Meet Our Faculty Members

Lectures in charge

  • Software Design
  • Operating Systems
  • Introduction to Algorithms
  • Special Exercises
  • Special Lectures
  • Research Guidance

Course

System Design Course, Cyber Security and Governance Course

Profile

He received the MS degree in Engineering from Tokyo Institute of Technology in 1991. From 1991 to 2013 he worked as a researcher in Software Engineering and Software Security with Fujitsu laboratories. He received the PhD degree in Informatics from the Institute of Information Security in 2009. In 2013 he moved to the Institute of Information Security as an associate professor. He is an editor of IPSJ journal and a committee of Computer Security group of IPSJ.

Research Achievement

  1. T. Okubo, H. Kaiya and N. Yoshioka. Analyzing Impacts on Software Enhancement Caused by Security Design Alternatives with Patterns, International Journal of Secure Software Engineering, Vo.3, No.1, pp.37-61, 2012.
  2. T. Okubo, K. Taguchi and N. Yoshioka. Misuse Cases + Assets + Security Goals, Workshop on Software Security Process (SSP09), pp.424-429, 2009.
  3. T. Okubo, H. Kaiya and N. Yoshioka. Mutual Refinement of Security Requirements and Architecture using Twin Peaks Model, the 6th IEEE International Workshop on Requirements Engineering for Services (REFS 2012), 2012.
  4. T. Okubo and H. Tanaka. Web security patterns for analysis and design Conference on Pattern Languages on Programs (PLoP) '08, 2008
  5. T. Okubo and H. Tanaka. Secure Software Development through Coding Conventions and Frameworks, The International Conference on Availability, Reliability and Security (ARES) 2007, pp.1042-1051, 2007.
  6. T. Okubo and H. Tanaka. Identifying Security Aspects in Early Development Stages, ARES 2008, pp.1148-1155, 2008.
  7. T. Okubo, H. Kaiya and N. Yoshioka. Effective Security Impact Analysis with Patterns for Software Enhancement Workshop on Frontiers in Availability, Reliability and Security (FARES 2011), 2011.

Research Themes

  • Security software engineering
  • Application security
  • Mobile security
  • Security patterns