Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Eisaku Sakane is active.

Publication


Featured researches published by Eisaku Sakane.


symposium on applications and the internet | 2010

Petaflow - A Project Towards Information and Communication Technologies in Society

Paulo Gonçalves; Xavier Grandchamp; Xavier Pelorson; Bruno Raffin; Annemie Van Hirtum; Pascale Vicat-Blanc; Ken-ichi Baba; Julien Cisonni; Yasuo Ebara; Kazunori Nozaki; Hiroyuki Ohsaki; Shigeo Wada; Takuma Kawamura; Kohji Koyamada; Eisaku Sakane; Naohisa Sakamoto; Shinji Shimojo

The Petaflow project aims to contribute to the use of high performance computational resources to the benefit of society. To this goal the emergence of adequate information and communication technologies with respect to high performance computing-networking-visualisation and their mutual awareness is required. The developed technology and algorithms will be applied to a real peta-scale data intensive scientific problem with social importance, i.e. human upper airway flow modelling.


Archive | 2009

An Application of the NAREGI Grid Middleware to a Nationwide Joint-Use Environment for Computing

Eisaku Sakane; Manabu Higashida; Shinji Shimojo

In the Cybermedia Center, Osaka University (CMC), we have applied the NAREGI grid middleware to our latest large-scale computing system for nationwide joint-use, and have made grid computing technology available on them coexisting with the conventional computing style. In this paper, we mention the problems of resource provisioning, password/passphrase management, issuance of grid certificate and grid operations in user management, and a solution is discussed.


symposium on applications and the internet | 2011

Peta-Flow Computing: Vision and Challenges

Hiroyuki Ohsaki; Kazunori Nozaki; Ken-ichi Baba; Eisaku Sakane; Naohisa Sakamoto; Kohji Koyamada; Shinji Shimojo

This paper discusses vision and challenges toward realization of {\em peta-flow computing}, which enables peta-scale information processing and communication. A promising application for peta-flow computing, a large-scale upper airway flow simulation and visualization over a long-fat network, is discussed with its requirements on peta-flow computing. Also, challenges and implications of three technological fields of peta-flow computing -- {\em peta-scale computing}, {\em peta-scale networking}, and {\em peta-scale interfacing} are identified.


symposium on applications and the internet | 2008

An Authentication System Development in Application of Grid Middleware to a Nationwide Joint-Use Environment for Computing

Eisaku Sakane; Manabu Higashida; Shingo Okamura; Toyokazu Akiyama; Ken-ichi Baba; Shinji Shimojo; Yuuichi Teranishi

In the Cybermedia Center, Osaka University (CMC), we have applied the NAREGI grid middleware to our latest large-scale computing system for nationwide joint-use, and have made grid computing technology available on them coexisting with the conventional computing style. In this paper, we will describe an authentication system solving the problems which we have encountered in construction of the grid environment.


symposium on applications and the internet | 2007

A Report of Campus-Wide IT Authentication Platform System Development in Osaka University

Toyokazu Akiyama; Yuuichi Teranishi; Shingo Okamura; Eisaku Sakane; Go Hasegawa; Ken-ichi Baba; Hirotaka Nakano; Shinji Shimojo

Cybermedia Center, Osaka University (CMC) is now developing campus-wide IT authentication platform system (CITAPS). In this paper, we report the current status of CITAPS development. Before installing CITAPS, unified account system (UAS) served as an authentication platform system. First of all, we describe the issues in UAS, and then we show how to solve these issues in CITAPS and the future works


Proceedings of International Symposium on Grids and Clouds (ISGC) 2017 — PoS(ISGC2017) | 2017

A Method for Remote Initial Vetting of Identity with PKI Credential

Eisaku Sakane; Takeshi Nishimura; Kento Aida

With the growth of large-scale distributed computing infrastructures, a system that enables researchers -- not only international collaborative research projects but also small research groups -- to use high performance computing resources in such infrastructures is established. For the computing resource use system which invites researchers in the world to submit the research proposal, it is tough to carry out initial vetting of identity based on a face-to-face meeting at a window for the system if the researcher whose proposal is accepted lives in a foreign country. The purpose of this paper is to propose a method to solve the difficulty of initial vetting of identity for a remote user. An identity management (IdM) system vets the identity and reality of a user by checking the beforehand registered personal information against the identity documents. After the identity vetting, the user can obtain a credential used in the infrastructure. Suppose that the IdM system(A) needs to initially vet the identity of a user and that the user already possesses a credential issued by the other IdM system(B). The basic idea of this paper is that the IdM system(A) uses the credential issued by the IdM system(B) for the initial identity vetting if the level of assurance of the IdM system(B) is the same as or higher than the IdM system(A). However, the IdM system(A) cannot always check the identity against the attribute information provided by the credential. In a trust federation, the IdM system will be able to finish vetting the identity by making reference to the other IdM system that issued the credential for the necessary and sufficient identity data. As the credential handled in this paper, we focus on Public Key Infrastructure (PKI) credentials that often used in large-scale high performance computing environments. We discuss necessary condition and procedure for ensuring that the remote initial vetting of identity with a PKI credential is the same assurance as the one based on a face-to-face meeting. The proposed method can be introduced to an existing PKI without large changes. The basic idea of the proposed method can be also applied to an infrastructure based on another authentication technology. The applicability of the basic idea is also considered.


Proceedings of International Symposium on Grids and Clouds (ISGC) 2016 — PoS(ISGC 2016) | 2017

A Study of Certification Authority Integration Model in a PKI Trust Federation on Distributed Infrastructures for Academic Research

Eisaku Sakane; Takeshi Nishimura; Kento Aida

Among certification authorities (CAs) in an academic PKI trust federation such as IGTF (Interoperable Global Trust Federation), most of the academic organizations that operate a CA install by themselves the CA equipment in their building. To keep the CA trustworthy, it is necessary to maintain specialized CA equipment and to employ specifically trained operators. The high cost thereby incurred for CA operation weighs heavily on the CA organization. For research institutes whose primary duties are not the CA operation, the burden of the high cost of CA operations is an earnest problem, and cost reduction by increasing the efficiency of the operation is an important issue. Instead of focusing on any further operational optimization of a single individual CA, in this paper we will review cost reductions by way of integrating more than one CA in a PKI federation. This paper considers the issuing and registration authorities that constitute a CA, and proposes the following integration model: it integrates the issuing duties, and each organization carries out the registration duties as before. In the proposed model, integrating the issuing duties means that one issuing authority (IA) takes over the duty of the other IA. Since each registration authority (RA) performs the registration duty as usual, most of procedures such as the application process to obtain certificates remain unchanged, so that it does not confuse the users. Based on this proposed model, we discuss how to connect the superseding IA with the RA(


Proceedings of The International Symposium on Grids and Clouds (ISGC) 2013 — PoS(ISGC 2013) | 2014

Data Transfer Improvement for Temporal User Account Resources

Kazushige Saga; Kento Aida; Eisaku Sakane; Kazutaka Motoyama

\beta


computer software and applications conference | 2013

PetaFlow -- An Example of Communication and Computational Technologies with Social Impact

Alexandre Ancel; Ingo Assenmacher; Ken-ichi Baba; Julien Cisonni; Yo Fujiso; Paulo Gonçalves; Matthieu Imbert; Kohji Koyamada; P. Neyron; Kazunori Nozaki; Hiroyuki Ohsaki; Anne-Cécile Orgerie; Xavier Pelorson; Bruno Raffin; Naohisa Sakamoto; Eisaku Sakane; Shinji Shimojo; A. Van Hirtum; Shigeo Wada

) operated by the organization that closes its own IA(


IEICE technical report. Speech | 2011

A Proposal of a WEP Operation Secure Against the Key-Recovery Attack

Eisaku Sakane; Kento Aida; Shinichi Mineo; Shinji Shimojo

\beta

Collaboration


Dive into the Eisaku Sakane's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Kento Aida

National Institute of Informatics

View shared research outputs
Top Co-Authors

Avatar

Hiroyuki Ohsaki

Kwansei Gakuin University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge