topics.

ACS Style

Eduardo B. Fernandez; Hironori Washizaki; Nobukazu Yoshioka; Takao Okubo. The design of secure IoT applications using patterns: State of the art and directions for research. Internet of Things 2021, 15, 100408 .

AMA Style

Eduardo B. Fernandez, Hironori Washizaki, Nobukazu Yoshioka, Takao Okubo. The design of secure IoT applications using patterns: State of the art and directions for research. Internet of Things. 2021; 15 ():100408.

Chicago/Turabian Style

Eduardo B. Fernandez; Hironori Washizaki; Nobukazu Yoshioka; Takao Okubo. 2021. "The design of secure IoT applications using patterns: State of the art and directions for research." Internet of Things 15, no. : 100408.

Review
Published: 16 January 2021 in Information
Reads 0
Downloads 0

Security patterns encompass security-related issues in secure software system development and operations that often appear in certain contexts. Since the late 1990s, about 500 security patterns have been proposed. Although the technical components are well investigated, the direction, overall picture, and barriers to implementation are not. Here, a systematic literature review of 240 papers is used to devise a taxonomy for security pattern research. Our taxonomy and the survey results should improve communications among practitioners and researchers, standardize the terminology, security patterns; software patterns; systematic literature review (SLR)and increase the effectiveness of security patterns.

ACS Style

Hironori Washizaki; Tian Xia; Natsumi Kamata; Yoshiaki Fukazawa; Hideyuki Kanuka; Takehisa Kato; Masayuki Yoshino; Takao Okubo; Shinpei Ogata; Haruhiko Kaiya; Atsuo Hazeyama; Takafumi Tanaka; Nobukazu Yoshioka; G. Priyalakshmi. Systematic Literature Review of Security Pattern Research. Information 2021, 12, 36 .

AMA Style

Hironori Washizaki, Tian Xia, Natsumi Kamata, Yoshiaki Fukazawa, Hideyuki Kanuka, Takehisa Kato, Masayuki Yoshino, Takao Okubo, Shinpei Ogata, Haruhiko Kaiya, Atsuo Hazeyama, Takafumi Tanaka, Nobukazu Yoshioka, G. Priyalakshmi. Systematic Literature Review of Security Pattern Research. Information. 2021; 12 (1):36.

Chicago/Turabian Style

Hironori Washizaki; Tian Xia; Natsumi Kamata; Yoshiaki Fukazawa; Hideyuki Kanuka; Takehisa Kato; Masayuki Yoshino; Takao Okubo; Shinpei Ogata; Haruhiko Kaiya; Atsuo Hazeyama; Takafumi Tanaka; Nobukazu Yoshioka; G. Priyalakshmi. 2021. "Systematic Literature Review of Security Pattern Research." Information 12, no. 1: 36.

Review
Published: 16 November 2020
Reads 0
Downloads 0

Security patterns encompass security-related issues in secure software system development and operations that often appear in certain contexts. Since the late 1990s about 500 security patterns have been proposed. Although the technical components are well investigated, the direction, overall picture, and barriers to implementation are not. Here, a systematic literature review of 240 papers is used to devise a taxonomy for security pattern research. Our taxonomy and the survey results should improve communications among practitioners and researchers, standardize the terminology, and increase the effectiveness of security patterns.

ACS Style

Hironori Washizaki; Tian Xia; Natsumi Kamata; Yoshiaki Fukazawa; Hideyuki Kanuka; Takehisa Kato; Masayuki Yoshino; Takao Okubo; Shinpei Ogata; Haruhiko Kaiya; Atsuo Hazeyama; Takafumi Tanaka; Nobukazu Yoshioka; G Priyalakshmi. Systematic Literature Review of Security Pattern Research. 2020, 1 .

AMA Style

Hironori Washizaki, Tian Xia, Natsumi Kamata, Yoshiaki Fukazawa, Hideyuki Kanuka, Takehisa Kato, Masayuki Yoshino, Takao Okubo, Shinpei Ogata, Haruhiko Kaiya, Atsuo Hazeyama, Takafumi Tanaka, Nobukazu Yoshioka, G Priyalakshmi. Systematic Literature Review of Security Pattern Research. . 2020; ():1.

Chicago/Turabian Style

Hironori Washizaki; Tian Xia; Natsumi Kamata; Yoshiaki Fukazawa; Hideyuki Kanuka; Takehisa Kato; Masayuki Yoshino; Takao Okubo; Shinpei Ogata; Haruhiko Kaiya; Atsuo Hazeyama; Takafumi Tanaka; Nobukazu Yoshioka; G Priyalakshmi. 2020. "Systematic Literature Review of Security Pattern Research." , no. : 1.

Review
Published: 24 August 2020 in Sustainability
Reads 0
Downloads 0

In this review, a Systematic Literature Review (SLR) on Open Body of Knowledge (BOK) is presented. Moreover, the theoretical base to build a model for knowledge description was created, and it was found that there is a lack of guidelines to describe knowledge description because of the dramatically increasing number of requirements to produce an Open BOK, the difficulty of comparing related BOK contents, and the fact that reusing knowledge description is a very laborious task. In this sense, this review can be considered as a first step in building a model that can be used for describing knowledge description in Open BOK. Finally, in order to improve the educational context, a comparison among BOK, structure, and evolution is conducted.

ACS Style

Pablo Alejandro Quezada-Sarmiento; Jon A. Elorriaga; Ana Arruarte; Hironori Washizaki. Open BOK on Software Engineering Educational Context: A Systematic Literature Review. Sustainability 2020, 12, 6858 .

AMA Style

Pablo Alejandro Quezada-Sarmiento, Jon A. Elorriaga, Ana Arruarte, Hironori Washizaki. Open BOK on Software Engineering Educational Context: A Systematic Literature Review. Sustainability. 2020; 12 (17):6858.

Chicago/Turabian Style

Pablo Alejandro Quezada-Sarmiento; Jon A. Elorriaga; Ana Arruarte; Hironori Washizaki. 2020. "Open BOK on Software Engineering Educational Context: A Systematic Literature Review." Sustainability 12, no. 17: 6858.

Journal article
Published: 18 June 2020 in IEEE Internet of Things Journal
Reads 0
Downloads 0

Due to the widespread proliferation of today's internet of things (IoT), a system designer needs IoT system and software design patterns to assist in designing scalable and replicable solutions. Patterns are encapsulations of reusable common problems and solutions under specific contexts. Many IoT patterns have been published such as IoT design patterns and IoT architecture patterns to document the successes (and failures) in IoT systems and software development. However, because these patterns are not well classified, their adoption does not live up to their potential. To understand the reasons, we conducted a systematic literature review. From the 32 identified papers, 143 IoT architecture and design patterns were extracted. We analyzed these patterns according to several characteristics and outlined directions for improvements when publishing and adopting IoT patterns. Of the extracted patterns, 57% are non-IoT patterns, suggesting that IoT systems and software are often designed via conventional architecture and design patterns that are not specific to IoT design. Although most IoT design patterns are applicable to any domain, IoT architecture patterns tend to be domain-specific, implying that the unique nature of IoT adoption in specific domains appears at the architecture level. As more domains adopt IoT, the number of domain-specific IoT design patterns should increase. In terms of quality attributes, many IoT patterns address compatibility, security, and maintainability.

ACS Style

Hironori Washizaki; Shinpei Ogata; Atsuo Hazeyama; Takao Okubo; Eduardo B. Fernandez; Nobukazu Yoshioka. Landscape of Architecture and Design Patterns for IoT Systems. IEEE Internet of Things Journal 2020, 7, 10091 -10101.

AMA Style

Hironori Washizaki, Shinpei Ogata, Atsuo Hazeyama, Takao Okubo, Eduardo B. Fernandez, Nobukazu Yoshioka. Landscape of Architecture and Design Patterns for IoT Systems. IEEE Internet of Things Journal. 2020; 7 (10):10091-10101.

Chicago/Turabian Style

Hironori Washizaki; Shinpei Ogata; Atsuo Hazeyama; Takao Okubo; Eduardo B. Fernandez; Nobukazu Yoshioka. 2020. "Landscape of Architecture and Design Patterns for IoT Systems." IEEE Internet of Things Journal 7, no. 10: 10091-10101.

Journal article
Published: 01 January 2020 in Journal of Information Technology Education: Innovations in Practice
Reads 0
Downloads 0

Aim/Purpose: Although many computer science measures have been proposed, visualizing individual students’ capabilities is difficult, as those measures often rely on specific tools and methods or are not graded. To solve these problems, we propose a rubric for measuring and visualizing the effects of learning computer programming for elementary school students enrolled in computer science education (CSE), which is independent of the programming language being used. Background: In this research, we proposed a rubric based on existing CSE standards and criteria having a programming education-learning goal. We then applied this rubric to actual lessons to visualize the educational effects. Methodology: The proposed new rubric for teaching computer programming, based on existing standards and criteria, was applied to fourth- and sixth-grade students in Japan. We assessed which skills were cultivated through quizzes before and after the teaching. Contribution: This paper contributes on how to make and utilize a rubric for programming education in computer science. We evaluated and visualized the proposed rubric’s learning effects on children and found that our proposed rubrics are independent of any particular method or tool. Findings: The results of this survey are twofold: (1) we proposed a rubric of programming education in computer science, independent of the programming tools used and (2) we succeeded in visualizing students’ learning stages by applying the proposed rubric to programming education conducted in a Japanese elementary school. Recommendations for Practitioners: Evaluating educational effects in CSE is important. In particular, graded assessments of learner abilities can reveal individual characteristics. This research is useful for assessing CSE because it focuses specifically on programming education. Recommendation for Researchers: The rubric’s suggestions and quality improvements in CSE help learners assess their learning progress and will clarify the cultivated computer science skills. Impact on Society: This research evaluates CSE based on a rubric in the programming education field. Future Research: Future work is needed to improve the proposed rubric’s quality and relevance. Also, this rubric should be applied to many classes to increase the number of evaluations and analyses.

ACS Style

Daisuke Saito; Shota Kaieda; Hironori Washizaki; Yoshiaki Fukazawa. Rubric for Measuring and Visualizing the Effects of Learning Computer Programming for Elementary School Students. Journal of Information Technology Education: Innovations in Practice 2020, 19, 203 -227.

AMA Style

Daisuke Saito, Shota Kaieda, Hironori Washizaki, Yoshiaki Fukazawa. Rubric for Measuring and Visualizing the Effects of Learning Computer Programming for Elementary School Students. Journal of Information Technology Education: Innovations in Practice. 2020; 19 ():203-227.

Chicago/Turabian Style

Daisuke Saito; Shota Kaieda; Hironori Washizaki; Yoshiaki Fukazawa. 2020. "Rubric for Measuring and Visualizing the Effects of Learning Computer Programming for Elementary School Students." Journal of Information Technology Education: Innovations in Practice 19, no. : 203-227.

Conference paper
Published: 23 August 2019 in Econometrics for Financial Applications
Reads 0
Downloads 0

Temporal logics are widely used in software verification such as model checking. However, creating temporal logics such as linear temporal logics (LTLs) based on property specifications written in a natural language is difficult due to practitioners’ unfamiliarity with property specifications and notations of temporal logics. Although property specification patterns have been introduced to help write correct temporal logics, creating temporal logics using property specification patterns requires an understanding of the pattern system. Since some patterns are difficult to understand, especially for beginners, and the final temporal logics are usually complicated, creating temporal logics using pattern systems is time consuming and error-prone. Here, we introduce a method to create LTLs based on property specification patterns. We experimentally compare the required time and accuracy of our approach to those using property specification patterns. Our approach can improve the creation of LTLs in terms of speed and accuracy. Although our experiment is implemented in Japanese, the results should be applicable to other languages such as English. We also provide a visualization scheme so that practitioners can understand the generated LTLs and confirm that they are correct.

ACS Style

Weibin Luo; Hironori Washizaki; Yoshiaki Fukazawa. Generating Linear Temporal Logics Based on Property Specification Templates. Econometrics for Financial Applications 2019, 1 -15.

AMA Style

Weibin Luo, Hironori Washizaki, Yoshiaki Fukazawa. Generating Linear Temporal Logics Based on Property Specification Templates. Econometrics for Financial Applications. 2019; ():1-15.

Chicago/Turabian Style

Weibin Luo; Hironori Washizaki; Yoshiaki Fukazawa. 2019. "Generating Linear Temporal Logics Based on Property Specification Templates." Econometrics for Financial Applications , no. : 1-15.

Journal article
Published: 01 July 2019 in IEEE Access
Reads 0
Downloads 0

GQM+Strategies® aligns business goals and strategies to help organizations achieve business objectives. Using the initial set of goals and strategies, GQM+Strategies creates a grid, through which goals and strategies are linked throughout an organization by iteratively determining lower-level goals and strategies. GQM+Strategies creates consistency within a vertical refinement tree, but cannot handle horizontal relationships from different branches. Hence, horizontal relationships lead to problems such as redundant investments, inefficient resource utilization, and failure. Horizontal Relation Identification Method (HoRIM) is proposed to handle horizontal relationships. HoRIM is a grid modification approach that identifies differences between the initial GQM+Strategies grid and a model by Interpretive Structural Modeling (ISM). Herein we experimentally demonstrate that HoRIM finds about 1.5 times more horizontal relationships than an ad hoc review. Additionally, we show its practicality via a case study involving a real-world application.

ACS Style

Yohei Aoki; Chimaki Shimura; Hironori Washizaki; Takanobu Kobori; Yoshiaki Fukazawa; Katsutoshi Shintani; Takuto Nonomura. Horizontal Relation Identification Method to Handle Misalignment of Goals and Strategies Across Organizational Units. IEEE Access 2019, 7, 89766 -89776.

AMA Style

Yohei Aoki, Chimaki Shimura, Hironori Washizaki, Takanobu Kobori, Yoshiaki Fukazawa, Katsutoshi Shintani, Takuto Nonomura. Horizontal Relation Identification Method to Handle Misalignment of Goals and Strategies Across Organizational Units. IEEE Access. 2019; 7 (99):89766-89776.

Chicago/Turabian Style

Yohei Aoki; Chimaki Shimura; Hironori Washizaki; Takanobu Kobori; Yoshiaki Fukazawa; Katsutoshi Shintani; Takuto Nonomura. 2019. "Horizontal Relation Identification Method to Handle Misalignment of Goals and Strategies Across Organizational Units." IEEE Access 7, no. 99: 89766-89776.

Preprint
Published: 09 April 2019
Reads 0
Downloads 0

Requirements for cloud services include security and privacy. Although many security patterns, privacy patterns, and non-pattern-based knowledge have been reported, knowing which pattern or combination of patterns to use in a specific scenario is challenging due to the sheer volume of options and the layered cloud stack. To deal with security and privacy in cloud services, this study proposes the Cloud Security and Privacy Metamodel (CSPM). CSPM uses a consistent approach to classify and support existing security and privacy patterns. In addition, CSPM is used to develop a security and privacy awareness process to develop cloud systems. The effectiveness and practicality of CSPM is demonstrated via several case studies.

ACS Style

Tian Xia; Hironori Washizaki; Yoshiaki Fukazawa; Takehisa Kato; Haruhiko Kaiya; Shinpei Ogata; Eduardo B. Fernandez; Hideyuki Kanuka; Masayuki Yoshino; Dan Yamamoto; Takao Okubo; Nobukazu Yoshioka; Atsuo Hazeyama. Metamodel for Security and Privacy Knowledge in Cloud Service Development. 2019, 1 .

AMA Style

Tian Xia, Hironori Washizaki, Yoshiaki Fukazawa, Takehisa Kato, Haruhiko Kaiya, Shinpei Ogata, Eduardo B. Fernandez, Hideyuki Kanuka, Masayuki Yoshino, Dan Yamamoto, Takao Okubo, Nobukazu Yoshioka, Atsuo Hazeyama. Metamodel for Security and Privacy Knowledge in Cloud Service Development. . 2019; ():1.

Chicago/Turabian Style

Tian Xia; Hironori Washizaki; Yoshiaki Fukazawa; Takehisa Kato; Haruhiko Kaiya; Shinpei Ogata; Eduardo B. Fernandez; Hideyuki Kanuka; Masayuki Yoshino; Dan Yamamoto; Takao Okubo; Nobukazu Yoshioka; Atsuo Hazeyama. 2019. "Metamodel for Security and Privacy Knowledge in Cloud Service Development." , no. : 1.

Preprint
Published: 26 February 2019
Reads 0
Downloads 0

Patterns are encapsulations of problems and solutions under specific contexts. As the industry is realizing many successes (and failures) in IoT systems development and operations, many IoT patterns have been published such as IoT design patterns and IoT architecture patterns. Because these patterns are not well classified, their adoption does not live up to their potential. To understand the reasons, this paper analyzes an extensive set of published IoT architecture and design patterns according to several dimensions and outlines directions for improvements in publishing and adopting IoT patterns.

ACS Style

Hironori Washizaki; Nobukazu Yoshioka; Atsuo Hazeyama; Takehisa Kato; Haruhiko Kaiya; Shinpei Ogata; Takao Okubo; Eduardo B. Fernandez. Landscape of IoT Patterns. 2019, 1 .

AMA Style

Hironori Washizaki, Nobukazu Yoshioka, Atsuo Hazeyama, Takehisa Kato, Haruhiko Kaiya, Shinpei Ogata, Takao Okubo, Eduardo B. Fernandez. Landscape of IoT Patterns. . 2019; ():1.

Chicago/Turabian Style

Hironori Washizaki; Nobukazu Yoshioka; Atsuo Hazeyama; Takehisa Kato; Haruhiko Kaiya; Shinpei Ogata; Takao Okubo; Eduardo B. Fernandez. 2019. "Landscape of IoT Patterns." , no. : 1.

Chapter
Published: 22 February 2019 in Algorithms and Data Structures
Reads 0
Downloads 0

Handover of knowledge and responsibilities can cause problems when people transfer to other parts of a company or retire. Handover issues became apparent in Japan when many people from the Baby Boomer Generation retired simultaneously in 2007. In particular, this was a resounding issue in the software industry. Most business people are familiar with the concept of a handover. Although effective handovers are crucial for seamless business operations during personnel changes, the preferable elements for a handover are ambiguous. In this paper, we outline a “Pattern Language for Knowledge Handover when People Transition”. The pattern language consists of handover patterns. Actual handover patterns were pattern mined from our experience as well as from industrial interviews. We originally started with handover anti-patterns which identify actual problems for a handover. This led us to pattern mine the handover patterns that provide strategies to mitigate these problems. The examples are from software industry, but these patterns are applicable to other domains.

ACS Style

Kei Ito; Joseph W. Yoder; Hironori Washizaki; Yoshiaki Fukazawa. A Pattern Language for Knowledge Handover When People Transition. Algorithms and Data Structures 2019, 183 -209.

AMA Style

Kei Ito, Joseph W. Yoder, Hironori Washizaki, Yoshiaki Fukazawa. A Pattern Language for Knowledge Handover When People Transition. Algorithms and Data Structures. 2019; ():183-209.

Chicago/Turabian Style

Kei Ito; Joseph W. Yoder; Hironori Washizaki; Yoshiaki Fukazawa. 2019. "A Pattern Language for Knowledge Handover When People Transition." Algorithms and Data Structures , no. : 183-209.

Chapter
Published: 01 January 2019 in Handbook of Research on Advancing Cybersecurity for Digital Transformation
Reads 0
Downloads 0

Simply confirming potential threats and vulnerabilities in an early stage of the development process (e.g., the requirement or design phase) is insufficient because software developers are not necessarily security experts. Additionally, even if the software design considers security at an early stage, whether the software actually satisfies the security requirements must be confirmed. To realize secure design, the authors propose an application to design software systems with verification of security patterns using model testing. The method provides extended security patterns, which include requirement- and design-level patterns as well as a new designing and model testing process that uses these patterns. Once developers specify threats and vulnerabilities in the target system in an early stage of development, the method can verify whether the security patterns are properly applied and assess if the vulnerabilities are resolved.

ACS Style

Takanori Kobashi; Hironori Washizaki; Nobukazu Yoshioka; Haruhiko Kaiya; Takao Okubo; Yoshiaki Fukazawa. Designing Secure Software by Testing Application of Security Patterns. Handbook of Research on Advancing Cybersecurity for Digital Transformation 2019, 136 -169.

AMA Style

Takanori Kobashi, Hironori Washizaki, Nobukazu Yoshioka, Haruhiko Kaiya, Takao Okubo, Yoshiaki Fukazawa. Designing Secure Software by Testing Application of Security Patterns. Handbook of Research on Advancing Cybersecurity for Digital Transformation. 2019; ():136-169.

Chicago/Turabian Style

Takanori Kobashi; Hironori Washizaki; Nobukazu Yoshioka; Haruhiko Kaiya; Takao Okubo; Yoshiaki Fukazawa. 2019. "Designing Secure Software by Testing Application of Security Patterns." Handbook of Research on Advancing Cybersecurity for Digital Transformation , no. : 136-169.

Journal article
Published: 25 September 2018 in EAI Endorsed Transactions on e-Learning
Reads 0
Downloads 0
ACS Style

Masashi Shuto; Hironori Washizaki; Yoshiaki Fukazawa; Shoso Yamato; Masashi Okubo; Bastian Tenbergen. Personality and Learning Effectiveness of Teams in Information Systems Education Courses. EAI Endorsed Transactions on e-Learning 2018, 5, 1 .

AMA Style

Masashi Shuto, Hironori Washizaki, Yoshiaki Fukazawa, Shoso Yamato, Masashi Okubo, Bastian Tenbergen. Personality and Learning Effectiveness of Teams in Information Systems Education Courses. EAI Endorsed Transactions on e-Learning. 2018; 5 (17):1.

Chicago/Turabian Style

Masashi Shuto; Hironori Washizaki; Yoshiaki Fukazawa; Shoso Yamato; Masashi Okubo; Bastian Tenbergen. 2018. "Personality and Learning Effectiveness of Teams in Information Systems Education Courses." EAI Endorsed Transactions on e-Learning 5, no. 17: 1.

Conference paper
Published: 27 August 2018 in Proceedings of the 13th International Conference on Predictive Models and Data Analytics in Software Engineering
Reads 0
Downloads 0
ACS Style

Eduardo B. Fernandez; Nobukazu Yoshioka; Hironori Washizaki. Evaluating the degree of security of a system built using security patterns. Proceedings of the 13th International Conference on Predictive Models and Data Analytics in Software Engineering 2018, 43 .

AMA Style

Eduardo B. Fernandez, Nobukazu Yoshioka, Hironori Washizaki. Evaluating the degree of security of a system built using security patterns. Proceedings of the 13th International Conference on Predictive Models and Data Analytics in Software Engineering. 2018; ():43.

Chicago/Turabian Style

Eduardo B. Fernandez; Nobukazu Yoshioka; Hironori Washizaki. 2018. "Evaluating the degree of security of a system built using security patterns." Proceedings of the 13th International Conference on Predictive Models and Data Analytics in Software Engineering , no. : 43.

Conference paper
Published: 04 August 2018 in Blockchain Technology and Innovations in Business Processes
Reads 0
Downloads 0

A screen transition model (STM) is one of the effective design models to specify user interface structure and behavior. Moreover, a lot of methods to generate a prototype system from a STM have been proposed. However, developers are still required to create complex STMs manually and ensure that the STMs are consistent with other models. Therefore, we propose a tool to automatically generate a STM from Object CRUD (OCRUD) diagrams. OCRUD diagrams can be obtained by concreting a conceptual model which represents the data structure of domains. Evaluation results show that the proposed tool was useful for STM modeling and discovering mistakes such as omissions of elements to model.

ACS Style

Yukiya Yazawa; Shinpei Ogata; Kozo Okano; Haruhiko Kaiya; Hironori Washizaki. Tool to Automatically Generate a Screen Transition Model Based on a Conceptual Model. Blockchain Technology and Innovations in Business Processes 2018, 158 -167.

AMA Style

Yukiya Yazawa, Shinpei Ogata, Kozo Okano, Haruhiko Kaiya, Hironori Washizaki. Tool to Automatically Generate a Screen Transition Model Based on a Conceptual Model. Blockchain Technology and Innovations in Business Processes. 2018; ():158-167.

Chicago/Turabian Style

Yukiya Yazawa; Shinpei Ogata; Kozo Okano; Haruhiko Kaiya; Hironori Washizaki. 2018. "Tool to Automatically Generate a Screen Transition Model Based on a Conceptual Model." Blockchain Technology and Innovations in Business Processes , no. : 158-167.

Conference paper
Published: 04 August 2018 in Blockchain Technology and Innovations in Business Processes
Reads 0
Downloads 0

Most stakeholders refer to past bug reports when they encounter a problem since bug reports contain useful information. However, searching for specific content is difficult because there are many bug reports. The desired content depends on the viewpoint of the stakeholder. A full text search includes unwanted content, which is costly. Although this problem has been previously noted, a solution has yet to be proposed. Herein we propose Content-based Labeling Method as a solution. This method organizes information in a bug report by labeling each sentence based on its contents, allowing stakeholders’ viewpoints to be considered. We evaluate the improvement in searchability. The Content-based Labeling Method improves the searchability according to the F-measure and precision of the experimental results.

ACS Style

Yuki Noyori; Hironori Washizaki; Yoshiaki Fukazawa; Hideyuki Kanuka; Keishi Ooshima; Ryosuke Tsuchiya. Improved Searchability of Bug Reports Using Content-Based Labeling with Machine Learning of Sentences. Blockchain Technology and Innovations in Business Processes 2018, 75 -85.

AMA Style

Yuki Noyori, Hironori Washizaki, Yoshiaki Fukazawa, Hideyuki Kanuka, Keishi Ooshima, Ryosuke Tsuchiya. Improved Searchability of Bug Reports Using Content-Based Labeling with Machine Learning of Sentences. Blockchain Technology and Innovations in Business Processes. 2018; ():75-85.

Chicago/Turabian Style

Yuki Noyori; Hironori Washizaki; Yoshiaki Fukazawa; Hideyuki Kanuka; Keishi Ooshima; Ryosuke Tsuchiya. 2018. "Improved Searchability of Bug Reports Using Content-Based Labeling with Machine Learning of Sentences." Blockchain Technology and Innovations in Business Processes , no. : 75-85.

Journal article
Published: 03 August 2018 in IEEE Internet of Things Journal
Reads 0
Downloads 0

Internet of Things (IoT) aims to bring connectivity to almost every objects, i.e., things, found in the physical space. It extends connectivity to everyday things, however, such increase in the connectivity creates many prominent challenges. Context: Generally, IoT opens the door for new applications for machine-to-machine (M2M) and human-to-human communications. The current trend of collaborating, distributed teams through the Internet, mobile communications, and autonomous entities, e.g., robots, is the first phase of the IoT to develop and deliver diverse services and applications. However, such collaborations is threatened by the fragmentation that we witness in the industry nowadays as it brings difficulty to integrate the diverse technologies of the various objects found in IoT systems. Diverse technologies induce interoperability issues while designing and developing various services and applications, hence, limiting the possibility of reusing the data, more specifically, the software (including frameworks, firmware, APIs, user interfaces) as well as of facing issues, like security threats and bugs, when developing new services or applications. Different aspects of handling data collection ranging from discovering smart sensors for data collection, integrating and applying reasoning on them must be available to provide interoperability and flexibility to the diverse objects interacting in the system. However, such approaches are bound to be challenged in future IoT scenarios as they bring substantial performance impairments in settings with the very large number of collaborating devices and technologies. Objective: We raise the awareness of the community about the lack of interoperability among technologies developed for IoT and challenges that their integration poses. We also provide guidelines for researchers and practitioners interested in connecting IoT networks and devices to develop services and applications. Method: We apply the methods advocated by the Evidence-based Software Engineering paradigm (EBSE). This paradigm and its core tool, the Systematic Literature Review (SLR), were introduced to the sofware-engineering research community early 2004 to help researchers and industry systematically and objectively gather and aggregate evidences about different topics. In this paper, we conduct a SLR of both IoT interoperability issues and the state-of-practice of IoT technologies in the industry, highlighting the integration challenges related to the IoT that have significantly shifted the landscape of Internet-based collaborative services and applications nowadays. Results: Our SLR identifies a number of studies from journals, conferences, and workshops with the highest quality in the field. This SLR reports different trends, including frameworks and technologies, for the IoT for better comprehension of the paradigm and discusses the integration and interoperability challenges across the different layers of this technology while shedding light on the current IoT state-of-practice. It also discusses some future research directions for the community.

ACS Style

Mohab Aly; Foutse Khomh; Yann-Gael Gueheneuc; Hironori Washizaki; Soumaya Yacout. Is Fragmentation a Threat to the Success of the Internet of Things? IEEE Internet of Things Journal 2018, 6, 472 -487.

AMA Style

Mohab Aly, Foutse Khomh, Yann-Gael Gueheneuc, Hironori Washizaki, Soumaya Yacout. Is Fragmentation a Threat to the Success of the Internet of Things? IEEE Internet of Things Journal. 2018; 6 (1):472-487.

Chicago/Turabian Style

Mohab Aly; Foutse Khomh; Yann-Gael Gueheneuc; Hironori Washizaki; Soumaya Yacout. 2018. "Is Fragmentation a Threat to the Success of the Internet of Things?" IEEE Internet of Things Journal 6, no. 1: 472-487.

Conference paper
Published: 01 July 2018 in 2018 IEEE 42nd Annual Computer Software and Applications Conference (COMPSAC)
Reads 0
Downloads 0

With the growing number of services on the Internet, the need for secure software development has increased. It is required for secure software development to consider security in the whole development life cycle. It is indispensable for secure software development to use various types of security knowledge. This study deals with security requirement analysis. Existing security requirements modeling systems do not provide a function to create an artifact while referring to security knowledge in an integrated manner. In this paper, the authors develop a modeling support system for a misuse case diagram that enables the association of knowledge with elements that constitute the diagram. The results of an experiment using the system show the system's usefulness in both the integration of the knowledge base with the artifact creation environment and the association of the knowledge with the elements of the diagram.

ACS Style

Atsuo Hazeyama; Shun'ichi Tanaka; Takafumi Tanaka; Hiroaki Hashiura; Seiji Munetoh; Takao Okubo; Haruhiko Kaiya; Hironori Washizaki; Nobukazu Yoshioka. Security Requirement Modeling Support System Using Software Security Knowledge Base. 2018 IEEE 42nd Annual Computer Software and Applications Conference (COMPSAC) 2018, 2, 234 -239.

AMA Style

Atsuo Hazeyama, Shun'ichi Tanaka, Takafumi Tanaka, Hiroaki Hashiura, Seiji Munetoh, Takao Okubo, Haruhiko Kaiya, Hironori Washizaki, Nobukazu Yoshioka. Security Requirement Modeling Support System Using Software Security Knowledge Base. 2018 IEEE 42nd Annual Computer Software and Applications Conference (COMPSAC). 2018; 2 ():234-239.

Chicago/Turabian Style

Atsuo Hazeyama; Shun'ichi Tanaka; Takafumi Tanaka; Hiroaki Hashiura; Seiji Munetoh; Takao Okubo; Haruhiko Kaiya; Hironori Washizaki; Nobukazu Yoshioka. 2018. "Security Requirement Modeling Support System Using Software Security Knowledge Base." 2018 IEEE 42nd Annual Computer Software and Applications Conference (COMPSAC) 2, no. : 234-239.