Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Makoto Kayashima is active.

Publication


Featured researches published by Makoto Kayashima.


international conference on cloud computing | 2011

Virtual machine placement algorithm for virtualized desktop infrastructure

Cao Le Thanh Man; Makoto Kayashima

Finding optimal placement of virtual machines on numerous physical servers is one kind of bin-packing problem, which is known as an NP-hard. We propose the use of a heuristic algorithm to solve this problem where the virtual machines play the roles of personal desktops. As we have found out that the changes in the amount of hardware resources required by a desktop often repeat a certain pattern, in the proposed algorithm, we uses the correlation between the patterns to find the group of desktops that are most suitable for sharing the same physical server. Simulation results show that the proposed algorithm can be used to reduce the number of physical servers required for hosting a certain number of virtual desktops.


international conference on advanced applied informatics | 2016

A Proposal of Security Requirements Definition Methodology in Connected Car Systems by CVSS V3

Eriko Ando; Makoto Kayashima; Norishita Komoda

The use of connected cars has been spreading recently. Security for connected cars is very important because an attacker can access connected cars remotely. Security requirements defined based on risk assessment are necessary to protect connected cars from attackers. However, the conventional risk assessment technique mostly depends on the evaluators security knowledge. Therefore, we propose a security requirement definition methodology for connected car systems. The proposed methodology is based on the security requirements definition methodology in IoT (Internet of Things) systems, which consists of four processes: modelization of target system, definition of security problems, consideration of security requirements, and decision of security function components. We applied the methodology in IoT systems to connected car systems. In particular, the risk assessment, which is executed to define security problems, uses CVSS v3 which was released in 2015. We can assess the risk of connected car systems objectively by using the base metrics of CVSS v3.


Archive | 1997

Security system and method for computers connected to network

Makoto Kayashima; Masato Terada


Archive | 1997

Network system having external/internal audit system for computer security

Masato Terada; Kenichi Yoshida; Makoto Kayashima


Archive | 1997

Electronic transaction method and system

Masakatsu Mori; Nariyasu Hamada; Makoto Kayashima


Archive | 1999

Method of collectively managing dispersive log, network system and relay computer for use in the same

Tatsuya Fujiyama; Makoto Kayashima; Masato Terada; Osamu Katsumata


Archive | 1997

Repeater and network system utilizing the same

Masato Terada; Makoto Kayashima; Takahiko Kawashima; Tetsuya Fujiyama; Minoru Koizumi; Kazuo Nishimura; Kazunari Hirayama; Takaaki Ogino


Archive | 2005

Remote access system, gateway, client device, program, and storage medium

Takatoshi Kato; Nagamasa Mizushima; Takashi Tsunehiro; Makoto Kayashima; Kazushi Nakagawa


Archive | 2001

Security management system and security managing method

Makoto Kayashima; Masato Terada; Yasuhiko Nagai; Hiromi Isokawa; Kazuo Matsunaga; Eri Katoh


Archive | 2000

Method and apparatus for evaluating security and method and apparatus for supporting the making of security countermeasure

Tatsuya Fujiyama; Makoto Kayashima; Yasuhiko Nagai; Mitsuhiro Tsunoda; Tomoaki Yamada

Collaboration


Dive into the Makoto Kayashima's collaboration.

Researchain Logo
Decentralizing Knowledge