Skip to main content

Shozo Naito

Shozo Naito

Profile

  • Bachelor of Engineering, Master of Engineering, Graduate School of Engineering, Kyoto University (Department of Mathematical Engineering)
  • Principal, Kamogawa School, Kyoto Computer Gakuin
  • Former Senior Researcher, Information Distribution Platform Laboratory, NIPPON TELEGRAPH AND TELEPHONE CORPORATION, Former Secretary, Internet Research Committee, IEICE, Advisory Professor, Korea Information Security Agency (KISA)
  • Director, Cyber Kyoto Laboratory
 

Message

The course I am in charge is "Information Security". In the construction and operation of information systems, networks and security are like two complementary wheels of a car. With networking, the convenience of information systems increases. However, in proportion to that, security risks also increase. In order to build and operate an information system optimally, it is important to always keep the balance in mind. In addition, network technology and security technology are evolving day by day in competition with each other. Along with the progress of information systems and the expansion of their use, networks are becoming faster, and more broadband is in use day by day. Under the slogan "ubiquitous network society", everything is going to be networked. Not only cars and information appliances, but also a radish and even a refrigerator to store it are connected to the network. On the other hand, as exemplified by cloud computing, data has been increasingly concentrated to a data center of software applications, rather than hardware or platform, on the premise of the existence of high-speed and broadband networks. Users can use computing resources through the network like they use electricity and water.

Of course, such a service environment can be realized with strong information security. The scale of damage caused by personal information leakage, computer virus infection, web server intrusion and page rewriting, e-commerce fraud, etc. is also increasing in proportion to the progress of networking. However, going back to the era of "close borders" is no longer a realistic solution. That's why we need a balanced solution for our situation. It's easier said than done, but it is unavoidable.

I would like to encourage all students to take on the challenge of mastering the latest network and information security technologies while balancing both theory and practice. And keep in mind that it's humans who use technology. There are growing new trends of legal issues regarding copyrights, the convergence of broadcasting and communications, and on-demand content distribution. I hope that you will have an opportunity to think about the role that information communication technology and information ethics play in the social system.

Responsible Subject

  • Information Security

Field of Specialization

Information Security, Information Network

  • Construction of Secure Web Service System: Design and Implementation of a Web Service System that Achieves Both Security and Privacy
  • Construction of Cyber Campus: Design and Implementation of Cyber Campus across Japan and Korea

Business Performance

  • Akira Shimazu, Shozo Naito, Hirosato Nomura: Japanese Language Semantic Analyzer Based on an Extended Case Frame Model. IJCAI, pp. 717 -720, 1983
  • Shozo Naito, Akira Shimazu, Hirosato Nomura: Classification of Modality Function and Its Application to Japanese Language Analysis. ACL, pp. 27 -34, 1985
  • Hirosato Nomura, Shozo Naito, Yasuhiro Katagiri, Akira Shimazu: Translation by Understanding: A Machine Translation System Lute. COLING, pp. 621 -626, 1986
  • Shigeru Masuyama, Shozo Naito: Deciding Which Graph G has Page Number One is in NC. Inf. Process. Lett. 44 (1), pp. 7 -10, 1992
  • Kimihiro Yamamoto, Shozo Naito, Masaki Itoh: Inductive Logic Programming Based on Genetic Algorithm. ASIAN, pp. 254 -268, 1995
  • Tsuyoshi Takeda, Shozo Naito: The Multi-variable Modular Polynomial and Its Applications to Cryptography. ISAAC, pp. 386 -396, 1996
  • Toyonori Fujiura, Shozo Naito, Satoshi Ono: A Traffic Measurement System Using Time Synchronization Mechanism. ICPP Workshops, p. 268 -273, 1999
  • Shozo Naito: Message from the IWI Workshop Co-Chairs. ICPP Workshops, p. 212 -213, 1999
  • Kimihiro Yamamoto, Shozo Naito: A Vertex Allocation Algorithm under Binary Tree Configuration. ICDCS Workshop on Internet, pp. A 27 -A 32, 2000
  • Kimihiro Yamamoto, Shozo Naito: A study on schema preservation by crossover. Systems and Computers in Japan 33 (2), pp. 64 -76, 2002
  • Tatsuya Mori, Ryoichi Kawahara, Shozo Naito: Analysis of Non-Gaussian Nature of Network Traffic and its Implication on Network Performance CoRR cs. NI/0209004, 2002
  • Tatsuya Mori, Ryoichi Kawahara, Shozo Naito: Analysis of Non-Gaussian Nature of Network Traffic CoRR cs. NI/0201004, 2002
  • Tatsuya Mori, Ryoichi Kawahara, Shozo Naito, Shigeki Goto: On the Characteristics of Internet Traffic Variability: Spikes and Elephants. SAINT, pp. 99 -106, 2004
  • Elephants and Mice Appearing on the Internet, NAIS Journal Vol. 1, 2005
  • Proposal of a Privacy Protection Method, NAIS Journal Vol. 2, 2007, Co-authored
  • NAIS Journal Vol. 10, 2015
  • Accumu | Kyoto Computer Gakuin Alumni Association bulletin