Kouichi Tashima
Last Updated :2024/10/01
- Affiliations, Positions
- Information Media Center, Assistant Professor
- E-mail
- tashimahiroshima-u.ac.jp
Basic Information
Academic Degrees
- Doctor of Engineering, Miyazaki University
- Master of Engineering, Miyazaki University
Research Fields
- Informatics;Computing Technologies;Information network
Research Keywords
Educational Activity
Course in Charge
- 2024, Liberal Arts Education Program1, 2Term, Introduction to Information and Data Sciences
- 2024, Undergraduate Education, 2Term, Programming Techenique
- 2024, Undergraduate Education, 3Term, Seminar in Mathematics I
- 2024, Undergraduate Education, 4Term, Seminar in Mathematics II
- 2024, Undergraduate Education, 2Term, Laboratory Work in Computer Science I
- 2024, Undergraduate Education, 3Term, Laboratory Work in Computer Science II
- 2024, Graduate Education (Master's Program) , 3Term, Information Systems
Research Activities
Academic Papers
- Developing vulnerability assessment system considering the severity, Institute of Electronics, Information and Communication Engineers. Trans., 121(300), 104-105, 20211209
- ★, Application to Security Measures using Server Information
Collected by Vulnerability Test, Journal for Academic Computing and Networking, 23(1), 122-127, 2019
- An Immune Network Based on Biological Immune Response Network and Its Immunity, IEICE-Journal, J80-A(11), 1940-1950, 19970401
- A Hopfield Network with Internal Secretion and Its Application, IEE-J, 119-C(8/9), 962-969, 19990401
- A Self-organized Immune Network, VII International Symposium on Avian Endocrinology, 1, 193-196, 19970401
- Self-Learning ULR Fuzzy Controllers Using Temporal Back Propagation, 117(C), 1794-1801
- ★, Multiple-Valued Immune Network and Its Applications, E82(A), 1102-1108
- An Immune Network with Interactions between B Cells for Pattern Recognition, Systems and Computers in Japan, 32(10), 31-41
- A Technical Method for Shifting Campus Network at Hiroshima University, 2008(87), 31-36, 20080919
- Performance Evaluation of a Large Scale Campus Network System with User Authentication Function, 2008(13), 121-130, 20081205
- A Management Method of MAC Address Authentication in Large-Scale Campus Networks, 2009(21), 265-270, 20090306
- Construction of Computer Security Management System Using Multiple Vulnerability Checker Tools, 1297-1302, 20090709
- An Authentication Mechanism for Campus Networks based on UPKI Federation, 2010-IOT-8(37), 20100301
- MAC Address Authentication System for Large-Scale Campus Networks, 1159-1165, 20100701
- Implementation and Evaluation of Single Sign-On Authentication in Large-scale Campus Network HINET2007, 2010(14), 111-118, 20101201
- Management of MAC Address Authenticated Host for Large-Scale Campus Networks, 53-60, 20110901
- Implementation and Evaluation of Single Sign-On Function for Switch based Authentication Network, 53(3), 958-968, 20120301
- A Trial of Event Log Reference Service for Networking Devices, vol.2013-IOT-20(np.34), 1-4, 20130301
- Development of a vulnerability assessment system considering the importance, Information Processing Society of Japan - SIG Technical Reports (IOT), 2021-IOT-53(8), 1-7, 20210506
Invited Lecture, Oral Presentation, Poster Presentation
- Development of a registration and management system for multiple terminals linked to accounts in FIDO authentication, Takato Hayashi
Kouichi Tashima
Hidenobu Watanabe
Seigo Kishiba, IPSJ, 2024/03/13, Without Invitation, Japanese, The use of passwordless authentication, which does not involve the use of passwords, is becoming increasingly popular. One form of passwordless authentication is FIDO authentication, which has gained traction as a means of user authentication for online services. Currently, the usage patterns of user devices, such as desktop PCs, tablets, and smartphones, have become increasingly diverse, with individuals commonly using multiple devices simultaneously. In FIDO authentication, it is necessary for users to pre-register the devices used for authentication with the authentication server, requiring a mechanism to associate and manage multiple devices for a single user. In this study, we developed a system for registering and managing registered devices and newly desired devices using a hierarchical structure based on parent-child relationships. In the proposed system, users initially register their first device with the authentication server using the standard FIDO authentication process. Subsequently, this device becomes the trusted parent terminal. The registration of new devices, as well as the management tasks such as stopping or deleting registered devices, is performed using this parent terminal.
- Trial of Vulnerability Reporting Service using Security Vulnerability Check and
Vulnerability Database WEB site., Kouichi TASHIMA, Seigo KISHIBA, Tohru KONDO, Hidenobu WATANABE
Norikazu IWATA, Kouji NISHIMURA, Reiji AIBARA, DICOMO2017, 2017/06/30, Without Invitation, Japanese