Kouichi Tashima

Last Updated :2024/10/01

Affiliations, Positions
Information Media Center, Assistant Professor
E-mail
tashimahiroshima-u.ac.jp

Basic Information

Academic Degrees

  • Doctor of Engineering, Miyazaki University
  • Master of Engineering, Miyazaki University

Research Fields

  • Informatics;Computing Technologies;Information network

Research Keywords

  • Computer Network

Educational Activity

Course in Charge

  1. 2024, Liberal Arts Education Program1, 2Term, Introduction to Information and Data Sciences
  2. 2024, Undergraduate Education, 2Term, Programming Techenique
  3. 2024, Undergraduate Education, 3Term, Seminar in Mathematics I
  4. 2024, Undergraduate Education, 4Term, Seminar in Mathematics II
  5. 2024, Undergraduate Education, 2Term, Laboratory Work in Computer Science I
  6. 2024, Undergraduate Education, 3Term, Laboratory Work in Computer Science II
  7. 2024, Graduate Education (Master's Program) , 3Term, Information Systems

Research Activities

Academic Papers

  1. Developing vulnerability assessment system considering the severity, Institute of Electronics, Information and Communication Engineers. Trans., 121(300), 104-105, 20211209
  2. ★, Application to Security Measures using Server Information Collected by Vulnerability Test, Journal for Academic Computing and Networking, 23(1), 122-127, 2019
  3. An Immune Network Based on Biological Immune Response Network and Its Immunity, IEICE-Journal, J80-A(11), 1940-1950, 19970401
  4. A Hopfield Network with Internal Secretion and Its Application, IEE-J, 119-C(8/9), 962-969, 19990401
  5. A Self-organized Immune Network, VII International Symposium on Avian Endocrinology, 1, 193-196, 19970401
  6. Self-Learning ULR Fuzzy Controllers Using Temporal Back Propagation, 117(C), 1794-1801
  7. ★, Multiple-Valued Immune Network and Its Applications, E82(A), 1102-1108
  8. An Immune Network with Interactions between B Cells for Pattern Recognition, Systems and Computers in Japan, 32(10), 31-41
  9. A Technical Method for Shifting Campus Network at Hiroshima University, 2008(87), 31-36, 20080919
  10. Performance Evaluation of a Large Scale Campus Network System with User Authentication Function, 2008(13), 121-130, 20081205
  11. A Management Method of MAC Address Authentication in Large-Scale Campus Networks, 2009(21), 265-270, 20090306
  12. Construction of Computer Security Management System Using Multiple Vulnerability Checker Tools, 1297-1302, 20090709
  13. An Authentication Mechanism for Campus Networks based on UPKI Federation, 2010-IOT-8(37), 20100301
  14. MAC Address Authentication System for Large-Scale Campus Networks, 1159-1165, 20100701
  15. Implementation and Evaluation of Single Sign-On Authentication in Large-scale Campus Network HINET2007, 2010(14), 111-118, 20101201
  16. Management of MAC Address Authenticated Host for Large-Scale Campus Networks, 53-60, 20110901
  17. Implementation and Evaluation of Single Sign-On Function for Switch based Authentication Network, 53(3), 958-968, 20120301
  18. A Trial of Event Log Reference Service for Networking Devices, vol.2013-IOT-20(np.34), 1-4, 20130301
  19. Development of a vulnerability assessment system considering the importance, Information Processing Society of Japan - SIG Technical Reports (IOT), 2021-IOT-53(8), 1-7, 20210506

Invited Lecture, Oral Presentation, Poster Presentation

  1. Development of a registration and management system for multiple terminals linked to accounts in FIDO authentication, Takato Hayashi Kouichi Tashima Hidenobu Watanabe Seigo Kishiba, IPSJ, 2024/03/13, Without Invitation, Japanese, The use of passwordless authentication, which does not involve the use of passwords, is becoming increasingly popular. One form of passwordless authentication is FIDO authentication, which has gained traction as a means of user authentication for online services. Currently, the usage patterns of user devices, such as desktop PCs, tablets, and smartphones, have become increasingly diverse, with individuals commonly using multiple devices simultaneously. In FIDO authentication, it is necessary for users to pre-register the devices used for authentication with the authentication server, requiring a mechanism to associate and manage multiple devices for a single user. In this study, we developed a system for registering and managing registered devices and newly desired devices using a hierarchical structure based on parent-child relationships. In the proposed system, users initially register their first device with the authentication server using the standard FIDO authentication process. Subsequently, this device becomes the trusted parent terminal. The registration of new devices, as well as the management tasks such as stopping or deleting registered devices, is performed using this parent terminal.
  2. Trial of Vulnerability Reporting Service using Security Vulnerability Check and Vulnerability Database WEB site., Kouichi TASHIMA, Seigo KISHIBA, Tohru KONDO, Hidenobu WATANABE Norikazu IWATA, Kouji NISHIMURA, Reiji AIBARA, DICOMO2017, 2017/06/30, Without Invitation, Japanese