Professor

Tomoko Kaneko

Profile

Specialized Field

Information Security, System Safety, Unified Theory of Software

Research theme

(1) Safety and security of socio-technical systems
(2) Risk and accident analysis based on systems theory and resilience engineering
(3) Unbeatable Go Algorithm and Motion Control AI Platform
(4) Unified theory of software and automatic generation through modeling of life processes (software factory)
(5) Synchronized decision-making intelligence

research content

Current computer systems are vulnerable to cyber attacks and have fatal flaws that include latent bugs, but overcoming these flaws is essential to ensure the safety and security of socio-technical systems. Therefore, while utilizing knowledge gained from research on accident models based on systems theory (STAMP) and safety analysis methods based on resilience engineering (FRAM), we will conduct empirical research on the Unified Theory of Software (LYEE) derived from metaphysical modeling of life processes and the Scenario Function (SF), which embodies this theory in a program, as applications to AI platforms, automatic software generation technology, and decision-making intelligence.

Subjects in charge

Information Security, Information Theory, Cryptography, General Information Systems, First-Year Projects, Project Studies, Case Studies I and II, Graduation Research I and II, Seminars I and II

Specialized Field

Information Security, System Safety, Unified Theory of Software

Research theme

(1) Safety and security of socio-technical systems
(2) Risk and accident analysis based on systems theory and resilience engineering
(3) Unbeatable Go Algorithm and Motion Control AI Platform
(4) Unified theory of software and automatic generation through modeling of life processes (software factory)
(5) Synchronized decision-making intelligence

Main career, work history, and academic background

Born in Kanagawa Prefecture in 1965
1988 Graduated from Keio Faculty of Letters Department of Human Relations, Education Major
Joined NTT Corporation in 1988, and in July of the same year became NTT Data Corporation.
1992 Graduated from Distance Learning Division Faculty of Law Department of Law, Soka University
2010: Graduated from the Master's Program in Information Security at the Institute of Information Security
2014: Graduated from the Doctoral Program in Information Security at the Institute of Information Security (PhD in Information Science)
2016 Researcher, Information-Technology Promotion Agency, Japan
2020: Specially Appointed Associate Professor, National Institute of Informatics
2021 Executive R&D Specialist, NTT DATA Corporation
Retired from NTT Data Corporation in 2023
-----------------------------------------------
2023 Professor, Faculty of Science and Engineering, Soka University

Main Papers and Publications

(1) Major works

  1. Methods for Ensuring the Overall Safety of Machine Learning Systems, Handbook on Artificial Intelligence-empowered Applied Software Engineering: VOL.1: Novel Methodologies to Engineering Smart Software Systems P225-250) Springer, Tomoko Kaneko, Nobukazu Yoshioka, September 2022
  2. Machine Learning System Security Guidelines, Machine Learning System Security Guidelines Formulation Committee, Machine Learning System Security and Safety Working Group, April 2022
  3. Introduction to Safety and Security, Tomoko Kaneko, Japan Scientists and Engineers Publishing, October 2021 (ISBN: 9784817197375)
  4. CC-Case: Safety & Security Engineering Methodology for AI/IoT(1st chapter), A Closer Look at Safety and Security, Nova Science Publishers, Inc, July 2020
  5. CAST HANDBOOK, by Nancy Revson (translated by JAXA volunteers, Seiko Shirasaka, Tomoko Kaneko, and others), June 2021
  6. Information Security White Paper 2021, Information-Technology Promotion Agency, Japan, July 2021
  7. Safety & Security ~ Learning from an IT Doctor: How to Live in a Digital Society, Tomoko Kaneko, Ushio Publishing, Monthly Ushio January 2020 Issue - December 2021 Issue
  8. Smartphones are passports to the digital society, Tomoko Kaneko, Ushio Publishing, December 2019
  9. Guide to the Software Quality Body of Knowledge, Third Edition (SQuBOK V3), Union of Japanese Scientists and Engineers, December 2020
  10. Information Security White Paper 2020, Information-Technology Promotion Agency, Japan, September 2020
  11. Information Security White Paper 2019, Information-Technology Promotion Agency, Japan, August 2019
  12. STAMP Guidebook -Safety Analysis Using Systems Thinking-, Information-Technology Promotion Agency, Japan, March 2019
  13. Introduction to STAMP/STPA (Practical Edition) Information-Technology Promotion Agency, Japan, March 2018
  14. Introduction to STAMP/STPA (Application Edition) Information-Technology Promotion Agency, Japan, March 2017
  15. A guide to implementing the "Connected World Development Guidelines," Information-Technology Promotion Agency, Japan, March 2017

(2) Major journal articles and commentaries

  1. Naturally Decision Intelligence - Perfect Algorithm generated by hypothetical and synchronizing model for life system, Tomoko Kaneko Intelligent Decision Technologies – An International, Publication of special issue, OUTSTANDING WOMEN CONTRIBUTIONS IN THEORY AND APPLICATIONS OF ARTIFICIAL INTELLIGENCE, April 2023
  2. Safety and Security Techniques and Integrated Approaches in Computer Systems, Tomoko Kaneko, Journal of Reliability Engineering, Japan, Vol. 45. No. 2 (Issue 270) P68-75, March 2023
  3. Decision Intelligence: Future decision-making using data Tomoko Kaneko, Hiroyuki Abe, NTTDATA public site, October 2022
  4. Risk assessment method for IoT systems with feedback and remote maintenance, Ryoichi Sasaki, Tomoko Kaneko, Yushi Takahashi, Yasuko Fukuzawa, JSSM Journal 35(3) 3-17, January 2022
  5. CC-Case: Safety & Security Engineering Methodology Tomoko Kaneko, Nobukazu Yoshioka, the International Journal of Systems and Software Security and Protection (IJSSSP) 12(1), November 2020
  6. An Experimental Evaluation of the Effectiveness of CC-Case, an Integrated Method for Security Requirement Analysis and Assurance, Tomoko Kaneko, Yuji Takahashi, Yoshimi Teshigahara, Nobukazu Yoshioka, Shuichiro Yamamoto, Takao Okubo, Hidehiko Tanaka, Transactions of the Information Processing Society of Japan, Consumer Devices & Systems (CDS) 8(1) 11-26, January 30, 2018
  7. Security by Design and Assurance Case (Special feature: Security design and high reliability design), Tomoko Kaneko, SEC journal 12(3) 28-33, December 2016
  8. For building a safer system: Visualizing security requirements using CC-Case_i, Tomoko Kaneko, Japan Security Management Association 30(May issue) 11-22, May 2016
  9. The Common Criteria security evaluation standard is changing - Don't miss out, users and vendors!, Tomoko Kaneko, Matsutoshi Murata, Information Processing Society of Japan Digital Practice vol.6 No.1, January 2015
  10. CC-Case: An Integrated Method for Security Requirement Analysis and Assurance Using Common Criteria-Based Assurance Cases, Tomoko Kaneko, Shuichiro Yamamoto, Hidehiko Tanaka, Transactions of the Information Processing Society of Japan 55(9) 2134-2148, September 15, 2014
  11. CC-Case: An Integrated Method for Security Requirement Analysis and Assurance, Tomoko Kaneko, Thesis, Graduate School of Information Security, March 2014
  12. Proposal of Spiral Review Using Security Requirements Analysis Method Based on Actor Relationship Table (SARM), Tomoko Kaneko, Shuichiro Yamamoto, Hidehiko Tanaka, Transactions of Information Processing Society of Japan 52(9) 2775-2787, September 15, 2011

(3) Major international conference papers

  1. Proposal of Naturally Decision Intelligence as a Promoter of Safety Activities in Japan,Tomoko Kaneko,12th International Association for Advanced Space Safety(IAASS) Conference, May 2023
  2. Decision Intelligence into Synchronization, Tomoko Kaneko, the 15th International Conference on Computer and Automation Engineering (ICCAE2023), March 2023
  3. Security Resilience - Considerations from the Application of the Functional Resonance Method (FRAM) to Information Security Incidents, Tomoko Kaneko, IEEE QRS2022, Workshop on Cyber Forensics, Security, and E-discovery, December 2022
  4. Thinking from Incidents - Security Resilience, Tomoko Kaneko, FRAMily2022, November 2022
  5. Safety and Risk Analysis and Evaluation Methods for DNN Systems in Automated Driving, Tomoko Kaneko, Yuji Takahashi, Shinichi Yamaguchi, Jyunji Hashimoto, Nobukazu Yoshioka, 14th International Joint Conference on Knowledge-Based Software Engineering (JCKBSE 2022), May 2022
  6. Cyber-Security Incident Analysis by Causal Analysis using System Theory (CAST), Tomoko Kaneko, Nobukazu Yoshioka, Ryoichi Sasaki2021 IEEE 21st International Conference on Software Quality, Reliability and Security Companion (QRS-C), December 2021
  7. Cybersecurity Incident Analysis by CAST, Tomoko Kaneko, MIT 2021 STAMP Workshop, June 2021
  8. STAMP S&S: Safety & Security Scenario for Specification and Standard in the society of AI/IoT, Tomoko Kaneko, Nobukazu Yoshioka,2020 IEEE 20th International Conference on Software Quality, Reliability and Security Companion (QRS-C) p168 – 175, December 2020 month
  9. A Study on Classification and Integration of Research on both AI and Security in the IoT Era, Sasaki Ryoichi, Tomoko Kaneko, Nobukazu Yoshioka, 11th International Conference on Information Science and Applications 2020(ICISA2020), December 2020
  10. A five-layer model for analyzes of complex socio-technical systems, Tomoko Kaneko, Nobukazu Yoshioka, The 27th Conference on Pattern Languages of Programs(PLoP2020), October 2020
  11. STAMP S&S: Layered Modeling for the complex system in the society of AI/IoT, Tomoko Kaneko, Nobukazu Yoshioka, 13th International Joint Conference on Knowledge-Based Software Engineering (JCKBSE2020) 122-131, August 2020
  12. The modeling pattern of human and society for AI business, Tomoko Kaneko, Kazuki Yoshida, Nobukazu Yoshioka, Asian PLoP, March 2019
  13. Threat analysis using STRIDE with STAMP/STPA, Tomoko Kaneko, Yuji Takahashi, Takao Okubo, Ryoichi Sasaki, APSEC2018, December 2018
  14. Proposal and Application of Security/Safety Evaluation Method for Medical Device System, Hayakawa, T, Sasaki, R, Hayashi, H, Takahashi, Y, Kaneko, T, Okubo, IoT International Conference on Network, Communication, and Computing(ICNCC2018), December 2018
  15. PS-Case –A Problem Solving Method Based on a set of Evidence, Tomoko Kaneko, Satoshi Yabe, Promac2015
  16. CC-Case as an Efficient Method of Assurance Case for the Security Risk Management,Tomoko Kaneko, Shuichiro Yamamoto, Hidehiko Tanaka, Promac2014
  17. CC-Case as an Integrated Method of Security Analysis and Assurance, Tomoko Kaneko, Shuichiro Yamamoto, Hidehiko Tanaka, ICCC2014
  18. CC-Case for the System Development over Life-cycle Process, Tomoko Kaneko, Shuichiro Yamamoto, Hidehiko Tanaka, ComSec2014
  19. Efficient Use of Assurance Case against System Risk in the Project Management, Tomoko Kaneko, Shuichiro Yamamoto, Hidehiko Tanaka, ProMAC2013
  20. A Proposal on Security Case based on Common Criteria, Shuichiro Yamamoto, Tomoko Kaneko, Hidehiko Tanaka, AsiaARES2013
  21. Proposal on Countermeasure Decision Method Using Assurance Case and Common Criteria, Tomoko Kaneko, Shuichiro Yamamoto, Hidehiko Tanaka, ProMAC2012
  22. Specification of Whole Steps for the Security Requirements Analysis Method (SARM) - From Requirement Analysis to Countermeasure Decision, Tomoko Kaneko, Shuichiro Yamamoto, Hidehiko Tanaka, ProMAC2011
  23. A Spiral Review Method for Security Requirements, Tomoko Kaneko, Shuichiro Yamamoto, Hidehiko Tanaka, ProMAC2010
  24. The Institute of Electrical and Electronics Engineers (IEEE)
  • Institute of Electronics, Information and Communication Engineers (IEICE) Intelligent Software Engineering Research Committee Intelligent Software Engineering Research Committee Expert Committee
  • Information Processing Society of Japan
  • Japan Society of Security Management, IT Risk Studies Committee, Secretary