【研究業績】

【受賞】

  1. 4日本ソフトウェア科学会解説論文賞, Sept. 12, 2013.(関,鰺坂)
  2. 平成24年度電子情報通信学会ソフトウェアサイエンス研究会研究奨励賞, May 9, 2013.(宮原,橋本,関)
  3. 電子情報通信学会フェロー, Sept. 14, 2011.(関浩之)
  4. Best Paper Award, Sixth International Multi-Conference on Computing in the Global Information Technology, July 2011. (Ramon Mejia, Yuichi Kaji and Hiroyuki Seki)
  5. 2006年度情報処理学会バイオ情報学研究会論文賞, Dec. 2008.(加藤,関,嵩)
  6. 平成19(2007)年度 情報処理学会論文賞, March 2008.(加藤,関,嵩)
  7. 11回日本ソフトウェア科学会論文賞, June 13, 2007.(新田,高田,関)
  8. 21回電気通信普及財団賞(テレコムシステム技術賞)奨励賞, 2006.(石原,石井,関,伊藤)
  9. 平成9(1997)年度 情報処理学会論文賞, 1998.(工藤,石原,関,奥井)

【編著書】

  1. 関(共著),電気工学ハンドブック(第7版),担当:第9章 情報数学 9.2 形式論理と計算論,オーム社,2013

  2. Makoto Kanazawa, Andras Kornai, Marcus Kracht and Hiroyuki Seki (Eds.), The Mathematics of Language,12th Biennial Conference, MOL 12, Nara, Japan, September 2011, Proceedings, Lecture Notes in Artificial Intelligence 6878.

  3. 関(共著),電子情報通信学会 知識ベース 知識の森,担当:6群 コンピュータ 基礎理論とハードウェア,2編 計算論とオートマトン,3章 文脈自由文法とプッシュダウンオートマトン,3-1文脈自由文法,3-2 プッシュダウンオートマトン. 7群 コンピュータ・ソフトウェア,1編 ソフトウェア基礎,編幹事,ならびに,2章 定理自動証明と検証法,アブストラクト.

【解説】

  1. 関 浩之,鰺坂 恒夫: 言語理論の話をしよう,「ソフトウェアサイエンスの基本」シリーズ第1回,コンピュータソフトウェア,28(3), 61-69, Aug. 2011. (第4回日本ソフトウェア科学会解説論文賞受賞)
  2. 東野輝夫, 関浩之,谷口健一: 代数的仕様から関数型プログラムの導出とその実行, 情報処理,29(8), 881-896, Aug. 1988.

【学術論文誌】

  1. Kazuki Miyahara, Kenji Hashimoto and Hiroyuki Seki, Node Query Preservation for Deterministic Linear Top-Down Tree Transducers IEICE Transactions on Information and Systems, Vol.E98-D, No.3, March 2015 (to appear).
  2. Chittaphone Phonharath, Kenji Hashimoto, and Hiroyuki Seki: ``Deciding Schema k-Secrecy for XML Databases,'' IEICE Transactions on Information and Systems, Vol.E96-D, No.6, pp.1268-1277, June 2013.
  3. Ramon Mejia, Yuichi Kaji and Hiroyuki Seki: ``Error Control for High-Density Monochrome Two-Dimensional Barcodes,'' IPSJ Transactions on Databases, Vol.5, No.2, pp.17-25, July 2012.
  4. Toshinori Takai, Yuichi Kaji and Hiroyuki Seki: ``Right-linear Finite Path Overlapping Rewrite Systems Effectively Preserve Recognizability,'' Scientiae Mathematicae Japonicae, Vol.e2010, No.23, pp.e2010-1, Jan. 2010.
  5. Yuki Kato, Tatsuya Akutsu and Hiroyuki Seki: ``Dynamic Programming Algorithms and Grammatical Modeling for Protein Beta-Sheet Prediction,'' Journal of Computational Biology, Vol.16, No.7, pp.945-957, July 2009.
  6. Yoshiaki Takata and Hiroyuki Seki: ``Comparison of the Expressive Power of Language-based Access Control Models,'' IEICE Transactions on Information and Systems, E92-D, 5, pp.1033-1036, May 2009.
  7. Yuki Kato, Tatsuya Akutsu and Hiroyuki Seki: ``A Grammatical Approach to RNA-RNA Interaction Prediction,'' Pattern Recognition, 42, pp.531-538, April 2009.
  8. Yoshiaki Takata and Hiroyuki Seki: ``Formal Language Theoretic Approach to the Disclosure Tree Strategy in Trust Management,'' IEICE Transactions on Information and Systems, E92-D, 2, pp.200-210, Feb 2009.
  9. 高田喜朗, 王静, 関浩之: ``実行履歴に基づくアクセス制御の形式モデルと検証,'' 電子情報通信学会論文誌D, Vol.J91-D, No.4, pp.847-858, 2008.
  10. Hiroyuki Seki and Yuki Kato: ``On the Generative Power of Multiple Context-Free Grammars and Macro Grammars,'' IEICE Transactions on Information and Systems, E91-D(2), pp.209-221, Feb. 2008.
  11. Hisashi Mohri, Ikuya Yasuda, Yoshiaki Takata and Hiroyuki Seki: ``New Certificate Chain Discovery Methods for Trust Establishment in Ad Hoc Networks and Their Evaluation,'' Journal of Information Processing, 49(1), pp.362-374, Jan. 2008.
  12. Isao Yagi, Yoshiaki Takata and Hiroyuki Seki: ``A Labeled Transition Model A-LTS for History-based Aspect Weaving and Its Expressive Power,'' IEICE Transactions on Information and Systems, E90-D(5), 799-807, 2007.
  13. Yasunori Ishihara, Toshiyuki Morita, Hiroyuki Seki and Minoru Ito: ``An Equational Logic Based Approach to the Security Problem against Inference Attacks on Object-Oriented Databases,'' Journal of Computer and System Sciences, 73, 788-817, 2007.
  14. Yuki Kato, Hiroyuki Seki and Tadao Kasami: ``RNA Pseudoknotted Structure Prediction Using Stochastic Multiple Context-Free Grammar,'' IPSJ Transactions on Bioinformatics, 47, SIG 17(TBIO 1), 12-21, Nov. 2006. IPSJ Digital Courier 船井若手奨励賞受賞(March 2007), 平成19年度 情報処理学会論文賞 受賞(March 2008).
  15. Isao Yagi, Yoshiaki Takata and Hiroyuki Seki: ``A Static Analysis using Tree Automata for XML Access Control,'' コンピュータソフトウェア, 23(3), 51-65, July 2006.
  16. 高田喜朗, 中村岳志, 関浩之: ``XML文書に対するアクセシビリティ・ガイドライン適合性検証,'' 電子情報通信学会論文誌(D), J89-D(4), 705-715, April 2006.
  17. Jing Wang, Naoya Nitta and Hiroyuki Seki: ``An Efficient Method for Optimal Probe Deployment of Distributed IDS,'' IEICE Transactions on Information and Systems, E88-D(8), pp.1948-1957, Aug. 2005.
  18. Shigeta Kuninobu, Yoshiaki Takata, Naoya Nitta and Hiroyuki Seki: ``Policy Controlled System and Its Model Checking,'' IEICE Transactions on Information and Systems, E88-D(7), pp.1685-1696, July 2005.
  19. Naoya Nitta and Hiroyuki Seki: ``LTL Model Checking for Extended Pushdown Systems with Regular Tree Valuations,'' コンピュータソフトウェア, Vol.22, No.3, pp.58-75, July 2005.
  20. Yasunori Ishihara, Shin Ishii, Hiroyuki Seki and Minoru Ito: ``Temporal Reasoning about Two Concurrent Sequence of Events,'' SIAM Journal on Computing, 34(2), pp.498-513, 2005.
  21. Yuki Kato, Hiroyuki Seki and Tadao Kasami: ``On the Generative Power of Grammars for RNA Secondary Structure,'' IEICE Transactions on Information and Systems, E88-D(1), pp.53-64, Jan. 2005.
  22. T. Takai, H. Seki, Y. Fujinaka and Y. Kaji: ``Layered Transducing Term Rewriting System and Its Recognizability Preserving Property,'' IEICE Transactions on Information and Systems, E86-D(2), 285-295, Feb. 2003.
  23. Reishi Yokomori, Fumiaki Ohata, Yoshiaki Takata, Hiroyuki Seki and Katsuro Inoue: ``An Information Leak Analysis System Based on Program Slicing,'' Information and Software Technology, 44(15), 903-910, Dec. 2002.
  24. 國信茂太, 高田喜朗, 関浩之, 井上克郎: ``束構造をもつセキュリティクラスに基づく再帰的プログラムに対する情報フロー解析法,'' 電子情報通信学会論文誌(D-I), J85-D-I(10), 961-973, Oct. 2002.
  25. 仲川こころ, 木下敦史, 高田喜朗, 関浩之: ``対話的に調整可能な文書ランキング --- WWW検索支援の一手法,'' 情報処理学会論文誌, 43(9), 2850-2863, Sept. 2002.
  26. N. Nitta, Y. Takata and H. Seki: ``An Efficient Security Verification Method for Programs with Stack Inspection,'' コンピュータソフトウェア, 19(3), 20-38, May 2002.
  27. 新田直也, 高田喜朗, 関浩之: ``スタック検査機能を持つプログラムに対するセキュリティ検証問題の決定可能性,'' 電子情報通信学会論文誌(D-I), J85-D-I(4), 360-370, April 2002.
  28. 池田瑞穂, 高田喜朗, 関浩之: ``インタラクティブシステム設計法におけるタスク図の形式的定義と形式的検証への応用,'' コンピュータソフトウェア, 19(2), 19-34, March 2002.
  29. T. Takai, Y. Kaji and H. Seki: ``Termination Property of Inverse Finite Path Overlapping Term Rewriting System Is Decidable,'' IEICE Transactions on Information and Systems, E85-D(3), 487-496, March 2002.
  30. 喜家村奨, 高田喜朗, 関浩之: ``ラベル付き遷移システムで記述された要求仕様の並列プロセス群への一分解法,'' 情報処理学会論文誌, 42(12), 2992-3003 (2001-12).
  31. 仲川こころ, 高田喜朗, 関浩之: ``可変なカテゴリ構造を用いた文書検索支援手法,'' 情報処理学会論文誌, 42(10), 2441-2453 (2001-10).
  32. Y.Ishihara, S.Shimizu, H.Seki and M.Ito: ``Refinements of Complexity Results on Type Consistency for Object-Oriented Databases,'' Journal of Computer and System Sciences, 62(4), 537-564 (2001-06).
  33. Y.Ishihara, K.Ninomiya, H.Seki, D.Takahara, Y.Yamada and S.Omoto: ``Verification of a Microcomputer Program Specification Embedded in a Reactive System,'' IEICE Transactions on Information and Systems, E83-D(5), 1082-1091 (2000-05).
  34. T.Morita, Y.Ishihara, H.Seki and M.Ito: ``A Formal Approach to Detecting Security Flaws in Object-Oriented Databases,'' IEICE Transactions on Information and Systems, E82-D(1), 89-98 (1999-01).
  35. R.Nakanishi, K.Takada, H.Nii and H.Seki: ``Efficient Recognition Algorithms for Parallel Multiple Context-Free Grammar and for Multiple Context-Free Grammar,'' IEICE Transactions on Information and Systems, E81-D(11), 1148-1161 (1998-11).
  36. T.Morita, Y.Ishihara, H.Seki and M.Ito: ``An Authorization Model for Object-Oriented Databases and its Efficient Access Control,'' IEICE Transactions on Information and Systems, E81-D(6), 521-531 (1998-06).
  37. H.Seki, Y.Ishihara and H.Dodo: ``Testing Type Consistency of Method Schemas,'' IEICE Transactions on Information and Systems, E81-D(3), 278-287 (1998-03).
  38. 清水将吾, 石原靖哲, 関浩之, 伊藤実: ``オブジェクト指向データベースにおける型検査問題の計算量,'' 電子情報通信学会論文誌(D-I), J81-D-I(3), 261-270 (1998-03).
  39. R.Nakanishi, I.Hayakawa and H.Seki: ``Tree Automaton with Tree Memory,'' IEICE Transactions on Information and Systems, E81-D(2), 161-170 (1998-02).
  40. 工藤 朋之, 石原 靖哲, 関 浩之, 奥井 順: ``抽象的順序機械型代数的仕様からのドキュメント生成システム,'' 情報処理学会論文誌, 38(7), 1412-1424 (1997-07), 平成9年度 情報処理学会論文賞 受賞.
  41. 関 浩之, 石原 靖哲, 伊藤 実: ``オブジェクト指向データベースにおける質問のアクセス権分析,'' 電子情報通信学会論文誌(D-I), J79-D-I(10), 769-780 (1996-10).
  42. Y.Ishihara, A.Ohsaki, H.Seki and T.Kasami: ``Assignment of Data Types to Words in a Natural Language Specification,'' IEICE Transactions on Information and Systems, E79-D(6), 820-828 (1996-06).
  43. 佐野哲央, 樋口昌宏, 関浩之, 嵩忠雄: ``通信プロトコルのフェーズ連結法とそれに基づく検証法,'' 電子情報通信学会論文誌(D-I), J78-D-I(6), 519-531 (1995-06).
  44. Y.Ishihara, H.Seki and T.Kasami: ``Implementation of Natural Language Specifications of Communication Protocols by Executable Specifications,'' Transactions on Information Processing Society of Japan, 36(5), 1114-1125 (1995-05).
  45. Y.Kaji, R.Nakanishi, H.Seki and T.Kasami: ``The Computational Complexity of the Universal Recognition Problem for Parallel Multiple Context-Free Grammars,'' Computational Intelligence, 10(4), 440-452 (1994-11).
  46. S.Ando, R.Nakanishi, H.Seki and T.Kasami: ``A Polynomial-Time Recognizable Subclass of Lexical-Functional Grammars,'' IEICE Transactions on Information and Systems, E77-D(10), 1067-1076 (1994-10).
  47. H.Ohnishi, H.Seki and T.Kasami: ``A Polynomial Time Learning Algorithm for Recognizable Series,'' IEICE Transactions on Information and Systems, E77-D(10), 1077-1085 (1994-10).
  48. R.Nakanishi, H.Seki and T.Kasami: ``A Note on Inadequacy of the Model for Learning from Queries,'' IEICE Transactions on Information and Systems, E77-D(8), 861-868 (1994-08).
  49. 直井秀暢, 関浩之, 藤井護: ``マジックセット法を用いた問合せ処理の停止性について,'' 電子情報通信学会論文誌(D-I), J77-D-I(7), 503-513 (1994-07).
  50. Y.Kaji, H.Seki and T.Kasami: ``Finite State Translation Systems and Parallel Multiple Context-Free Grammars,'' IEICE Transactions on Information and Systems, E77-D(6), 619-630 (1994-06).
  51. Y.Ishihara, H.Seki, T.Kasami, J.Shimabukuro and K.Okawa: ``A Translation Method from Natural Language Specifications of Communication Protocols into Algebraic Specifications Using Contextual Dependencies,'' IEICE Transactions on Information and Systems, E76-D(12), 1479-1489 (1993-12).
  52. M.Higuchi, O.Shirakawa, H.Seki, M.Fujii and T. Kasami: ``A Verification Method via Invariant for Communication Protocols Modeled as Extended Communicating Finite-State Machines,'' IEICE Transactions on Communications, E76-B(11), 1363-1372 (1993-11).
  53. 中西隆一, 関浩之, 嵩忠雄: ``多重文脈自由文法の認識問題について,'' 電子情報通信学会論文誌(D-I), J75-D-I(11), 973-981 (1992-11).
  54. M.Higuchi, H.Seki and T.Kasami: ``A Method of Composing Communication Protocols with Priority Service,'' IEICE Transactions on Communication, E75-B(10), 1032-1042 (1992-10).
  55. Y.Kaji, R.Nakanishi, H.Seki and T.Kasami: ``The Universal Recognition Problems for Parallel Multiple Context-Free Grammars and for Its Subclasses,'' IEICE Transactions on Information and Systems, E75-D(7), 499-508 (1992-07).
  56. R.Nakanishi, H.Seki and T.Kasami: ``On the Generative Capacity of Lexical-Functional Grammars,'' IEICE Transactions on Information and Systems, E75-D(7), 509-516 (1992-07).
  57. Y.Kaji, R.Nakanisi, H.Seki and T.Kasami: ``The Universal Recognition Problems for Multiple Context-Free Grammars and for Linear Context-Free Rewriting Systems,'' IEICE Transactions on Information and Systems, E75-D(1), 78-88 (1992-01).
  58. 邵峰晶, 白川理, 関浩之, 藤井護, 嵩忠雄: ``順序機械によってモデル化された通信プロトコルの一検証法 --OSIセションプロトコルを例にして--,'' 電子情報通信学会論文誌(D-I), J74-D-I(12), 846-857 (1991-12).
  59. H.Seki, T.Matsumura, M.Fujii and T.Kasami: ``On Multiple Context-Free Grammars,'' Theoretical Computer Science, 88(2), 191-229 (1991-10).
  60. 関浩之, 嵩忠雄, 並河英二, 松村享: ``自然語仕様から代数的仕様への変換法について,'' 電子情報通信学会論文誌(D-I), J74-D-I(4), 283-295 (1991-04).
  61. 松村享, 関浩之, 藤井護, 嵩忠雄: ``多重文脈自由文法とHead Grammarの生成能力について,'' 電子情報通信学会論文誌(D-I), J73-D-I(5), 473-483 (1990-05).
  62. ル一光, 粟屋英司, 関浩之, 藤井護, 二宮清: ``抽象的順序機械の形で記述された代数的仕様からプログラムへの変換について,'' 電子情報通信学会論文誌(D-I), J73-D-I(2), 201-213 (1990-02).
  63. 有吉泰介, 関浩之, 森将豪, 藤井護, 嵩忠雄: ``貸出審査の代数的仕様記述とその実行システム,'' 電子情報通信学会論文誌(D-I), J73-D-I(1), 28-36 (1990-01).
  64. 森将豪, 関浩之, 藤井護: ``会計上の虚偽を発見するシステム --貸出審査における粉飾分析--,'' 企業会計, 41(9), 94-100 (1989-09).
  65. 粟屋英司, ル一光, 関浩之, 藤井護, 嵩忠雄: ``OSIセション層プロトコルの代数的仕様とその検証,'' 電子情報通信学会論文誌(D-I), J72-D-I(4), 272-283 (1989-04).
  66. K.Inoue, H.Seki and H.Yagi: ``Analysis of Functional Programs to Detect Run-Time Garbage Cells,'' ACM Transactions on Programming Languages and Systems, 10(4), 555-578 (1988-10).
  67. 嵩忠雄, 関浩之, 藤井護: ``Head Languageおよび多重文脈自由言語の所属問題,'' 電子情報通信学会論文誌(D-I), J71-D-I(6), 935-941 (1988-06).
  68. 嵩忠雄, 関浩之, 藤井護: ``一般化文脈自由文法と多重文脈自由文法,'' 電子情報通信学会論文誌(D-I), J71-D-I(5), 758-765 (1988-05).
  69. 関浩之, 谷口健一, 嵩忠雄: ``代数的言語ASL/*によって定義される合同関係の操作的意味について,'' 電子通信学会論文誌(D), J71-D(1), 23--31 (1988-01).
  70. 関浩之, 谷口健一, 嵩忠雄: ``代数的言語ASL/*と論理型言語間の等価変換について,'' 電子通信学会論文誌(D), J70-D(3), 543-552 (1987-03).
  71. K.Inoue, H.Seki, K.Taniguchi and T.Kasami: ``Compiling and Optimizing Methods for the Functional Language ASL/F,'' Science of Computer Programming, 7(3), 297-312 (1986).
  72. 嵩忠雄, 谷口健一, 杉山裕二, 関浩之: ``代数的言語ASL/* --意味定義を中心に--,'' 電子通信学会論文誌(D)J69-D(7), 1066-1074 (1986-07).
  73. 関浩之, 井上克郎, 谷口健一, 嵩忠雄: ``関数型言語ASL/Fのコンパイル時における最適化,'' 電子通信学会論文誌(D), J67-D(10), 1115-1122 (1984-10).
  74. 井上克郎, 関浩之, 谷口健一, 嵩忠雄: ``関数型言語ASL/Fとその最適化コンパイラ,'' 電子通信学会論文誌(D), J67-D(4), 458-465 (1984-04).

【国際会議】

  1. Jovilyn Therese B. Fajardo, Keiichi Yasumoto and Hiroyuki Seki, A Post-Haiyan Community Level Mobility Model, 8th International Conference on Mibile Computing and Ubiquitous Metworking (ICMU 2015), Poster, Hakodate, Japan, Jan 20-22.
  2. Yasuyuki Kobayashi, Yuichi Kaji, Hiroyuki Seki, Information Theoretical Evaluation of the Bucketing Technique to Mitigate Timing Attacks, International Symposium on Information Theory and Its Applications (ISITA 2014), Melbourne, Australia, Oct 26-29, 2014.
  3. Kazuki Miyahara, Kenji Hashimoto, Hiroyuki Seki: Node Query Preservation for Deterministic Linear Top-Down Tree Transducers, 2nd International Workshop on Trends in Tree Automata and Tree Transducers (TTATT 2013) EPTCS 134, pp.27-37, Hanoi, Oct 19, 2013.
  4. Kenji Hashimoto, Ryuta Sawada, Yasunori Ishihara, Hiroyuki Seki and Toru Fujiwara, Determinacy and Subsumption for Single-valued Bottom-up Tree Transducers, Proceedings of the 7th International Conference on Language and Automata Theory and Applications (LATA 2013), Bilbao, Spain, April 2013, Lecture Notes in Computer Science 7810, pp.335-346.
  5. Chittaphone Phonharath, Kenji Hashimoto and Hiroyuki Seki, Verification of the Security against Inference Attacks on XML Databases, 1st International Workshop on Trends in Tree Automata and Tree Transducers (TTATT 2012), pp.11-22, Nagoya, June 2, 2012.
  6. Ramon Mejia, Yuichi Kaji and Hiroyuki Seki, Trans-Organizational Role-Based Access Control, ACM Computer and Communications Security (ACM CCS) 2011, Poster, Chicago, IL, Oct 17-21, 2011.
  7. Ramon Mejia, Yuichi Kaji and Hiroyuki Seki, Low-density Parity Check Codes for High-Density 2D Barcode Symbology. In The Sixth International Multi-Conference on Computing in the Global Information Technology (ICCGI 2011), Luxemburg, June 2011. (Best Paper Award)
  8. Nobuyoshi Mizoguchi, Yuki Kato and Hiroyuki Seki: ``A Grammar-Based Approach to RNA Pseudoknotted Structure Prediction for Aligned Sequences,’’ 1st IEEE International Conference on Computational Advances in Bio and medical Sciences (ICCABS 2011), 135-140, Orlando, Florida, Feb. 2011,
  9. Yoshiaki Takata and Hiroyuki Seki: ``Automatic Generation of History-based Access Control from Information Flow Specification,’’ 8th International Symposium on Automated Technology for Verification and Analysis (ATVA 2010), Singapore, Sept. 2010, Lecture Notes in Computer Science 6252, pp.259-275.
  10. Ryo Yoshinaka, Yuichi Kaji and Hiroyuki Seki: ``Chomsky-Schutzenberger-Type Characterization of Multiple Context-Free Languages,’’ 4th International Conference on Language and Automata Theory and Applications (LATA 2010), Trier, Germany, May 2010, Lecture Notes in Computer Science 6031, pp.596-607.
  11. Nobuyoshi Mizoguchi, Yuki Kato and Hiroyuki Seki: ``Pairwise RNA Pseudoknotted Structure Prediction Based on Stochastic Grammar,’’ The 20th International Conference on Genome Informatics (GIW 2009), pp.P018-1P018-2, Dec. 2009.
  12. Yoshiaki Takata and Hiroyuki Seki: ``Comparison of the Expressive Power of Language-based Access Control Models,'' the 2008 International Conference on Next Era Information Networking (NEINE08), pp.347-350, Dec. 2008.
  13. Yuki Kato, Tatsuya Akutsu and Hiroyuki Seki: ``Prediction of Protein Beta-Sheets: Dynamic Programming versus Grammatical Approach,'' Third IAPR International Conference on Pattern Recognition in Bioinformatics (PRIB 2008), Lecture Notes in Bioinformatics 5265, pp.66-77, Melbourne, Australia, Oct. 2008.
  14. Yuki Kato, Tatsuya Akutsu and Hiroyuki Seki: ``A Grammatical Approach to RNA-RNA Interaction Prediction,'' Poster Abstracts of the 6th Asia Pacific Bioinformatics Conference (APBC2008), page P79, Kyoto, Japan, Jan. 2008.
  15. Yuki Kato, Tatsuya Akutsu and Hiroyuki Seki: ``A Grammatical Approach to RNA-RNA Interaction Prediction,'' 2007 International Symposium on Computational Models for Life Sciences (CMLS'07), AIP Conference Proceedings 952, pp.197-206, Gold Coast, Australia, Dec. 2007.
  16. Yoshiaki Takata and Hiroyuki Seki: ``Computational Complexity of the Disclosure Tree Strategy in Trust Negotiation,'' the 2007 International Conference on Next Era Information Networking (NEINE07), pp.323-328, Sept. 2007.
  17. Hitoshi Ohsaki and Hiroyuki Seki: ``Languages Modulo Normalization,'' 6th International Symposium on Frontiers of Combining Systems (FroCoS07), Liverpool, U.K., Sept. 2007, Lecture Notes in Artificial Intelligence 4720, pp.221-236.
  18. Hisashi Mohri, Ikuya Yasuda, Yoshiaki Takata and Hiroyuki Seki: ``Certification Chain Discovery in Web of Trust for Ad Hoc Networks,'' The 2007 IEEE International Symposium on Ubisafe Computing (Ubisafe-07), 21st International Conference on Advanced Information Networking and Applications Workshops/Symposia, 2, 479-485, Ontario, Canada, May 2007.
  19. Jing Wang, Yoshiaki Takata and Hiroyuki Seki: ``HBAC: A Model for History-based Access Control and Its Model Checking,'' 11th European Symposium On Research In Computer Security (ESORICS 2006), Hamburg, Germany, Sept. 2006, Lecture Notes in Computer Science 4189, pp.263-278.
  20. Yuki Kato, Hiroyuki Seki and Tadao Kasami: ``Stochastic Multiple Context-Free Grammar for RNA Pseudoknot Modeling,'' Proceedings of the 8th International Workshop on Tree Adjoining Grammar and Related Formalisms (TAG+8), pp.57-64, Sydney, Australia, July 2006.
  21. Yuki Kato, Hiroyuki Seki and Tadao Kasami: ``RNA Structure Prediction Including Pseudoknots Based on Stochastic Multiple Context-Free Grammar," Workshop Proceedings of Probabilistic Modeling and Machine Learning in Structural and Systems Biology (PMSB06), pp.32-37, Tuusula, Finland, June 2006.
  22. Jun Noda, Mie Takahashi,Itaru Hosomi, Hisashi Mouri, Yoshiaki Takata and Hiroyuki Seki: ``Integrating Presence Inference into Trust Management for Ubiquitous Systems,'' Proceedings of 11th ACM Symposium on Access Control Models and Technologies (ACM SACMAT 2006), pp.59-68, CA, June 2006.
  23. Hisashi Mouri, Yoshiaki Takata and Hiroyuki Seki: ``A Formal Model for Stateful Trust Management Systems,'' Proceedings of IASTED International Conference on Software Engineering and Applications (SEA 2005), 467-030, pp.87-92, Phoenix, USA, Nov. 2005.
  24. Isao Yagi, Yoshiaki Takata and Hiroyuki Seki: ``A Static Analysis using Tree Automata for XML Access Control,'' Third International Symposium on Automated Technology for Verification and Analysis (ATVA 2005), Taipei, Taiwan, Oct. 2005, Lecture Notes in Computer Science 3707, pp.234-247.
  25. Yuki Kato, Hiroyuki Seki and Tadao Kasami: ``Subclasses of Tree Adjoining Grammar for RNA Secondary Structure,'' Proceedings of 7th International Workshop on Tree Adjoining Grammar and Related Formalisms (TAG+7), pp.48-55, Vancouver, Canada, May 2004.
  26. Yoshiaki Takata, Takeshi Nakamura and Hiroyuki Seki: Accessibility Verification of WWW documents by an Automatic Guideline Verification Tool, Proc. the 37th Hawaii International Conference on System Sciences (HICSS-37), the Digital Documents and Media Track, The Experience of Media From Design to Use Minitrack, Abstract: p.98, Full paper: CD-ROM, Big Island, Hawaii, Jan. 2004.
  27. Yuki Kato, Hiroyuki Seki and Tadao Kasami: ``A Comparative Study on Formal Grammars for Pseudoknots,'' Proceedings of the 14th International Conference on Genome Informatics (GIW 2003), Poster Session, pp.470-471, Yokohama, Japan, Dec. 2003.
  28. Susumu Kiyamura, Yoshiaki Takata and Hiroyuki Seki: ``Process Decomposition via Synchronization Events and Its Application to Counter-Process Decomposition,'' Proceedings of the 5th International Conference on Parallel Processing and Applied Mathematics (PPAM 2003), Czestochowa, Poland, Sept. 2003, Lecture Notes in Computer Science 3019, pp.298-305.
  29. Naoya Nitta and Hiroyuki Seki: ``An Extension of Pushdown System and Its Model Checking Method,'' Proceedings of the 14th International Conference on Concurrency Theory (CONCUR 2003), Marseille, France, Sept. 2003, Lecture Notes in Computer Science 2761, pp.281-295.
  30. Yoshiaki Takata, Takeshi Nakamura and Hiroyuki Seki: ``Automatic Accessibility Guideline Validation of XML Documents Based on a Specification Language,'' Universal Access in HCI: Inclusive Design in the Information Society, Volume 4 of the Proceedings of 10th International Conference on Human-Computer Interaction (HCII 2003), Constantine Stephanidis (ed.), pp.1040-1044, Lawrence Erlbaum Associates, Crete, Greece, June 2003. ISBN 0-8058-4933-5
  31. Hitoshi Ohsaki, Hiroyuki Seki and Toshinori Takai: ``Recognizing Boolean Closed A-Tree Languages with Membership Conditional Rewriting Mechanism,'' Proceedings of 14th International Conference on Rewriting Techniques and Applications (RTA'03), Valencia, Spain, June 2003, Lecture Notes in Computer Science 2706, pp.483-498.
  32. S. Kuninobu, Y. Takata, D. Taguchi, M. Nakae and H. Seki: ``A Specification Language for Distributed Policy Control,'' Proceedings of Fourth International Conference on Information and Communications Security (ICICS 2002), Singapore, Dec. 2002, Lecture Notes in Computer Science 2513, pp.386-398.
  33. H. Seki, T. Takai, Y. Fujinaka and Y. Kaji: ``Layered Transducing Term Rewriting System and Its Recognizability Preserving Property,'' Proceedings of 13th International Conference on Rewriting Techniques and Applications (RTA'2002), Copenhagen, Denmark, July 2002, Lecture Notes in Computer Science 2378, pp.98-113.
  34. Reishi Yokomori, Fumiaki Ohata, Yoshiaki Takata, Hiroyuki Seki and Katsuro Inoue: "Analysis and Implementation Method of Program to Detect Inappropriate Information Leak", Proceedings of The Second Asia-Pacific Conference on Quality Software (APAQS 2001), pp.5-12, Hong Kong, China, Dec. 2001.
  35. S. Kuninobu, Y. Takata, H. Seki and K. Inoue: ``An Efficient Information Flow Analysis of Recursive Programs based on a Lattice Model of Security Classes,'' Proceedings of Third International Conference on Information and Communications Security (ICICS 2001), Xian, China, Nov. 2001, Lecture Notes in Computer Science 2229, pp.292-303.
  36. N. Nitta, Y. Takata and H. Seki: ``An Efficient Security Verification Method for Programs with Stack Inspection,'' Proceedings of the 8th ACM Conference on Computer and Communications Security (ACM CCS-8), pp.68-77, Philadelphia, Pennsylvania, Nov. 2001.
  37. M. Ikeda, Y. Takata and H. Seki: ``Formal Specification and Implementation Using Task Flow Diagram in Interactive System Design,'' Proceedings 5th World Multiconference on Systemics, Cybernetics and Informatics (SCI 2001), Orlando, Vol.I Information Systems Development, 422-428, July 2001.
  38. N. Nitta, Y. Takata and H. Seki: ``Security Verification of Programs with Stack Inspection,'' Proceedings of 6th ACM Symposium on Access Control Models and Technologies, (ACM SACMAT2001), Chantilly, Virginia, 31-40, May 2001.
  39. Y. Takata, K. Nakagawa and H. Seki: ``Flexible Category Structure for Supporting WWW Retrieval,'' The 2nd International Workshop on The World Wide Web and Conceptual Modeling (WCM2000), Salt Lake City, Utah, Oct. 2000, Lecture Notes in Computer Science, 1921, 165-177.
  40. T.Takai, Y.Kaji and H.Seki: ``Right-Linear Finite Path Overlapping Term Rewriting Systems Effectively Preserve Recognizability,'' 11th International Conference on Rewriting Techniques and Applications (RTA'2000), Norwich, U.K. (2000-07), Lecture Notes in Computer Science 1833, 246-260.
  41. R.Nakanishi, K.Takada and H.Seki: ``An Efficient Recognition Algorithm for Multiple Context-Free Languages,'' Proceedings of Fifth Meeting on the Mathematics of Language, Saarbruecken, Germany, 119-123 (1997-08).
  42. Y.Ishihara, H.Seki and M.Ito: ``Type-Consistency Problems for Queries in Object-Oriented Databases,'' Proceedings of the 6th International Conference on Database Theory, Lecture Notes in Computer Science, 1186, 364-378 (1997-01).
  43. H.Seki, Y.Ishihara and M.Ito: ``Authorization Analysis of Queries in Object-Oriented Databases,'' Proceedings of the Fourth International Conference on Deductive and Object-Oriented Databases, Lecture Notes in Computer Science, 1013, 521-538 (1995-12).
  44. M.Higuchi, H.Seki and T.Kasami: ``An Experiment on Verifying OSI Session Protocol -- Decomposition into Subprotocols --,'' Proceedings of 9th International Conference on Information Networking, 231-236 (1994-12).
  45. H.Seki, R.Nakanishi, Y.Kaji, S.Ando and T.Kasami: ``Parallel Multiple Context-Free Grammars, Finite-State Translation Systems, and Polynomial-Time Recognizable Subclasses of Lexical-Functional Grammars,'' Proceedings of 31st Annual Meeting of the Association for Computational Linguistics, 130-139 (1993-06).
  46. Y.Ishihara, H.Seki and T.Kasami: ``A Translation Method from Natural Language Specifications into Formal Specifications Using Contextual Dependencies,'' Proceedings of the IEEE International Symposium on Requirements Engineering, 232-239 (1993-01).
  47. M.Higuchi, O.Shirakawa, H.Seki, M.Fujii and T.Kasami: ``A Verification Procedure via Invariant for Extended Communicating Finite-State Machines,'' Proceedings of the Fourth Workshop on Computer Aided Verification, Lecture Notes in Computer Science, 663, 384-395 (1992-06).
  48. Y.Kaji, R.Nakanishi, H.Seki and T.Kasami: ``The Computational Complexity of the Universal Recognition Problem for Parallel Multiple Context-Free Grammars,'' Abstracts of TAG+ Workshop, 25.1-25.2 (1992-06).
  49. K.Taniguchi, H.Seki and T.Kasami: ``Translation from Specifications in a Natural Language into Algebraic Specifications and their Stepwise Refinement,'' Proceedings of Linguistic Engineering '91, D.3.1-D.3.6 (1991-01).
  50. F.Shao, H.Seki, O.Shirakawa, M.Fujii and T. Kasami: ``A Verification System for Communication Protocols and Its Application to the OSI Session Protocol,'' Proceedings of 1990 Joint Conference on Communications, Networks, Switching Systems and Satellite Communications, 110-114 (1990-12).
  51. H.Seki, E.Nabika, T.Matsumura, Y.Sugiyama, M.Fujii, K.Torii and T.Kasami: ``A Processing System for Program Specifications in a Natural Language,'' Proceedings of 21st Annual Hawaii International Conference on System Sciences, 754-763 (1988-01).

【特許】

  1. 鍵の生成方法、装置及びプログラム(PCT出願時:鍵の生成方法),関浩之,中村嘉隆,野田潤,出願番号 PCT/JP2011/080583(国際出願日 2011.12.27).
  2. 鍵の生成方法、装置及びプログラム, 野田 潤, 関 浩之, 中村 嘉隆, 特願2010-293094 (出願日2010.12.28).
  3. 鍵管理装置、サービス提供装置、アクセス管理システム、アクセス管理方法、制御プログラム、およびコンピュータ読み取り可能な記録媒体, 楫 勇一,関 浩之, 特願2010-149517 (出願日2010.06.30).
  4. 暗号鍵生成システム、暗号鍵生成方法および暗号鍵生成用プログラム, 仁野 裕一, 野田 潤, 関 浩之, 中村 嘉隆, 南 貴博, 特願2009-31154 (出願日2009.02.13, 特許査定日2013.11.27), 特許第5463516 (登録日 2014.1.31).
  5. 位置情報推定方法、位置情報推定装置、及び位置情報推定プログラム, 野田 潤, 高田 喜朗, 関 浩之、野田 三恵, 特願2006-240234 (出願日2006.09.05, 特許審査日2011.09.20), 特許第4848900 (登録日2011.10.28). 
  6. 情報処理システム、情報処理装置、情報処理方法、および情報処理プログラム, 野田 潤, 高田 喜朗, 関 浩之, 細見 格, 高橋 三恵, 特願2005-256644 (出願日2005.09.05, 特許査定日2011.03.29), 特許第4735141 (登録日2011.05.13).
  7. 信用確立方法と信用に基づいたサービス制御システム, 野田 潤, 田口 大悟, 関 浩之, 高田 喜朗, 仁野 裕一, 特願2004-182039 (届出日:2004.03.30, 出願日2004.06.21).
  8. 情報通信方法およびシステム, 田口 大悟, 仁野 裕一, 関 浩之, 高田 喜朗, 特願2003-409917 (届出日2003.09.30, 出願日2003.12.09).
  9. データ管理装置及びデータ管理プログラム' 田口 大悟, 関 浩之, 細見 格, 中江 政行, 楫 勇一, 高田 喜朗, 特願2002-158577 (出願日2002.05.31), 特許第4000916 (登録日 2007.08.24).

【招待講演】

  1. 関浩之: セキュリティやプライバシーの定量的尺度について, 電子情報通信学会技術研究報告(情報理論研究会), IT2014-52, 2014-12.
  2. 関浩之: システム設計・検証の数理, 企画セッション「システム数理と応用 –CSTからMSS-」,2011年電子情報通信学会総合大会, 2011-03.
  3. 関浩之: ソフトウェアの静的解析と動的検査 - 言語ベースセキュリティを例にして -, 情報処理学会組込みシステムシンポジウム2009 (ESS2009), 2009-10.
  4. 関浩之: アクセス制御 - 言語ベースセキュリティをめざして -, 日本ソフトウェア科学会第7回ディペンダブルシステムワークショップ(DSW2009)論文集, pp.93-98, 2009-07.
  5. 加藤有己, 関浩之, 阿久津達也: 形式文法に基づくRNA 2次構造予測, 電子情報通信学会技術研究報告(情報理論研究会), IT2007-21, 2007-11.
  6. 関浩之: 無限状態モデル検査 - 概要と事例報告 -, システム設計検証技術研究会, 産業技術総合研究所システム検証研究センター(CVS), 2005-09.
  7. 関浩之: 形式意味論の基礎 -通信プロトコルの形式的記述を例にして-' 9回情報伝送と信号処理ワークショップ, pp.13-14, 1996-11.

【国内研究会・全国大会・テクニカルレポートなど】(2011年以降のみ)

  1. 後藤健志,尾上栄浩,橋本健二,関浩之,木文法に基づく圧縮XML文書に対する直接更新手法の評価,電子情報通信学会技術研究報告, SS2014-**, Jan 2015.
  2. 小林靖幸,楫勇一,関浩之,伊藤実,RSA暗号の高速化手法に対するタイミング攻撃の情報理論的安全性評価,2015年暗号と情報セキュリティシンポジウム(SCIS2015), 4F1-2, Jan 2015.
  3. 尾上栄浩,橋本健二,関浩之,木文法による圧縮XML文書に対する問合せと更新手法,電子情報通信学会技術研究報告, SS2014-28, Oct 2014.
  4. 小林靖幸,楫勇一,関浩之,伊藤実,タイミング攻撃により漏えいする鍵情報の量的評価,電子情報通信学会技術研究報告, ISEC2014-35, July 2014.
  5. Nut Sornchumni, Kenji Hashimoto and Hiroyuki Seki, Towards HMM parameter estimation with differential privacy, IPSJ SIG on Mathematical Modeling and Problem Solving,  2014-MPS-98(25), June 2014.
  6. 小田 将之, 橋本 健二, 楫 勇一, 関 浩之, デバイスペアリングを利用した位置証明プロトコルの提案, 情報処理学会研究報告, 2014-DPS-158(37), March 2014.
  7. Bao Trung Chu, Kenji Hashimoto, and Hiroyuki Seki, Runtime Control of a Program based on Quantitative Information Flow, IEICE Technical Report, SS2013-60, Jan. 2014.
  8. Kenji Hashimoto, Ryuta Sawada, Yasunori Ishihara, Hiroyuki Seki, and Toru Fujiwara, Determinacy and Subsumption of Single-valued Bottom-up Tree Transducers, 15回プログラミングおよびプログラミング言語ワークショップ(PPL 2013, カテゴリ2, March 2013.
  9. 宮原 一喜, 橋本 健二, 関 浩之, 決定性線形下降木変換器における頂点問合せ保存, 電子情報通信学会技術研究報告, SS2012-38, Nov.2012. (平成24年度電子情報通信学会ソフトウェアサイエンス研究会研究奨励賞)
  10. Hiroyuki Seki, Multiple Context-Free Grammars: Basic Properties and Complexity, the Second Workshop on Multiple Context-Free Grammars and Related Formalisms (MCFG+2), Nara, Sept 2011.
  11. Chittaphone Phonharath, Kenji Hashimoto and Hiroyuki Seki, Static Analysis for k-secrecy against Inference Attacks, 電子情報通信学会技術研究報告, SS2011-4, June 2011.
  12. Hiroyuki Seki, Nobuyoshi Mizoguchi, Yuki Kato, A Comparative Approach to RNA Pseudoknotted Structure Prediction Based on Multiple Context-Free Grammar, 8th Asian Workshop on Foundation of Software, Shanghai, May 2011.