


default search action
Yasushi Shinjo
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c32]Akihiro Shoji, Yasushi Shinjo:
Implementation method of non-bypassable PC application firewalls using virtualization technologies. HPCC/DSS/SmartCity/DependSys 2023: 435-442 - 2020
- [c31]Chung-Fan Yang, Yasushi Shinjo:
Obtaining hard real-time performance and rich Linux features in a compounded real-time operating system by a partitioning hypervisor. VEE 2020: 59-72
2010 – 2019
- 2018
- [j6]Oscar Garcia
, Yasushi Shinjo, Calton Pu:
Achieving Consistent Real-Time Latency at Scale in a Commodity Virtual Machine Environment Through Socket Outsourcing-Based Network Stacks. IEEE Access 6: 69961-69977 (2018) - [c30]Oscar Garcia, Yasushi Shinjo, Calton Pu:
Implementation and Comparative Evaluation of an Outsourcing Approach to Real-Time Network Services in Commodity Hosted Environments. CLOUD 2018: 189-205 - 2017
- [c29]Meng Li, Yasushi Shinjo:
Grouper: A Framework for Developing Mobile Applications using a Secret Sharing Scheme and Untrusted Servers. ICNCC 2017: 125-134 - [c28]Yasushi Shinjo, Sota Naito, Xiao Kunyao, Akira Sato:
ABnews: A Fast Private Social Messaging System Using Untrusted Storage and Attribute-Based Encryption. PST 2017: 317-326 - 2016
- [c27]Rongchang Lai, Yasushi Shinjo:
Sweets: A Decentralized Social Networking Service Application Using Data Synchronization on Mobile Devices. CollaborateCom 2016: 188-198 - [c26]Yasushi Shinjo, Naoki Kainuma, Daiyuu Nobori, Akira Sato:
Magic mantle using social VPNs against centralized social networking services. PST 2016: 341-348 - 2015
- [c25]Ake Koomsin, Yasushi Shinjo:
Running application specific kernel code by a just-in-time compiler. PLOS@SOSP 2015: 15-20 - 2014
- [c24]Yasushi Shinjo, Xiao Kunyao, Naoki Kainuma, Daiyuu Nobori, Akira Sato:
Friend News System: A Modern Implementation of Usenet over Social VPNs. BDCloud 2014: 432-440 - [c23]Daiyuu Nobori, Yasushi Shinjo:
VPN Gate: A Volunteer-Organized Public VPN Relay System with Blocking Resistance for Bypassing Government Censorship Firewalls. NSDI 2014: 229-241 - 2012
- [c22]Shingo Takada, Akira Sato, Yasushi Shinjo, Hisashi Nakai, Koichi Sakurai, Kozo Itano:
A simple collaborative method in Web proxy access control for supporting complex authentication mechanisms. CollaborateCom 2012: 190-199 - [c21]Shingo Takada, Akira Sato, Yasushi Shinjo, Hisashi Nakai, Akiyoshi Sugiki, Kozo Itano:
A P2P Approach to Scalable Network-Booting. ICNC 2012: 201-207 - 2011
- [c20]Yasushi Shinjo, Fei Guo, Naoya Kaneko, Takejiro Matsuyama, Tatsuya Taniuchi, Akira Sato:
A distributed web browser as a platform for running collaborative applications. CollaborateCom 2011: 278-286 - [c19]Jinpeng Wei, Feng Zhu, Yasushi Shinjo:
Static analysis based invariant detection for commodity operating systems. CollaborateCom 2011: 287-296 - 2010
- [c18]Yasushi Shinjo, D. Kamikawa, Akira Sato:
Collaboration by passing access rights for personal protected Web resources. CollaborateCom 2010: 1-10 - [c17]Mitsuhiro Mabuchi, Yasushi Shinjo, Koji Hasebe, Akira Sato, Kazuhiko Kato:
CapaCon: access control mechanism for inter-device communications through TCP connections. SAC 2010: 706-712 - [c16]Satoshi Matsumoto, Akira Sato, Yasushi Shinjo, Hisashi Nakai, Kozo Itano, Yusuke Shomura, Kenichi Yoshida:
A Method for Analyzing Network Traffic Using Cardinality Information in Firewall Logs. SAINT 2010: 241-244
2000 – 2009
- 2009
- [j5]Péter Surányi, Yasushi Shinjo, Kazuhiko Kato:
Name-Based Address Mapping for Virtual Private Networks. IEICE Trans. Commun. 92-B(1): 200-208 (2009) - [c15]Yasushi Shinjo, Keigo Matsui, Takuya Sugimoto, Akira Sato:
An anti-spam scheme using capability-based access control. LCN 2009: 907-914 - [c14]Younggyun Koh, Calton Pu, Yasushi Shinjo, Hideki Eiraku, Go Saito, Daiyuu Nobori:
Improving Virtualized Windows Network Performance by Delegating Network Processing. NCA 2009: 203-210 - [c13]Hideki Eiraku, Yasushi Shinjo, Calton Pu, Younggyun Koh, Kazuhiko Kato:
Fast networking with socket-outsourcing in hosted virtual machine environments. SAC 2009: 310-317 - [c12]Takahiro Shinagawa
, Hideki Eiraku, Kouichi Tanimoto, Kazumasa Omote, Shoichi Hasegawa, Takashi Horie, Manabu Hirano, Kenichi Kourai
, Yoshihiro Oyama, Eiji Kawai, Kenji Kono, Shigeru Chiba, Yasushi Shinjo, Kazuhiko Kato:
BitVisor: a thin hypervisor for enforcing i/o device security. VEE 2009: 121-130 - 2008
- [c11]Mitsuhiro Mabuchi, Yasushi Shinjo, Akira Sato, Kazuhiko Kato:
An Access Control Model for Web-Services That Supports Delegation and Creation of Authority. ICN 2008: 213-222 - 2007
- [j4]Shinichi Suzuki, Yasushi Shinjo, Toshio Hirotsu, Kozo Itano, Kazuhiko Kato:
Capability-based egress network access control by using DNS server. J. Netw. Comput. Appl. 30(4): 1275-1282 (2007) - 2005
- [j3]Yasushi Shinjo, Calton Pu:
Achieving Efficiency and Portability in Systems Software: A Case Study on POSIX-Compliant Multithreaded Programs. IEEE Trans. Software Eng. 31(9): 785-800 (2005) - [c10]Shinichi Suzuki, Yasushi Shinjo, Toshio Hirotsu, Kozo Itano, Kazuhiko Kato:
Capability-Based Egress Network Access Control for Transferring Access Rights. ICITA (2) 2005: 488-495 - [c9]Shinichi Suzuki, Yasushi Shinjo, Toshio Hirotsu, Kazuhiko Kato, Kozo Itano:
Name-Level Approach for Egress Network Access Control. ICN (2) 2005: 284-296 - [c8]Péter Surányi, Hirotake Abe, Toshio Hirotsu, Yasushi Shinjo, Kazuhiko Kato:
General Virtual Hosting via Lightweight User-Level Virtualization. SAINT 2005: 229-236 - 2004
- [j2]Yasushi Shinjo, Toshiyuki Kubo, Calton Pu:
Efficient mediators with closures for handling dynamic interfaces in an imperative language. Inf. Softw. Technol. 46(5): 351-357 (2004) - 2003
- [c7]Hideki Eiraku, Yasushi Shinjo:
Running BSD Kernels as User Processes by Partial Emulation and Rewriting of Machine Instructions. BSDCon 2003: 91-102 - [c6]Yasushi Shinjo, Yoshinori Nakata, Kozo Itano:
Securing RPC with a Reference Monitor for System Calls. ISSS 2003: 262-280 - [c5]Yasushi Shinjo, Toshiyuki Kubo, Calton Pu:
Efficient Mediators through Dynamic Code Generation: a Method and an Experiment. SAC 2003: 1147-1154 - 2002
- [c4]Yasushi Shinjo, Kotaro Eiraku, Atsushi Suzuki, Kozo Itano, Calton Pu:
Enhancing Access Control with SysGuard, Reference Monitor Supporting Portable and Composable Kernel Module. PRDC 2002: 167-176
1990 – 1999
- 1997
- [j1]Yasushi Shinjo, Yasushi Kiyoki:
A Lightweight Process Facility Supporting Meta-Level Programming. Parallel Comput. 22(11): 1429-1454 (1997) - [c3]Yasushi Shinjo:
The World Wide Shell Based on the Object-Stacking Model. WWCA 1997: 410-425 - 1992
- [c2]Yasushi Shinjo, Yasushi Kiyoki:
Harmonizing a Distributed Operating System with Parallel and Distributed Applications. HPDC 1992: 114-123 - 1991
- [c1]Yasushi Shinjo, Yasushi Kiyoki:
ReSC: A Distributed Operating System for Parallel and Distributed Applications. PDIS 1991: 171
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-20 22:51 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint