Kazuhiro Minami

Associate professor
Institute of Statistical Mathematics
10-3 Midori-cho
Tachikawa, Tokyo, Japan 191-8562

Phone: +81-50-5533-8533
Email: user: kminami, domain: ism.ac.jp
Office: A501A


I am an associate professor at Institute of Statistical Mathematics in Tokyo, Japan. I received a Ph.D from Dartmouth College under the guidance of Prof. David Kotz in 2006.

Research

Security and Privacy, Distributed systems, and Formal methods.

Teaching

TPC members: UIC2011, WPES2010, UIC2010. UCS2009. EUC2008, UCS2007.

Refereed journal articles

  1. Yoshiki Yamagata, Daisuke Murakamia, Kazuhiro Minami, Nana Arizumi, Sho Kuroda, Tomoya Tanjo, Hiroshi Maruyama. Electricity Self-Sufficient Community Clustering for Energy Resilience. Energies, 9(7), 543, July 2016. [pdf]
  2. Nicolas Schwind, Morgan Magnin, Katsumi Inoue, Tenda Okimoto, Taisuke Sato, Kazuhiro Minami, and Hiroshi Maruyama. Formalization of Resilience for Constraint-Based Dynamic Systems. Journal of Reliable Intelligent Environments, December 2015. [pdf]
  3. Yoshiki Yamagata, Daisuke Murakamia, Kazuhiro Minami, Nana Arizumi, Sho Kuroda, Tomoya Tanjo, Hiroshi Maruyama. A Comparative Study of Clustering Algorithms for Electricity Self-sufficient Community Extraction. Energy Prodedia, Volume 75, August 2015. [pdf]
  4. Tomoya Tanjo, Kazuhiro Minami, Ken Mano, and Hiroshi Maruyama. Evaluating Data Utility of Privacy-preserving Pseudonymized Location Datasets. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA). Vol. 5, No. 3, September 2014. [pdf]
  5. Hiroshi Maruyama and Kazuhiro Minami. Towards Systems Resilience. Innovation and Supply Chain Management. 7(3), September, 2013. [preprint]
  6. Adam Lee, Kazuhiro Minami, and Marianne Winslett. On the Consistency of Distributed Proofs with Hidden Subtrees. ACM Transactions on Information and System Security (TISSEC). 13(3), 2010. [pdf]
  7. Kazuhiro Minami and David Kotz. Secure Context-sensitive Authorization. Journal of Pervasive and Mobile Computing (PMC), 1(1), March, 2005. [pdf]
Book chapters
  1. Kazuhiro Minami, Tomoya Tanjo, Nana Arizumi, Hiroshi Maruyama, Daisuke Murakami, Yoshiki Yamagata. Resilient Community Clustering: A Graph Theoretical Approach. In Urban Resilience -- A Transformative Approach, Chapter 7, Springer, 2016.
  2. Nicolas Schwind, Kazuhiro Minami, Hiroshi Maruyama, Leena Ilmola, Katsumi Inoue. Computational Framework of Resilience. In Urban Resilience -- A Transformative Approach, Chapter 12, Springer, 2016.
  3. Kazuhiro Minami and David Kotz. Distributed proof systems for cross-domain authorization. In Handbooks in Information Systems Volume 4, Security and Privacy Services, Chapter 1, Emerald Group Publishing Limited, 2009.
  4. Guanling Chen, Kazuhiro Minami, and David Kotz. Naming and discovery in mobile systems. In Paolo Bellavista and Antonio Corradi, editors, The Handbook of Mobile Middleware, Chapter 16, CRC Press, October 2006.
Thesis Refereed conference and workshop papers
  1. Tomoya Tanjo, Kazuhiro Minami, and Hiroshi Maruyama. Graph Partitioning of power grids considering electricity sharing. 2nd International Conference on Environment and Renewable Energy ((ICERE), February 24 - 25, 2016. [pdf]
  2. Yoshiki Yamagata, Daisuke Murakamia, Kazuhiro Minami, Nana Arizumi, Sho Kuroda, Tomoya Tanjo, and Hiroshi Maruyama. Comparative Study of Clustering Algorithms for Electricity Self-sufficient Community Extraction. 7th International Conference on Applied Energy, March 28 - 31, 2015. [pdf]
  3. Kazuhiro Minami, Tomoya Tanjo, Nana Arizumi, and Hiroshi Maruyama. Flexible Graph Partitioning of Power Grids with Peer-to-peer Electricity Exchange. In Proceedings of the 7th International Conference on Information and Automation for Sustainability (ICIAfS), December, 2014. [pdf]
  4. Nana Arizumi, Kazuhiro Minami, Tomoya Tanjo, Hiroshi Maruyama, Daisuke Murakami, and Yoshiki Yamagata. A First Step Towards Resilient Graph Partitioning for Electrical Grids. In Proceedings of the 7th International Conference on Information and Automation for Sustainability (ICIAfS), December, 2014. [pdf]
  5. Tomoya Tanjo, Kazuhiro Minami, Ken Mano, and Hiroshi Maruyama. On Safety of Pseudonym-based Location Data in the Context of Constraint Satisfation Problems. In Proceedings of the 2014 Asian Conference on Availability, Reliability and Security (AsiaARES), April, 2014. [pdf]
  6. Kazuhiro Minami, Tomoya Tanjo, Roberto Legaspi, Hiroshi Maruyama, and Yoshiki Yamagata. Evaluating the Sustainability of an Ecological System Based on Evolutionary Multi-agent Simulations. In Proceedings of the International Conference and Utility Exhibition 2014 on Green Energy for Sustainable Development (ICUE), March, 2014. [pdf]
  7. Hiroshi Maruyama, Kazuhiro Minami, Roberto Legaspi, and Yoshiki Yamagata. General Resilience: Taxonomy and Strategies. In Proceedings of the International Conference and Utility Exhibition 2014 on Green Energy for Sustainable Development (ICUE), March, 2014.[pdf]
  8. Kazuhiro Minami. Preventing Denial-of-request Inference Attacks in Location-sharing Services. In Proceedings of the 7th International Conference on Mobile Computing and Ubiquitous Networking (ICMU), January, 2014. (Best Paper Award) [pdf]
  9. Kazuhiro Minami, Tomoya Tanjo, and Hiroshi Maruyama. Evaluating Resilience Strategies Based on an Evolutionary Multi-agent System. In Proceedings of the IEEE International Conference on Computational Intelligence and Cybernetics (CyberneticsCom), December, 2013. [pdf]
  10. Ken Mano, Kazuhiro Minami, and Hiroshi Maruyama. Privacy-preserving Publishing of Pseudonym-based Trajectory Location Data Set. In Proceedings of the 2nd International Workshop on Security of Mobile Applications (IWSMA), September, 2013. [pdf]
  11. Hiroshi Maruyama, Kiyoshi Watanabe, Sachiko Yoshihama, Naohiko Uramoto, Yoichi Takehora, and Kazuhiro Minami. ICHIGAN Security - A Security Architecture that Enables Situation-Based Policy Switching. In Proceedings of the 3rd International Workshop on Resilience and IT-Risk in Social Infrastructures (RISI), September, 2013. [pdf]
  12. Nicolas Schwind, Tenda Okimoto, Katsumi Inoue, Hei Chan, Tony Ribeiro, Kazuhiro Minami, and Hiroshi Maruyama. Systems Resilience: a Challenge Problem for Dynamic Constraint-Based Agent Systems. In Proceedings of the 12th International Conference on Autonomous Agents and Multiagent Systems (AAMAS), May, 2013. (Best Challenges and Visions Paper Nominations: 3rd place) [pdf]
  13. Ken Mano, Kazuhiro Minami, and Hiroshi Maruyama. Protecting Location Privacy with K-Confusing Paths Based on Dynamic Pseudonyms. In Proceedings of the 5th IEEE International Workshop on SEcurity and SOCial Networking (SESOC), March, 2013. [pdf]
  14. Kazuhiro Minami, Tenda Okimoto, Tomoya Tanjo, Nicolas Schwind, Hei Chan, Katsumi Inoue and Hiroshi Maruyama. Formalizing the Resilience of Open Dynamic Systems. Joint Agent Workshop and Symposium (JAWS), October, 2012. [pdf]
  15. Kazuhiro Minami, Nikita Borisov, Marianne Winslett and Adam J. Lee, Confidentiality-Preserving Proof Theories for Distributed Proof Systems. In Proceedings of the 6th ACM Symposium on Information, Computer, and Communication Security (ASIACCS), March 2011. [pdf].
  16. Kazuhiro Minami and Nikita Borisov. Protecting Location Privacy against Inference Attacks. In Proceedings of the 9th Workshop on Privacy in the Electronic Society (WPES), October, 2010. [pdf].
  17. Kazuhiro Minami, Nikita Borisov, and Carl A. Gunter. Safety in Discretionary Access Control for Logic-based Publish-subscribe Systems. In Proceedings of the 14th ACM Symposium on Access Control Models and Technologies (SACMAT), June, 2009. [pdf]
  18. Adam J. Lee, Kazuhiro Minami, and Nikita Borisov, Confidentiality-Preserving Distributed Proofs of Conjunctive Queries. In Proceedings of the Fourth ACM Symposium on Information, Computer, and Communication Security (ASIACCS), March 2009. [pdf]
  19. Kazuhiro Minami, Adam Lee, Marianne Winslett, and Nikita Borisov. Secure Aggregation in a Publish-Subscribe System. In Proceedings of the 7th Workshop on Privacy in the Electronic Society (WPES), October, 2008. [pdf]
  20. Nikita Borisov and Kazuhiro Minami. Single-bit Re-encryption with Applications to Distributed Proof Systems. In Proceedings of the 6th Workshop on Privacy in the Electronic Society (WPES), October, 2007. [pdf]
  21. Adam Lee, Kazuhiro Minami, and Marianne Winslett. Lightweight Consistency Enforcement Schemes for Distributed Proofs with Hidden Subtrees. In Proceedings of the 12th ACM Symposium on Access Control Models and Technologies (SACMAT), June, 2007. [pdf]
  22. Kazuhiro Minami and David Kotz. Scalability in a Secure Distributed Proof System. In Proceedings of the Fourth International Conference on Pervasive Computing (Pervasive), May, 2006. [pdf]
  23. Kazuhiro Minami and David Kotz. Secure Context-sensitive Authorization. In Proceedings of the Third IEEE International Conference on Pervasive Computing and Communications (PerCom), March, 2005. [pdf]
  24. Shan Jiang, Sean Smith, and Kazuhiro Minami. Securing Web Servers against Insider Attack. In Proceedings of the 17th Annual Computer Security Applications Conference (ACSAC), December 2001. [pdf]
  25. Kazuhiro Minami and Toshihiro Suzuki. Java-Based Moderator Templates for Multi-Agent Planning. ACM Conference on Object-Oriented Systems, Languages and Applications (OOPSLA) Workshop on Java-based Paradigms for Agent Facilities, October 1997. [pdf]
Refereed poster abstracts
  1. Kazuhiro Minami and David Kotz. Controlling access to pervasive information in the "Solar" system. First International Conference on Mobile Systems, Applications, and Services (MobiSys) Poster Session, San Francisco, CA, May 2003. [pdf]
Technical reports
  1. Kazuhiro Minami and Hiroshi Maruyama. Resilience Engineering: State of the Art and Research Challenges. Forum on Information Technology (FIT), Information and Systems Society, September, 2012. [pdf]
  2. Kazuhiro Minami, Adam Lee, Marianne Winslett, and Nikita Borisov. Secure Aggregation in a Publish-Subscribe System. UIUC Techinical Report UIUCDCS-R-2008-2968, May, 2008. [pdf]
  3. Adam Lee, Kazuhiro Minami, and Marianne Winslett. Lightweight Consistency Enforcement Schemes for Distributed Proofs with Hidden Subtrees. UIUC Techinical Report UIUCDCS-R-2007-2839, April, 2007. [pdf]
  4. Kazuhiro Minami and David Kotz. Secure Context-sensitive Authorization. Technical Report TR2004-529, Dept. of Computer Science, Dartmouth College, December 2004.
  5. Kazuhiro Minami and David Kotz. Controlling access to pervasive information in the "Solar" system. Technical Report TR2002-422, Dept. of Computer Science, Dartmouth College, February 2002.
  6. Shan Jiang, Sean Smith, and Kazuhiro Minami. Securing Web Servers against Insider Attack. TR2001-410, Dept. of Computer Science, Dartmouth College, July 2001.

Presentations

  1. Preventing Denial-of-request Inference Attacks in Location-sharing Services. ICMU 2014, January 6, 2014. [pptx]
  2. Evaluating Resilience Strategies Based on an Evolutionary Multi-agent System. CyberneticsCom 2013, December 4, 2013. [pptx]
  3. Formalizing the Resilience of Open Dynamic Systems. Joint Agent Workshop and Symposium (JAWS), October 26, 2012. [pptx]
  4. Confidentiality-Preserving Proof Theories for Distributed Proof Systems. ASIACCS 2011. March 23, 2011. [pptx]
  5. Protecting Location Privacy against Inference Attacks. WPES 2010. Oct 4, 2010. [pptx]
  6. Safety in Discretionary Access Control for Logic-based Publish-subscribe Systems. SACMAT 2009. June 3, 2009. [pptx]
  7. Secure Additive Aggregation in a Publish-Subscribe System. WPES 2008. October 27, 2008. [pptx]
  8. Secure Additive Aggregation in a Publish-Subscribe System. Midwest Security Workshop (MSW) 2008. April 26, 2008.
  9. Single-bit Re-encryption with Applications to Distributed Proof Systems. WPES 2007. October 28, 2007. [ppt]
  10. Lightweight Consistency Enforcement Schemes for Distributed Proofs with Hidden Subtrees. SACMAT 2007. June 21, 2007. [ppt]
  11. Scalability in a Secure Distributed Proof System. Pervasive 2006. May 9, 2006. [ppt]
  12. Secure context-sensitive authorization. PerCom 2005. March 10, 2005. [ppt]

Last updated: July 25, 2016