Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Saeko Matsuura is active.

Publication


Featured researches published by Saeko Matsuura.


aspect-oriented software development | 2004

Association aspects

Kouhei Sakurai; Hidehiko Masuhara; Naoyasu Ubayashi; Saeko Matsuura; Seiichi Komiya

We propose a linguistic mechanism for AspectJ-like languages that concisely associates aspect instances to object groups. The mechanism, which supports association aspects, extends the per-object aspects in AspectJ by allowing an aspect instance to be associated to a group of objects, and by providing a new pointcut primitive to specify aspect instances as execution contexts of advice. With association aspects, we can straightforwardly implement crosscutting concerns that have stateful behavior related to a particular group of objects. The new pointcut primitive can more flexibly specify aspect instances when compared against previous implicit mechanisms. The comparison of execution times between the programs with association aspects and the ones with regular AspectJ aspects revealed that the association aspects exhibited almost equivalent for the medium-sized configurations.


technical symposium on computer science education | 2006

An evaluation method of project based learning on software development experiment

Saeko Matsuura

In recent years, it has been widely acknowledged that classes designed by utilizing PBL (Project-Based Learning) are effective in enhancing the problem-solving ability of university students. In PBL-based classes, students try to apply their knowledge to solve the problems by themselves; therefore, such classes are effective in improving problem-solving and communication abilities of students. However, it is difficult for a teacher to appropriately assess individual contributions in a group work such as PBL. Since 2002, we have been planning and conducting group-work-based software development experiments as an approach to PBL. This paper describes the manner in which the class was designed and conducted in order to evaluate the contribution of each individual student based on the degree of achievement of a goal in a group work. We propose an evaluation method based on an evaluation model of PBL and discuss the trial results.


computer software and applications conference | 2008

Scenario-Based Automatic Prototype Generation

Shinpei Ogata; Saeko Matsuura

This paper proposes the stepwise automatic generation of a prototype system from the scenario based requirements analysis model based on UML. The system is a non-functional user interface prototype for Web applications. A scenarios is defined for every actor and for every normal, alternative and exceptional flow in a use case, so that it enriches the prototype system and is also utilized to test the final product.


computer software and applications conference | 2013

A Dynamic Countermeasure Method to Android Malware by User Approval

Makoto Kato; Saeko Matsuura

Android malware is increasing and flooded with malware which disguise as popular applications and execute malicious attacks within the scope of permissions which was approved by users. Such malware can be prevented by confirming all risky permissions. However confirming permissions is not full preparation for preventing infection, because of defective Android Permission System. Several functions which should be restricted are often not restricted by appropriate permissions. Moreover, applications can go beyond the approved permission by using Intent. This paper proposes a dynamic approval system. When an application executes an action which requires the permission, the proposed system shows a user such adequate information that he/she can judge whether the application is malicious or not. So he/she can determine whether to grant an applications action. The aim of the proposal system is to make fine grained application controllability, so that users can protect their personal valuable information from malware.


2014 IEEE 1st International Workshop on Requirements Engineering and Testing, RET 2014 | 2014

Verifying security requirements using model checking technique for UML-based requirements specification

Yoshitaka Aoki; Saeko Matsuura

Use case analysis is known to be an effective method to clarify functional requirements. Security requirements such as access or information control tend to increase the complexity of functional requirements, and therefore, need to be correctly implemented to minimize risks. However, general developers find it difficult to correctly specify adequate security requirements during the initial phases of the software development process. We propose a method to verify security requirements whose specifications are based on Unified Modeling Language (UML) using the model checking technique and Common Criteria security knowledge. Common Criteria assists in defining adequate security requirements in the form of a table. This helps developers verify whether UML-based requirements analysis models meet those requirements in the early stages of software development. The UML model and the table are transformed into a finite automaton in the UPPAAL model checking tool.


SpringerPlus | 2013

A review method for UML requirements analysis model employing system-side prototyping

Shinpei Ogata; Saeko Matsuura

User interface prototyping is an effective method for users to validate the requirements defined by analysts at an early stage of a software development. However, a user interface prototype system offers weak support for the analysts to verify the consistency of the specifications about internal aspects of a system such as business logic. As the result, the inconsistency causes a lot of rework costs because the inconsistency often makes the developers impossible to actualize the system based on the specifications. For verifying such consistency, functional prototyping is an effective method for the analysts, but it needs a lot of costs and more detailed specifications. In this paper, we propose a review method so that analysts can verify the consistency among several different kinds of diagrams in UML efficiently by employing system-side prototyping without the detailed model. The system-side prototype system does not have any functions to achieve business logic, but visualizes the results of the integration among the diagrams in UML as Web pages. The usefulness of our proposal was evaluated by applying our proposal into a development of Library Management System (LMS) for a laboratory. This development was conducted by a group. As the result, our proposal was useful for discovering the serious inconsistency caused by the misunderstanding among the members of the group.


computer software and applications conference | 2013

UML based Security Function Policy Verification Method for Requirements Specification

Atsushi Noro; Saeko Matsuura

One key to success for high quality systems developments is to verify not only functional requirements but also the security requirements at the early stage of developments. However, it is difficult for general developers who have only less security knowledge to define verifiable requirements specification without leakages and errors. To reduce these some leakages or errors, this paper proposes a UML-based security requirements verification method using the security knowledge of Common Criteria.


SpringerPlus | 2013

Experimental development based on mapping rule between requirements analysis model and web framework specific design model

Hirotaka Okuda; Shinpei Ogata; Saeko Matsuura

Model Driven Development is a promising approach to develop high quality software systems. We have proposed a method of model-driven requirements analysis using Unified Modeling Language (UML). The main feature of our method is to automatically generate a Web user interface prototype from UML requirements analysis model so that we can confirm validity of input/output data for each page and page transition on the system by directly operating the prototype. We proposes a mapping rule in which design information independent of each web application framework implementation is defined based on the requirements analysis model, so as to improve the traceability to the final product from the valid requirements analysis model. This paper discusses the result of applying our method to the development of a Group Work Support System that is currently running in our department.


india software engineering conference | 2012

Training of requirements analysis modeling with UML-based prototype generation tool

Shinpei Ogata; Saeko Matsuura

To develop high quality software products efficiently, the requirements analysis is the most important phase in a software development process, but it is generally difficult to achieve the goal sufficiently. To master requirements analysis skills, the training of defining a desirable requirements specification should be conducted to the education at the university to train students to become high quality systems engineers. We have proposed a method of model-driven requirements analysis using Unified Modeling Language. Based on our requirement analysis method and the supporting tool, this paper proposes a way how to train the modeling ability of graduate students in our university.


computer software and applications conference | 2012

Test Case Generation by Simulating Requirements Analysis Model

Ryo Shikimi; Shinpei Ogata; Saeko Matsuura

A key to success of high quality software development is to define valid and feasible requirements specification. This paper proposes an efficient test case generation method from the validatable UML-based requirements analysis model to improve feasibility of the requirements specification.

Collaboration


Dive into the Saeko Matsuura's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar

Yoshitaka Aoki

Shibaura Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Hirotaka Okuda

Shibaura Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Seiichi Komiya

Shibaura Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Hiroaki Hashiura

Nippon Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Atsushi Noro

Shibaura Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Makoto Kato

Shibaura Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Hidehiko Masuhara

Tokyo Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Kouhei Sakurai

Fujita Health University

View shared research outputs
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge