PAPERS | In Japanese and English
Kaiya Home Page
To be presented or published Update 30 November 2024.
Already published in Journals
  1. Haruhiko Kaiya, Shinpei Ogata, Shinpei Hayashi. Evaluating Introduction of Systems by Goal Dependency Modeling. IEICE TRANSACTIONS on Information and Systems Vol.E107-D No.10. pp.1297-1311. Oct. 2024. JPY 261580. https://doi.org/10.1587/transinf.2023EDP7201
  2. Hironori Washizaki, Tian Xia, Natsumi Kamata, Yoshiaki Fukazawa, Hideyuki Kanuka, Takehisa Kato, Masayuki Yoshino, Takao Okubo, Shinpei Ogata, Haruhiko Kaiya, Atsuo Hazeyama, Takafumi Tanaka, Nobukazu Yoshioka and G. Priyalakshmi. Systematic Literature Review of Security Pattern Research. information 2021, 12(1) https://doi.org/10.3390/info12010036
  3. Yijun Yu, Haruhiko Kaiya, Nobukazu Yoshioka, Zhenjiang Hu, Hironori Washizaki, Yingfei Xiong, Amin Hosseinian-Far. Goal Modeling for Security Problem Matching and Pattern Enforcement. International Journal of Secure Software Engineering (IJSSE), Vol. 8, Issue. 3, Pages 42-57, 2017. [Abstract]
  4. Masatoshi Yoshizawa, Hironori Washizaki, Yoshiaki Fukazawa, Takao Okubo, Haruhiko Kaiya and Nobukazu Yoshioka. Implementation Support of Security Design Patterns Using Test Templates. information 2016, 7(2), 34; doi:10.3390/info7020034. [Abstract]
  5. Takanori Kobashi, Nobukazu Yoshioka, Haruhiko Kaiya, Hironori Washizaki, Takao Okubo, and Yoshiaki Fukazawa. Validating Security Design Pattern Applications by Testing Design Models. International Journal of Secure Software Engineering (IJSSE), Vol. 5, Issue. 4, pp. 1-30, Dec. 2014. IGI-Global, DOI: 10.4018/ijsse.2014100101 [Abstract]
  6. Takao Okubo, Kenji Taguchi, Haruhiko Kaiya, and Nobukazu Yoshioka. MASG: Advanced Misuse Case Analysis Model with Assets and Security Goals. Journal of Information Processing, Vol. 22, No. 3, pp. 536-546, Jul. 2014, DOI: 10.2197/ipsjjip.22.536 [Abstract]
  7. Haruhiko Kaiya, Junya Sakai, Shinpei Ogata and Kenji Kaijiri. Eliciting Security Requirements for an Information System using Asset Flows and Processor Deployment. International Journal of Secure Software Engineering (IJSSE), IGI Global, Vol. 4, Issue 3, pp. 42-63, Jul.-Sep. 2013. DOI: 10.4018/jsse.2013070103 [Abstract]
  8. Motoshi Saeki, Shinpei Hayashi, Haruhiko Kaiya. Enhancing Goal-Oriented Security Requirements Analysis Using Common Criteria-Based Knowledge. International Journal of Software Engineering and Knowledge Engineering (IJSEKE). World Scientific Publishing, Vol. 23, No. 05, pp. 695-720, Jun. 2013. DOI: 10.1142/S0218194013500174 [Abstract]
  9. Haruhiko Kaiya, Masahiro Umemura, Shinpei Ogata, and Kenji Kaijiri. Spectrum analysis on quality requirements consideration in software design documents. SpringerPlus, Vol. 2, Issue 1, No. 310, pp. 1-14, 11 Jul. 2013, DOI: 10.1186/2193-1801-2-310, 1095 USD. [HTML]
  10. Haruhiko Kaiya and Atsushi Ohnishi. Finding incorrect and missing quality requirements definitions using requirements frame. IEICE Transactions on Information and Systems, Vol. E95-D, No. 4, pp. 1031-1043, Apr. 2012. DOI 10.1587/transinf.E95.D.1012 [Abstract]
  11. Takako Nakatani, Narihito Kondo, Junko Shirogane, Haruhiko Kaiya, Shozo Hori, and Keiichi Katamine. Toward the decision tree for inferring requirements maturation types. IEICE Transactions on Information and Systems, Vol. E95-D, No. 4, pp. 1021-1030, Apr. 2012. DOI 10.1587/transinf.E95.D.1021 [Abstract]
  12. Shinpei Hayashi, Daisuke Tanabe, Haruhiko Kaiya, and Motoshi Saeki. Impact analysis on an attributed goal graph. IEICE Transactions on Information and Systems, Vol. E95-D, No. 4, pp. 1012-1020, Apr. 2012. DOI 10.1587/transinf.E95.D.1031 [Abstract]
  13. Takao Okubo, Haruhiko Kaiya, and Npbukazu Yoshioka. Analyzing Impacts on Software Enhancement Caused by Security Design Alternatives with Patterns. International Journal of Secure Software Engineering (IJSSE), IGI Global, Vol. 3, No. 1, pp. 37-61, Jan.-Mar. 2012. DOI: 10.4018/jsse.2012010103. [Abstract]
  14. Haruhiko Kaiya, Masaaki Tanigawa, Shunichi Suzuki, Tomonori Sato, Akira Osada, and Kenji Kaijiri. Improving Reliability of Spectrum Analysis for Software Quality Requirements using TCM. IEICE Transactions on Information and Systems, Vol. E93-D, No. 4, pp. 702-712, Apr. 2010. [Abstract]
  15. Haruhiko Kaiya, kouta Sasai, and Kenji Kaijiri. PORTAM: policy,requirements,and threats analyzer for mobile code applications. Progress in Informatics, No. 5, pp. 7-18, Apr. 2008.
  16. Haruhiko Kaiya, Akira Osada, and Kenji Kaijiri. Identifying Stakeholders and Their Preferences about NFR by Comparing Use Case Diagrams of Several Existing Systems. IEICE Transactions on Information and Systems, Vol. E91-D, No. 4, pp. 897-906, Apr. 2008. [Abstract]
  17. Shuichiro Yamamoto, Haruhiko Kaiya, Karl Cox, and Steven Bleistein. Goal Oriented Requirements Engineering: Trends and Issues. IEICE Transactions on Information and Systems, Vol. E89-D, No. 11, pp. 2701-2711, Nov. 2006. [Abstract]
  18. Haruhiko Kaiya, Daisuke Shinbara, Junichi Kawano and Motoshi Saeki. Improving the Detection of Requirements Discordances Among Stakeholders. Requirements Engineering, Springer-Verlag. DOI: 10.1007/s00766-005-0017-2, Vol. 10, No. 4, pp. 289 - 303, Dec. 2005. [full text in PDF format] [Abstract]
  19. Kazuma Aizawa, Haruhiko Kaiya, and Kenji Kaijiri. Practical and Incremental Maintenance of Software Resources in Consumer Electronics Products. IEICE Transactions on Information and Systems, Vol. E88-D, No. 6, pp. 1117-1125, Jun. 2005. [Abstract]
  20. Haruhiko Kaiya, Kouta Sasaki, and Kenji Kaijiri. A Method to Develop Feasible Requirements for Java Mobile Code Application. IEICE Trans. Inf. and Syst., Vol. E87-D, No. 4, pp. 811-821, Apr. 2004. [full text in PDF format] [Abstract]
  21. Haruhiko Kaiya and Kenji Kaijiri. Refining Behavioral Specification for Satisfying Non-functional Requirements of Stakeholders. IEICE Trans. Inf. and Syst., Vol. E85-D, No. 4, pp. 623-636, Apr. 2002. [full text in PDF format] [Abstract]
  22. Haruhiko Kaiya, Nobuyuki Miura, Go Anai, Tsuyoshi Ebata, Hiroki Nagaoka, and Motoshi Saeki, Preliminary Experiments of A Computer System for Face-to-face Meetings, Systems and Computers in Japan, Vol.28, No.2, pp. 21-32, Feb. 1997. ISSN 0882-1666. Scripta Technica, Inc. Asubsidiary of John Wiley & Sons, Inc. [full text in PDF format] [Abstract]
Already presented in Conferences, Workshops or Symposia
  1. Haruhiko Kaiya, Yuuki Koga, Soichiro Mori, Shinpei Ogata, Hiroyuki Nakagawa, Hironori Takeuchi. A Light-Weight Method of Concept Drift Detection using Heuristic Miner. Procedia Computer Science Volume 246, 2024, Pages 343-352 [DOI]
  2. H. Kaiya et al. Finding Contributable Activities Using Non-Verb Attributes In Events. KES 2023, Sep. 2023. [DOI]
  3. H. Kaiya, T. Misawa, S. Ogata, S. Saito, H. Nakagawa, H. Takeuchi. A Proposal to Find Mutually Contributable Business or Life Activities Using Conformance Checking. KES 2022, Sep. 2022. [DOI]
  4. T. Okubo, H. Kaiya. Efficient secure DevOps using process mining and Attack Defense Trees. KES 2022, Sep. 2022. [DOI]
  5. Haruhiko Kaiya, Kouta Hayashi, Yu Sato. Tools for logging and analyzing goal dependency modeling. Procedia Computer Science Volume 192, 2021, Pages 1639-1648 Oct. 2021. https://doi.org/10.1016/j.procs.2021.08.168
  6. Haruhiko Kaiya, Shogo Tatsui, Atsuo Hazeyama, Shinpei Ogata, Takao Okubo, Nobukazu Yoshioka and Hironori Washizaki. A Tool to Manage Traceability on Several Models and Its Use Case. Procedia Computer Science, Volume 176, 2020, Pages 1449-1458. https://doi.org/10.1016/j.procs.2020.09.155 24th KES 2020, Sep. 2020.
  7. Haruhiko Kaiya. Evaluating Mutual Requirements Evolution of Several Information Systems. Procedia Computer Science, Volume 176, 2020, Pages 1251-1260. https://doi.org/10.1016/j.procs.2020.09.134 24th KES 2020, Sep. 2020.
  8. Haruhiko Kaiya, Wataru Fujita, Ryotaro Yamada, Atsuo Hazeyama, Shinpei Ogata, Takao Okubo, Nobukazu Yoshioka and Hironori Washizaki. Experimental Evaluation of Traceability Checking Tool for Goal Dependency Modeling. Learning and Analytics in Intelligent Systems (LAIS), Vol. 19, Pages 70-83, https://doi.org/10.1007/978-3-030-53949-8_7, 13th JCKBSE, Aug. 2020.
  9. Haruhiko Kaiya. Quantitative Analysis of Goal Oriented Requirements Models. Learning and Analytics in Intelligent Systems (LAIS), Vol. 19, Pages 1-6, https://doi.org/10.1007/978-3-030-53949-8_1, 13th JCKBSE, Aug. 2020.
  10. Haruhiko Kaiya, Kaito Nagano, Ryoya Muto, Mizuki Yoshida. Mutual Requirements Evolution by Combining Different Information Systems. PCI 2019 Proceedings of the 23rd Pan-Hellenic Conference on Informatics, Pages 159-162, 28-30 Nov. 2019, Nicosia, Cyprus. (Short paper) https://doi.org/10.1145/3368640.3368662 [Abstract]
  11. Atsuo Hazeyama, Hikaru Miyahara, Takafumi Tanaka, Hironori Washizaki, Haruhiko Kaiya, Takao Okubo and Nobukazu Yoshioka. A System for Seamless Support from Security Requirements Analysis to Security Design using a Software Security Knowledge Base. ESPRE19, RE2019 workshop, 2019 IEEE 27th International Requirements Engineering Conference Workshops (REW), pp. 134-140 Sep. 2019, Jeju Island, https://doi.org/10.1109/REW.2019.00029 [Abstract]
  12. Haruhiko Kaiya, Atsuo Hazeyama, Shinpei Ogata, Takao Okubo, Nobukazu Yoshioka, Hironori Washizaki. Towards A Knowledge Base for Software Developers to Choose Suitable Traceability Techniques. KES 2019, Budapest, Hungary, 4-6 Sep. 2019. Procedia Computer Science pp. 1075-1084 DOI 10.1016/j.procs.2019.09.276 [Abstract]
  13. Hironori Washizaki, Nobukazu Yoshioka, Atsuo Hazeyama, Takehisa Kato, Haruhiko Kaiya, Shinpei Ogata, Takao Okubo, Eduardo B. Fernandez. Landscape of IoT patterns. SERP4IoT@ICSE 2019: 57-60. https://dl.acm.org/citation.cfm?id=3354013
  14. Hironori Washizaki, Tian Xia, Natsumi Kamata, Yoshiaki Fukazawa, Hideyuki Kanuka, Dan Yamamoto, Masayuki Yoshino, Takao Okubo, Shinpei Ogata, Haruhiko Kaiya, Takehisa Kato, Takafumi Tanaka, Atsuo Hazeyama, Nobukazu Yoshioka, G Priyalakshmi. Taxonomy and Literature Survey of Security Pattern Research. AINS 2018, IEEE Conference on Applications, Information and Network Security. 21-22 Nov. 2018, Langkawi, Malaysia. pp. 87-92. DOI: 10.1109/AINS.2018.8631465.
  15. Haruhiko Kaiya. Meta-Requirements for Information System Requirements: Lesson Learned from Software Ecosystem Researches. KES 2018, Procedia Computer Science Volume 126, pp. 1243-1252, 3-5 Sep. 2018, Belgrade, Serbia. DOI 10.1016/j.procs.2018.08.066 [Abstract]
  16. Haruhiko Kaiya, Kazuhiko Adachi, Yoshihide Chubachi. Requirements Exploration by Comparing and Combining Models of Different Information Systems. JCKBSE 2018, Knowledge-Based Software Engineering: 2018, pp. 64-74, 27 - 30 August, Corfu, Greece. DOI 10.1007/978-3-319-97679-2_7 [Abstract]
  17. Yukiya Yazawa, Shinpei Ogata, Kozo Okano, Haruhiko Kaiya, Hironori Washizaki. Tool to Automatically Generate a Screen Transition Model Based on a Conceptual Model. JCKBSE 2018, Knowledge-Based Software Engineering: 2018, pp 158-167, 27 - 30 August, Corfu, Greece. DOI 10.1007/978-3-319-97679-2_16 [Abstract]
  18. Atsuo Hazeyama, Shunichi Tanaka, Takafumi Tanaka, Hiroaki Hashiura, Seiji Munetoh, Takao Okubo, Haruhiko Kaiya, Hironori Washizaki, Nobukazu Yoshioka. Security Requirement Modeling Support System using Software Security Knowledge Base. COMPSAC 2018 workshop (ADMNET), pages 234-239, 23 July 2018, Tokyo, Japan. DOI 10.1109/COMPSAC.2018.10235 [Abstract]
  19. Yoshihide Chubachi and Haruhiko Kaiya. Generalizing and Composing Goals and Objects in a Scenario Together for Requirements Analysis. The 8th International Conference on Information Intelligence Systems Applications (IISA 2017). 28-30 Aug. 2017. Larnaca, Cyprus. pp. 1-6. DOI: 10.1109/IISA.2017.8316365 [Abstract]
  20. Tian Xia, Hironori Washizaki, Takehisa Kato, Haruhiko Kaiya, Shinpei Ogata, Eduardo B. Fernandez, Hideyuki Kanuka, Masayuki Yoshino, Dan Yamamoto, Takao Okubo, Nobukazu Yoshioka and Atsuo Hazeyama. Cloud Security and Privacy Metamodel - Metamodel for Security and Privacy Knowledge in Cloud Services. Proceedings of the 6th International Conference onModel-Driven Engineering and SoftwareDevelopment (MODELSWARD 2018), 22-24 Jan. 2018, Funchal, Madeira, Portugal, pp. 379-386.
  21. Haruhiko Kaiya, Nobukazu Yoshioka, Hironori Washizaki, Takao Okubo, Atsuo Hazeyama, Shinpei Ogata and Takafumi Tanaka. Eliciting requirements for improving users' behavior using transparency. 4th Asia Pacific Requirements Engineering Symposium (APRES 2017), 9-10 Nov. 2017, Malaka, Malaysia, Springer CCIS Vol 809, Pages 41-56. DOI 10.1007/978-981-10-7796-8_4 [Abstract]
  22. Haruhiko Kaiya, Kazuto Haga. A CASE tool for Goal Dependency Model with Attributes based on An Existing UML Editor. KES 2017, Marseille, France. 6-8 Sep. 2017. pp. 1196-1205. 10.1016/j.procs.2017.08.033 [Abstract]
  23. Haruhiko Kaiya, Ryohei Sato, Atsuo Hazeyama, Shinpei Ogata, Takao Okubo, Takafumi Tanaka, Nobukazu Yoshioka, Hironori Washizaki. Preliminary Systematic Literature Review of Software and Systems Traceability. KES 2017, Marseille, France. 6-8 Sep. 2017. pp. 1141-1150. 10.1016/j.procs.2017.08.152 [Abstract]
  24. Shinpei Ogata, Yukiya Yazawa, Kozo Okano, Haruhiko Kaiya, Hironori Washizaki. Traceability Link Mining - Focusing on Usability -. COMPSAC 2017, Fast Abstracts, Torino, Italy, 4-8 Jul. 2017. pages 286-287. DOI 10.1109/COMPSAC.2017.254
  25. Yoshihide Chubachi, Haruhiko Kaiya. Identifying fundamental goals from objects in a scenario to facilitate system introduction. COMPSAC 2017, Fast Abstracts, Torino, Italy, 4-8 Jul. 2017. pages 276-277. DOI 10.1109/COMPSAC.2017.143
  26. Atsuo Hazeyama, Hironori Washizaki, Nobukazu Yoshioka, Haruhiko Kaiya and Takao Okubo. Literature Survey on Technologies for Developing Privacy-aware Software. 2016 IEEE 24th International Requirements Engineering Conference Workshops, ESPRE, Sep. 2016, pp. 86-91, DOI 10.1109/REW.2016.27
  27. Haruhiko Kaiya, Shinpei Ogata, Shinpei Hayashi, Motoshi Saeki. Early Requirements Analysis for a Socio-Technical System based on Goal Dependencies. The 15th International Conference on Intelligent Software Methodologies, Tools and Techniques (SOMET 2016), 12-14 Sep. 2016, Larnaca, Cyprus, New Trends in Software Methodologies, Tools and Techniques, Frontiers in Artificial Intelligence and Applications, Vol. 286, IOS Press, pp. 125-138, 2016, doi: 10.3233/978-1-61499-674-3-125 [Get award!]
  28. Haruhiko Kaiya, Nobukazu Yoshioka, Takao Okubo, Hironori Washizaki and Atsuo Hazeyama. Requirements Analysis for Privacy Protection and Third Party Awareness using Logging Models. (SOMET 2016), 12-14 Sep. 2016, Larnaca, Cyprus, New Trends in Software Methodologies, Tools and Techniques, IOS Press, 2016, pp. 155-166, doi: 10.3233/978-1-61499-674-3-155
  29. Haruhiko Kaiya. Modelling Goal Dependencies and Domain Model Together, KES-2016, York, UK. 5-6 Sep. 2016, Procedia Computer Science, Volume 96, 2016, Pages 791-800, [Abstract]
  30. Hironori Washizaki, Sota Fukumoto, Misato Yamamoto, Masatoshi Yoshizawa, Yoshiaki Fukazawa, Shinpei Ogata, Eduardo B. Fernandez, Nobukazu Yoshioka, Takehisa Kato, Haruhiko Kaiya, Hideyuki Kanuka, Yuki Kondo, Takao Okubo, Atsuo Hazeyama. A Metamodel for Security and Privacy Knowledge in Cloud Services. IEEE Services 2016, pp. 142-143. 27 June - 2 July 2016, San Francisco, USA. DOI 10.1109/SERVICES.2016.30
  31. Shinpei Hayashi, Wataru Inoue, Haruhiko Kaiya, and Motoshi Saeki. Annotating Goals with Concerns in Goal-Oriented Requirements Engineering. Communications in Computer and Information Science (CCIS), Volume 586, Software Technologies, 10th International Joint Conference, ICSOFT 2015, Colmar, France, July 20-22, 2015, Revised Selected Papers. pp. 269-286, 2016. DOI: 10.1007/978-3-319-30142-6_15
  32. Haruhiko Kaiya, Shinpei Ogata, Shinpei Hayashi, Motoshi Saeki, Takao Okubo, Nobukazu Yoshioka, Hironori Washizaki, and Atsuo Hazeyama. Finding Potential Threats in Several Security Targets for Eliciting Security Requirements. In InfoWare 2015, ICCGI 2015: The 10th International Multi-Conference on Computing in the Global Information Technology, pp.83-92, St. Julians, Malta, 11-16 Oct. 2015. [Abstract]
  33. Masahito Saito, Atsuo Hazeyama, Nobukazu Yoshioka, Takanori Kobashi, Hironori Washizaki, Haruhiko Kaiya, Takao Ohkubo. A Case-based Management System for Secure Software Development Using Software Security Knowledge. 19th International Conference on Knowledge Based and Intelligent Information and Engineering Systems (KES 2015), Singapore, pp. 1092-1100, 7-9 Sep. 2015, http://dx.doi.org/10.1016/j.procs.2015.08.155
  34. Wataru Inoue, Shinpei Hayashi, Haruhiko Kaiya, and Motoshi Saeki. Multi-Dimensional Goal Refinement in Goal-Oriented Requirements Engineering. In ICSOFT-EA 2015, 10th Internatonal Conference on Software Engineering and Applications Proceedings, pp. 185-195, INSTICC. Colmar, Alsace, France, 20-22 July 2015.
  35. Atsuo Hazeyama, Masahito Saito, Nobukazu Yoshioka, Azusa Kumagai, Takanori Kobashi, Hironori Washizaki, Haruhiko Kaiya, Takao Okubo. Case Base for Secure Software Development Using Software Security Knowledge Base. COMPSAC 2015: The 39th Annual International Computers, Software & Applications Conference, Workshop (STPSA 2015), pp. 97-103, IEEE Computer Society. Taichung, Taiwan, 1-5 July 2015. DOI 10.1109/COMPSAC.2015.86
  36. Takanori Kobashi, Masatoshi Yoshizawa, Hironori Washizaki, Yoshiaki Fukazawa, Nobukazu Yoshioka, Takao Okubo, and Haruhiko Kaiya. TESEM: A tool for verifying security design pattern applications by model testing. In 8th IEEE International Conference on Software Testing, Verification and Validation, ICST 2015, Graz, Austria, April 13-17, 2015, pp. 1-8, 2015. DOI 10.1109/ICST.2015.7102633
  37. Takao Okubo, Yoshio Kakizaki, Takanori Kobashi, Hironori Washizaki, Shinpei Ogata, Haruhiko Kaiya, and Nobukazu Yoshioka. Security and Privacy Behavior Definition for Behavior Driven Development , In Product-Focused Software Process Improvement (Profes 2014), LNCS 8892, pp. 306 -309, 10-12 Dec. 2014, Helsinki, Finland. [Abstract]
  38. Masatoshi Yoshizawa, Takanori Kobashi, Hironori Washizaki, Yoshiaki Fukazawa, Takao Okubo, Haruhiko Kaiya, and Nobukazu Yoshioka. Verification of Implementing Security Design Patterns Using a Test Template. In Proceedings of International Conference on Availability, Reliability and Security (ARES 2014), pp. 178-183. IEEE Computer Society, CPS, 8-12 Sep. 2014, Fribourg, Switzerland. [Abstract]
  39. Haruhiko Kaiya, Sho Kono, Shinpei Ogata, Takao Okubo, Nobukazu Yosioka, Hironori Washizaki, and Kenji Kaijiri. Security Requirements Analysis Using Knowledge in CAPEC. In Advanced Information Systems Engineering Workshops, Vol. 178 of Lecture Notes in Business Information Processing (LNBIP), pp. 343-348, Thessaloniki, Greece, 2014. Springer. ISBN 978-3-319-07868-7, June 16-20 2014. [Abstract]
  40. Takao Okubo, Nobukazu Yoshioka, and Haruhiko Kaiya. Requirements Refinement and Exploration of Architecture for Security and Other NFRs. In Advanced Information Systems Engineering Workshops, Vol. 178 of Lecture Notes in Business Information Processing (LNBIP), pp. 286-298, Thessaloniki, Greece, 2014. Springer. ISBN 978-3-319-07868-7, June 16-20 2014. [Abstract]
  41. Takao Okubo, Nobukazu Yoshioka, and Haruhiko Kaiya. Security Driven Requirements Refinement and Exploration of Architecture with multiple NFR points of view. In 2014 IEEE 15th International Symposium on High-Assurance Systems Engineering (HASE 2014), pp. 201-205, Miami, Florida, USA, 9-11 Jan. 2014. IEEE Computer Society, CPS. [Abstract]
  42. Takeyuki Ueda, Shinpei Ogata, Haruhiko Kaiya, and Kenji Kaijiri. IR based Traceability Link Recovery Method Mining. In The Eightth International Conference on Software Engineering Advances (ICSEA13), pp. 278-284, Venice, Italy, 27 Oct. - 1 Nov. 2013. [Abstract]
  43. Takanori Kobashi, Nobukazu Yoshioka, Takao Okubo, Haruhiko Kaiya, Hironori Washizaki and Yoshiaki Fukazawa. Validating Security Design Pattern Applications Using Model Testing, In Proceedings of International Conference on Availability, Reliability and Security (ARES 2013), pp. 62-71, IEEE CPS, 2-6 Sep., Regensburg, Germany. [Abstract]
  44. Haruhiko Kaiya, Takao Okubo, Nobuyuki Kanaya, Yuji Suzuki, Shinpei Ogata, Kenji Kaijiri, and Nobukazu Yoshioka. Goal-oriented security requirements analysis for a system used in several different activities. In Xavier Franch and Pnina Soffer, editors, Advanced Information Systems Engineering Workshops, Vol. 148 of Lecture Notes in Business Information Processing (LNBIP), pp. 478-489. Springer, June 18 2013, Valencia, Spain, The Third International Workshop on Information Systems Security Engineering - WISSE'13, in conjunction with the 25th International Conference on Advanced Information Systems Engineering (CAiSE'13). [Abstract]
  45. Haruhiko Kaiya, Shunsuke Morita, Shinpei Ogata, Kenji Kaijiri, Shinpei Hayashi, and Motoshi Saeki. Model Transformation Patterns for Introducing Suitable Information Systems. In Proceedings of 19th Asia-Pacific Software Engineering Conference (APSEC 2012), pp. 434-439, Hong Kong, 4-7 Dec. 2012. [Abstract]
  46. Ken Tanaka, Haruhiko Kaiya, and Atsushi Ohnishi. Predicting Quality Requirements Necessary for a Functional Requirement based on Machine Learning. In The Seventh International Conference on Software Engineering Advances (ICSEA 2012), pp. 540-547, Lisbon, 18-23 Nov. 2012. [Abstract]
  47. Masahiro Umemura, Haruhiko Kaiya, Shinpei Ogata and Kenji Kaijiri. Validating Quality Requirements Considerations in a Design Document using Spectrum Analysis. Knowledge-Based Software Engineering, Proc. of the Tenth Joint Conference on Knowledge-Based Software Engineering (JCKBSE2012), pp. 88-97. IOS Press. Rhodes, Greece. 23-26 Aug. 2012. [Abstract]
  48. Takao Okubo, Haruhiko Kaiya, and Nobukazu Yoshioka. Mutual Refinement of Security Requirements and Architecture Using Twin Peaks Model. In 36th Annual IEEE International Computer Software and Applications Conference Workshops (COMPSACW 2012), REFS 2012, pp. 367-372, Izmir, Turkey, Jul. 2012. IEEE CS. 16-20 July 2012. [Abstract]
  49. Haruhiko Kaiya and Atsushi Ohnishi. Improving Software Quality Requirements Specifications Using Spectrum Analysis. In 36th Annual IEEE International Computer Software and Applications Conference Workshops (COMPSACW 2012), REFS 2012, pp. 379-384, Izmir, Turkey, Jul. 2012. IEEE CS. 16-20 July 2012. [Abstract]
  50. Haruhiko Kaiya, Shunsuke Morita, Kenji Kaijiri, Shinpei Hayashi, and Motoshi Saeki. Facilitating Business Improvement by Information Systems using Model Transformation and Metrics. In Proceedings of the Forum at the CAiSE 2012 Conference (CAiSE 2012 Forum), pp. 106-113, Gdansk, Poland, 28 Jun. 2012. ISSN 1613-0073, CEUR Workshop Proceedings, Vol-453. [Abstract]
  51. Takao Okubo, Haruhiko Kaiya, and Nobukazu Yoshioka. Effective Security Impact Analysis with Patterns for Software Enhancement. In Proceedings of the 2011 Sixth International Conference on Availability, Reliability and Security (ARES), pp. 527-534, Vienna, Austria, 22-26 Aug. 2011. IEEE Computer Society, CPS. [Abstract]
  52. Haruhiko Kaiya and Atsushi Ohnishi. Quality Requirements Analysis using Requirements Frames. QSIC 2011, Proc. of The 11th International Conference on Quality Software, pp. 198-207, Madrid, Spain, 13-14 Jul. 2011. [Abstract]
  53. Haruhiko Kaiya, Shunichi Suzuki, Toru Ogawa, Masaaki Tanigawa, Masahiro Umemura, and Kenji Kaijiri. Spectrum Analysis for Software Quality Requirements using Analyses Records. In 35th Annual IEEE International Computer Software and Applications Conference Workshops (COMPSACW 2011), pp. 500-503, Munich, Germany, Jul. 2011. IEEE CS. [Abstract]
  54. Haruhiko Kaiya, Kenichiro Hara, Kyotaro Kobayashi, Akira Osada, and Kenji Kaijiri. Exploring how to support software revision in software non-intensive projects using existing techniques. In 35th Annual IEEE International Computer Software and Applications Conference Workshops (COMPSACW 2011), pp. 327-334, Munich, Germany, Jul. 2011. IEEE CS. 18-21 July 2011, [Abstract]
  55. Haruhiko Kaiya, Yuutarou Shimizu, Hirotaka Yasui, Kenji Kaijiri, and Motoshi Saeki. Enhancing Domain Knowledge for Requirements Elicitation with Web Mining. In Proceedings of 17th Asia-Pacific Software Engineering Conference (APSEC 2010), pp. 3-12, Sydney, Australia, 30 Nov - 3 Dec 2010. [Abstract]
  56. Haruhiko Kaiya, Kasuhisa Amemiya, Yuutarou Shimizu, and Kenji Kaijiri. Towards an Integrated Support for Traceability of Quality Requirements using Software Spectrum Analysis. In Proceedings of the 5th International Conference on Software and Data Technologies (ICSOFT), pp. 187-194, Athens, Greece, Jul. 2010. [abstract]
  57. Motoshi Saeki, Shinpei Hayashi, and Haruhiko Kaiya. An Integrated Support for Attributed Goal-Oriented Requirements Analysis Method and Its Implementation. In QSIC 2010, Proc. of The 10th International Conference on Quality Software, pp. 357-360, Zhangjiajie, China, Jul. 2010. [abstract]
  58. Motoshi Saeki, Shinpei Hayashi, and Haruhiko Kaiya. A Tool for Attributed Goal-Oriented Requirements Analysis. In 24th IEEE/ACM International Conference on Automated Software Engineering (ASE 2009), pp. 670-672, Auckland, New Zealand, 16-20 Nov. 2009. [abstract]
  59. Motoshi Saeki, Haruhiko Kaiya, and Satoshi Hattori. Detecting Regulatory Vulnerability in Functional Requirements Specifications. In Proceedings of the 4th International Conference on Software and Data Technologies (ICSOFT2009), Vol. 1, pp. 105-114, Sofia, Bulgaria, 26-29 Jul. 2009. INSTICC. [abstract]
  60. Motoshi Saeki, Haruhiko Kaiya and Satoshi Hattori. Applying a Model Checker to Check Regulatory Compliance of Use Case Models. Proceedings of the Forum at the CAiSE 2009 Conference (CAiSE 2009 Forum), CEUR Workshop Proceedings, Vol. 453, pp. 13-18, 8-12 June 2009 Amsterdam, The Netherlands. [Abstract]
  61. Haruhiko Kaiya, Masaaki Tanigawa, Shunichi Suzuki, Tomonori Sato and Kenji Kaijiri. Spectrum Analysis for Quality Requirements by using A Term-Characteristics Map. 21th International Conference Advanced Information Systems Engineering (CAiSE 2009), pp. 546-560, 8-12 June 2009 Amsterdam, The Netherlands. LNCS 5565. [Abstract]
  62. Motoshi Saeki and Haruhiko Kaiya. Security Requirements Elicitation Using Method Weaving and Common Criteria. In MODELS 2008 Workshops, pp. 185-196. Springer-Verlag Berlin Heidelberg, 30 Apr. 2009. LNCS 5421. [Abstract]
  63. Shunichi Suzuki, Tomonori Sato, Masaaki Tanigawa, Akira Osada, Haruhiko Kaiya, and Kenji Kaijiri. A Systematic Method for Generating Quality Requirements Spectrum. In Proc. of the 24th Annual ACM Symposium on Applied Computing 2009, Volume 1 of 3, pp. 399-400, Honolulu, Hawaii, Mar. 2009. ACM. Track on Requirements Engineering, [Abstract]
  64. Ryo Hasegawa, Motohiro Kitamura, Haruhiko Kaiya, and Motoshi Saeki. Extracting Conceptual Graphs from Japanese Documents for Software Requirements Modeling. In Proc. of the Sixth Asia-Pacific Conference on Conceptual Modelling (APCCM 2009), pp. 87-96, Wellington, New Zealand, 20-23 Jan. 2009. Vol. 96 in the Conferences in Research and Practice in Information Technology Series. [Abstract]
  65. Yijun Yu, Haruhiko Kaiya, Hironori Washizaki, Yingfei Xiong, Zhenjiang Hu, and Nobukazu Yoshioka. Enforcing a Security Pattern in Stakeholder Goal Models. In Proc. of the 2008 ACM workshop on Quality of protection (QoP'08), pp. 9-13, Alexandria, Virginia, USA, 27 Oct. 2008. [Abstract]
  66. Motoshi Saeki and Haruhiko Kaiya. Using Common Criteria as Reusable Knowledge in Security Requirements Elicitation. Modeling Security Workshop, in Association with MODELS'08 (MODSEC08), Sep. 28, 2008, Toulouse, France, Proceedings [HTML]. [Abstract]
  67. Daisuke Tanabe, Kohei Uno, Kinji Akemine, Takashi Yoshikawa, Haruhiko Kaiya, and Motoshi Saeki. Supporting Requirements Change Management in Goal Oriented Analysis. In Proc. of 16th IEEE International Requirements Engineering Conference (RE'08), pp. 3-12, Barcelona, Catalunya, Spain, 8-12 Sep. 2008. IEEE CS. [Abstract]
  68. Naoyuki Kitazawa, Akira Osada, Kazuyuki Kamijo, Haruhiko Kaiya, and Kenji Kaijiri. So/M: A Requirements Definition Tool using Characteristics of Existing Similar Systems. In 32nd Annual IEEE International Computer Software and Applications Conference (COMPSAC2008), pp. 255-262, Turku, Finland, 28 July - 1 Aug. 2008. [Abstract]
  69. Motoshi Saeki and Haruhiko Kaiya. Supporting the Elicitation of Requirements Compliant with Regulations. In 20th International Conference Advanced Information Systems Engineering (CAiSE 2008), pp. 228-242, Montpellier, France, 16-20 Jun. 2008. LNCS 5074. [Abstract]
  70. Shinya Watanabe, Haruhiko Kaiya, and Kenji Kaijiri. Adapting a Fault Prediction Model to Allow Inter Language Reuse. In 4th International Workshop on Predictor Models in Software Engineering (PROMISE 2008), pp. 19-24, Leipzig, Germany, 12-13 May 2008. co-located workshop of ICSE'08. [Abstract]
  71. Motoshi Saeki and Haruhiko Kaiya. Metrics for a Model Driven Development Context. In 3rd International Conference on Evaluation on Novel Approaches to Software Engineering (ENASE 2008), pp. 13-22, Funchal, Madeira, Portugal, 4-7 May 2008. INSTICC. [Abstract]
  72. Haruhiko Kaiya, Tomonori Sato, Akira Osada, Naoyuki Kitazawa, and Kenji Kaijiri. Toward Quality Requirements Analysis based on Domain Specific Quality Spectrum. In Proc. of the 23rd Annual ACM Symposium on Applied Computing 2008, Volume 1 of 3, pp. 596-601, Fortaleza, Ceara, Brazil, Mar. 2008. ACM. Track on Requirements Engineering. [Abstract]
  73. Akira Osada, Daigo Ozawa, Naoyuki Kitazawa, Haruhiko Kaiya, and Kenji Kaijiri. Proposing Metrics of Difficulty of Domain Knowledge using Usecase Diagrams. In Proc. of the 23rd Annual ACM Symposium on Applied Computing 2008, Volume 1 of 3, pp. 624-629, Fortaleza, Ceara, Brazil, Mar. 2008. ACM. Track on Requirements Engineering. [Abstract]
  74. Masayuki Shibaoka, Haruhiko Kaiya, and Motoshi Saeki. GOORE: Goal-Oriented and Ontology Driven Requirements Elicitation Method. In Advances in Conceptual Modeling - Foundations and Applications, pp. 225-234, Auckland, New Zealand, Nov. 2007. Springer, LNCS 4802. Workshop on Requirements, Intentions and Goals in Conceptual Modeling (RIGiM). [Abstract]
  75. Motohiro Kitamura, Ryo Hasegawa, Haruhiko Kaiya, and Motoshi Saeki. An Integrated Tool For Supporting Ontology Driven Requirements Elicitation. In ICSOFT 2007, 2nd International Conference on Software and Data Technologies, pp. 73-80, Barcelona, Spain, Jul. 2007. [Abstract]
  76. Motoshi Saeki and Haruhiko Kaiya. Measuring Model Transformation in Model Driven Development. In CAiSE'07 Forum Proceedings, pp. 77-80, Trondheim, Norway, Jun. 2007. [Abstract]
  77. Junzo Kato, Motoshi Saeki, Atsushi Ohnishi, Haruhiko Kaiya, and Shuichiro Yamamoto. Effects of Thesaurus in Requirements Elicitation. In Colette Rolland et al., editor, Proc. of First International Conference on Research Challenges in Information Science (RCIS), pp. 385-400, Ouarzazate, Morocco, Apr. 2007. [Abstract]
  78. Akira Osada, Daigo Ozawa, Haruhiko Kaiya, and Kenji Kaijiri. The Role of Domain Knowledge Representation in Requirements Elicitation. In Proc. of the 25th IASTED International Multi-Conference Software Engineering (SE2007), pp. 84-92, Innsbruck, Austria, Feb. 2007. IASTED. ID: 552-135 [Abstract]
  79. Haruhiko Kaiya, Kouta Sasaki, and Kenji Kaijiri. PORTAM: Policy, Requirements and Threats Analyzer for Mobile Code Application. In QSIC 2006, Proc. of The 6th International Conference on Quality Software, pp. 125-132, Beijing, China, Oct. 2006. IEEE Computer Society. [full text in PDF format] [Abstract]
  80. Motoshi Saeki and Haruhiko Kaiya. Constructing Multi-Paradigm Modeling Methods based on Method Assembly Technique. In Proc. of Workshop on Multi-Paradigm Modeling: Concepts and Tools, pp. 39-50, Genova, Italy, Oct. 3, 2006.
  81. Motoshi Saeki and Haruhiko Kaiya. Model Metrics and Metrics of Model Transformation. In Proc. of 1st Workshop on Quality in Modeling, pp. 31-45, Genova, Italy, Oct. 1, 2006.
  82. Haruhiko Kaiya and Motoshi Saeki. Using Domain Ontology as Domain Knowledge for Requirements Elicitation. In Proc. of 14th IEEE International Requirements Engineering Conference (RE'06), pp. 189-198, Minneapolis/St. Paul, Minnesota, USA, Sep. 11-15 2006. IEEE CS. [full text in PDF format] [Abstract]
  83. Haruhiko Kaiya, Kouta Sasaki, Chikanobu Ogawa, and Kenji Kaijiri. A Supporting Tool to Identify Both Satisfied Requirements and Tolerant Threats for A Java Mobile Code Application. In Proc. of the 8th Internatinal Conference on Enterprise Information Systems (ICEIS 2006), pp. 444-448, Paphos, Cyprus, May 2006. [full text in PDF format] [Abstract]
  84. Akira Osada, Daigo Ozawa, Haruhiko Kaiya, and Kenji Kaijiri. Modeling Software Characteristics and Their Correlations in A Specific Domain by Comparing Existing Similar Systems. QSIC 2005, Proceedings of The 5th International Conference on Quality Software, pp. 215-222, Melbourne, Australia, Sep. 2005. IEEE Computer Society. [full text in PDF format] [Abstract]
  85. Haruhiko Kaiya and Motoshi Saeki. Ontology Based Requirements Analysis: Lightweight Semantic Processing Approach. QSIC 2005, Proceedings of The 5th International Conference on Quality Software, pp. 223-230, Melbourne, Australia, Sep. 2005. IEEE Computer Society. [full text in PDF format] [Abstract]
  86. Haruhiko Kaiya and Motoshi Saeki. Weaving Multiple Viewpoint Specifications in Goal Oriented Requirements Analysis. In Proceedings of 11th Asia-Pacific Software Engineering Conference (APSEC 2004), pp. 418-427, Busan, Korea, Nov. 2004. IEEE Computer Society Press. [full text in PDF format] [Abstract]
  87. Kenji Kaijiri, Rihito Saitoh, and Haruhiko Kaiya. Fine-grained Recording and Streaming Lectures. In International Conference on Computers in Education 2004 (ICCE2004), pp. 1957-1962, Melbourne Exhibition Centre, Nov. 2004. RMIT Business. CD-ROM only. [Abstract]
  88. Kazuma Aizawa, Haruhiko Kaiya, and Kenji Kaijiri. FC method: A Practical Approach to Improve Quality and Efficiency of Software Processes for Embedded System Revision. In Proceeding of the 28th Annual International Computer Software and Applications Conference (COMPSAC2004), pp. 286-292, Hong Kong, Sep. 2004. [Abstract]
  89. Haruhiko Kaiya, Akira Osada, and Kenji Kaijiri. Identifying Stakeholders and Their Preferences about NFR by Comparing Use Case Diagrams of Several Existing Systems. In Proceedings of 12th IEEE International Requirements Engineering Conference, pp. 112-121, Sep. 2004. [full text in PDF format] [Abstract]
  90. Hidekazu Omote, Kohta Sasaki, Haruhiko Kaiya, and Kenji Kaijiri. Software Evolution Support Using Traceability Link between UML diagrams. In Vadim Stefanuk and Kenji Kaijiri, editors, Knowledge-Based Software Engineering, pp. 15-23. IOS Press, Aug. 2004. Proc. of the 6th JCKBSE. [Abstract]
  91. Daisuke Shinbara, Jinichi Kawano, Haruhiko Kaiya, and Motoshi Saeki. Identifying Requirements Gaps among Stakeholders by using Goal Oriented Analysis. In Proceedings of the 10th Anniversary International Workshop on Requirements Engineering: Foundation for Software Quality (REFSQ'04), pp.219-234, Riga, Latvia, Jun. 2004. Essener Informatik Beitrage. [Abstract]
  92. Junzo Kato, Motoshi Saeki, Atsushi Ohnishi, Morio Nagata, Haruhiko Kaiya, Seiichi Komiya, Shuichiro Yamamoto, Hisayuki Horai, and Kenji Watahiki. PAORE: Package oriented requirements elicitation. In Proceedings of 10th Asia-Pacific Software EngineeringConference (APSEC 2003), pp. 17-26, Chiang Mai, Thailand, Dec. 2003. IEEE Computer Society Press. ISBN 0-7695-2011-1. [Abstract]
  93. Kenji Kaijiri, Yoshiharu Suzuki, and Haruhiko Kaiya. Lecture Recording System based on SMIL. In Proceedings of International Conference on Computers in Education, pp. 585-590, Hong Kong, China, Dec. 2003. the Asia-Pacific Chapter of the Association for the Advancement of Computing in Education (AACE). only CD-ROM. [Abstract]
  94. Hisayuki Suzumori, Haruhiko Kaiya, and Kenji Kaijiri. VDM over PSP: A Pilot Course for VDM Beginners to Confirm its Suitability for Their Development. In Proceedings of COMPSAC2003, pp. 327-334, Dallas, Texas, Nov. 2003. IEEE. [full text in PDF format] [Abstract]
  95. Haruhiko Kaiya, Kouta Sasaki, Yasunori Maebashi, and Kenji Kaijiri. Trade-off Analysis between Security Policies for Java Mobile Codes and Requirements for Java Application. In 11th IEEE International Requirements Engineering Conference, pp. 357-358, Monterey Bay, California, Sep. 2003. [full text in PDF format] [Abstract]
  96. Haruhiko Kaiya, Hitoshi Furukawa and Kenji Kaijiri. Security Policy Checker and Generator for Java Mobile Codes, EISIC : IFIP WG8.1 Working Conference on Engineering Information Systems in the Internet Context, pp. 255-264, Sep. 2002. [full text in PDF format] [Abstract]
  97. Nobuhiko Miyahara, Haruhiko Kaiya and Kenji Kaijiri. A Web-Based VOD Clipping Tool for Efficient Private Review, 5th Joint Conference on Knowledge-Based Software Engineering (JCKBSE2002), pp. 313-316, Sep. 2002. [full text in PDF format] [Abstract]
  98. Haruhiko Kaiya, Hisayuki Horai and Motoshi Saeki. AGORA: Attributed Goal-Oriented Requirements Analysis Method, 10th Anniversary IEEE Joint International Requirements Engineering Conference (RE'02), pp. 13-22, Sep. 2002. [full text in PDF format] [Abstract]
  99. Haruhiko Kaiya and Kenji Kaijiri. Specifying Runtime Environments and Functionalities of Downloadable Compoments under the Sandbox Model. In Takuya Katayama, Tetsuo Tamai, and Naoki Yonezaki, editors, International Symposium on Principles of Software Evolution, pp. 138-142, Kanazawa, Japan, Nov. 2000. IEEE Computer Society Press. [full text in PDF format] [Abstract]
  100. Haruhiko Kaiya and Kenji Kaijiri. Specifying Downloadable Properties for Reusing Software Components: A Case Study of Java. In T. Hruska and M. Hashimoto, editors, Knowledge-Based Software Engineering, pp. 123-128, Brno, Czech Republic, Sep. 2000. IOS Press. Proc. of the 4th JCKBSE. [full text in PDF format] [Abstract]
  101. Haruhiko Kaiya and Kenji Kaijiri. Conducting Requirements Evolution by Replacing Components in the Current System. In Proceedings of APSEC'99, pp. 224-227. IEEE Computer Society Press, Dec. 1999. [full text in PDF format] [Abstract]
  102. Haruhiko Kaiya, Finding Symptoms of Misunderstandings in Drawing Software Design, International Workshop on Human Dimensions in Successful Software Development, joint workshop of ICSE98, pp. 84-93, April 21, 1998, Kyoto, Japan. [full text in PDF format] [Abstract]
  103. Motoshi Saeki, Kinji Matsumura, Jun'ichi Shimoda and Haruhiko Kaiya, Structuring Utterance Records for Requirements Elicitation Meetings Based on Speech Act Theory, Proc. of 2nd International Conference on Requirements Engineering (ICRE'96), pp.21-30, Apr. 1996. [full text in PDF format] [Abstract]
  104. Nobuyuki Miura, Haruhiko Kaiya, and Motoshi Saeki. Building the structure of specification documents from utterances of requirements elicitation meetings. APSEC'95 proceedings, pp. 64-73, Brisbane Parkroyal Hotel, Brisbane, Australia, Dec. 1995. Australian Computer Society, IEEE Computer Society Press. [full text in PDF format] [Abstract]
  105. Hiroyuki Murakosi, Haruhiko Kaiya, and Koichiro Ochimizu. An Analysis of Obstruction in Cooperative Work over a Computer Network. CICS'95 proceedings, Changsha City, Hunan Province, pp. 98-103, China, Oct. 1995. SEA(Japan) and UNU/IIST(Macao) [full text in PDF format] [Abstract]
  106. Haruhiko Kaiya, Motoshi Saeki, and Koichiro Ochimizu. Design of a Hyper Media Tool to support Requirements Elicitation Meetings. In Hausi A. Miiller and Ronald J. Norman, editors, CASE'95:Proceedings Seventh International Workshop on Computer-Aided SoftwareEngineering, pp. 250-259, Toronto, Ontario, Canada, Jul. 1995. IWCASE, IEEE Computer Society Press. [full text in PDF format] [Abstract]
  107. Haruhiko Kaiya and Motoshi Saeki. A Groupware for Face-to-face Meetings to Develop Software Specifications. In InfoScience '93, International Conference organized by Korea Information Science Society, pp. 691-698. Korea Information Science Society, Oct. 1993. [full text in PDF format] [Abstract]
  108. Haruhiko Kaiya and Motoshi Saeki. An Experimental Results on Meetings to develop Software Specifications. In Poster Sessions: Abridged Proceedings, 5th International Conference on Human-Computer Interaction, p. 176, Aug. 1993. [full text in PDF format] [Abstract]
Already presented in Book Chapters or Collections.
  1. Takanori Kobashi, Hironori Washizaki, Nobukazu Yoshioka, Haruhiko Kaiya, Takao Okubo, Yoshiaki Fukazawa. Designing Secure Software by Testing Application of Security Patterns. In Exploring Security in Software Architecture and Design, Chap. 6, Pages 136-169, Jan. 2019, IGI global, ISBN13: 9781522563136 DOI: 10.4018/978-1-5225-6313-6.ch006.
  2. Motoshi Saeki, Haruhiko Kaiya, and Satoshi Hattori. Checking Regulatory Compliance of Business Processes and Information Systems. In Software and Data Technologies, Vol. 50, pp. 71-84. Springer, 2011. Communications in Computer and Information Science (CCIS), DOI: 10.1007/978-3-642-20116-5 [Abstract]
  3. Armstrong Nhlabatsi, Arosha Bandara, Shinpei Hayashi, Charles Haley, Jan Jurjens, Haruhiko Kaiya, Atsuto Kubo, Robin Laney, Haralambos Mouratidis, Bashar Nuseibeh, Thein Tun, Hironori Washizaki, Nobukazu Yoshioka, Yijun Yu, Security Patterns: Comparing Modeling Approaches. pp. 75-111. DOI: 10.4018/978-1-61520-837-1.ch004 ISBN13: 978-1-61520-837-1 ISBN10: 1-61520-837-2 EISBN13: 978-1-61520-838-8. Book Title: Software Engineering for Secure Systems: Industrial and Research Perspectives. Editor(s): H. Mouratidis. IGI Global. 2011.
  4. Motoshi Saeki and Haruhiko Kaiya. Measuring Characteristics of Models and Model Transformations Using Ontology and Graph Rewriting Techniques. Lecture Notes in Communications in Computer and Information Science (CCIS 69), pp. 3-16, Springer. 2010, DOI: 10.1007/978-3-642-14819-4_1 [Abstract]
  5. Motohiro Kitamura, Ryo Hasegawa, Haruhiko Kaiya, and Motoshi Saeki. A Supporting Tool for Requirements Elicitation Using a Domain Ontology. In Software and Data Technologies, Vol. 22, pp. 128-140. Springer Berlin Heidelberg, Nov. 2008. Communications in Computer and Information Science (CCIS), DOI 10.1007/978-3-540-88655-6_10 [Abstract]
Ranking