Nobukazu Yoshioka
Nobukazu Yoshioka
National Instiutes of Informatics
Verified email at - Homepage
Cited by
Cited by
A survey on security patterns
N Yoshioka, H Washizaki, K Maruyama
Progress in informatics 5 (5), 35-47, 2008
Classifying security patterns
EB Fernandez, H Washizaki, N Yoshioka, A Kubo, Y Fukazawa
Asia-Pacific Web Conference, 342-347, 2008
Modeling misuse patterns
EB Fernandez, N Yoshioka, H Washizaki
2009 International Conference on Availability, Reliability and Security, 566-571, 2009
Using security patterns to develop secure systems
EB Fernandez, N Yoshioka, H Washizaki, J Jurjens, M VanHilst, G Pernu
Software Engineering for Secure Systems: Industrial and Research …, 2011
Three misuse patterns for Cloud Computing
K Hashizume, N Yoshioka, EB Fernandez
Security engineering for Cloud Computing: approaches and Tools, 36-53, 2013
Toward synthesis of web services and mobile agents
F Ishikawa, N Yoshioka, Y Tahara, S Honiden
2nd International Workshop on Web Services and Agent Based Engineering …, 2004
Improving the classification of security patterns
H Washizaki, EB Fernandez, K Maruyama, A Kubo, N Yoshioka
2009 20th International Workshop on Database and Expert Systems Application …, 2009
AOJS: Aspect-oriented JavaScript programming framework for Web development
H Washizaki, A Kubo, T Mizumachi, K Eguchi, Y Fukazawa, N Yoshioka, ...
Proceedings of the 8th workshop on Aspects, components, and patterns for …, 2009
Patterns for security and privacy in cloud ecosystems
EB Fernandez, N Yoshioka, H Washizaki
2015 IEEE 2nd Workshop on Evolving Security and Privacy Requirements …, 2015
Security patterns: Comparing modeling approaches
A Nhlabatsi, A Bandara, S Hayashi, C Haley, J Jurjens, H Kaiya, A Kubo, ...
Software engineering for secure systems: Industrial and research …, 2011
Mobile agent system for Web service integration in pervasive network
F Ishikawa, N Yoshioka, S Honiden
Systems and Computers in Japan 36 (11), 34-48, 2005
How do engineers perceive difficulties in engineering of machine-learning systems?-questionnaire survey
F Ishikawa, N Yoshioka
2019 IEEE/ACM Joint 7th International Workshop on Conducting Empirical …, 2019
Misuse patterns for cloud computing
K Hashizume, N Yoshioka, EB Fernandez
Proceedings of the 2Nd Asian Conference on Pattern Languages of Programs, 1-6, 2011
Top se: Educating superarchitects who can apply software engineering tools to practical development in japan
S Honiden, Y Tahara, N Yoshioka, K Taguchi, H Washizaki
29th International Conference on Software Engineering (ICSE'07), 708-718, 2007
International Journal of Advanced Research in Computer Science and Software Engineering
S Roy, S Nag, IK Maitra, SK Bandyopadhyay
International Journal 3 (6), 2013
Abstract security patterns
EB Fernandez, H Washizaki, N Yoshioka
Proceedings of the 15th Conference on Pattern Languages of Programs, 1-2, 2008
Modeling and security in cloud ecosystems
EB Fernandez, N Yoshioka, H Washizaki, MH Syed
Future Internet 8 (2), 13, 2016
Enforcing a security pattern in stakeholder goal models
Y Yu, H Kaiya, H Washizaki, Y Xiong, Z Hu, N Yoshioka
Proceedings of the 4th ACM Workshop on Quality of Protection, 9-14, 2008
Multilevel modeling of physiological systems and simulation platform: physiodesigner, flint and flint K3 service
Y Asai, T Abe, M Okita, T Okuyama, N Yoshioka, S Yokoyama, M Nagaku, ...
2012 IEEE/IPSJ 12th International Symposium on Applications and the Internet …, 2012
Misuse cases+ assets+ security goals
T Okubo, K Taguchi, N Yoshioka
2009 International Conference on Computational Science and Engineering 3 …, 2009
The system can't perform the operation now. Try again later.
Articles 1–20