Echizen Laboratory, National Institute of Informatics
2-1-2, Hitotsubashi,
Chiyoda-ku, Tokyo, 101-8430, JAPAN


August 6, 2017
An improved version of PrivacyVisor is now being crowdfunded by Sabae city, eyeglass capital in Japan.
Ref. Small Japanese city crowdfunding privacy eyewear, Nikkei Asian Review, August 6, 2017

January 16, 2017
News video titled "'Peace' signs risk fingerprint theft, says Japanese study" is released from Reuters.

January 16, 2017
Presentation slides for BiometricJammer disclosed
Due to many requests, we will disclose translated version of the presentation slides shown in the domestic symposium, Computer Security Symposium 2016,

BiometricJammer: Method to Prevent Unauthorized Capturing of Fingerprint in Consideration of User-friendliness

December 12, 2016
Prof. Echizen is elected as a member of Information Forensics and Security Technical Committee (IFS TC)

IEEE SPS Information Forensics and Security

October 20, 2016
National Institute of Informatics, Digital Content and Media Sciences Research Division
Echizen Laboratory, Postdoctoral Fellow

  1. Job title
    Postdoctoral fellow
    * Based on performance, successful applicants may be named Assistant Professor by Special Appointment.
  2. Number of positions
  3. Work location
    National Institute of Informatics
    (Gakujutsu Sougou Center, Hitotsubashi 2-1-2, Chiyoda-ku, Tokyo)
    Directions: 3-5 minutes walk from exit A9 of the Jimbocho subway station on the Toei Shinjuku Line, or from exit 1b of the Takebashi subway station on the Tozai Line (refer to the map at
  4. Affiliation
    Echizen Laboratory, Digital Content and Media Sciences Research Division, National Institute of Informatics (NII)
  5. Work description
    Echizen and Yamagishi Laboratories of the National Institute of Informatics have taken a leading role in tackling research issues relating to JSPS Grant-in-Aid for Scientific Research (S) project Communication System for Defending against Attacks of Media Clones. This project involves a number of research areas including media processing, pattern recognition, machine learning, computer vision, biometrics, and privacy enhancing technologies. For an overview of this project, take a look at this site: http://www2c.comm.eng.osaka-u.ac.jp/proj/mc/eindex.html
  6. Reference sites
    JSPS Grant-in-Aid for Scientific Research (S) Communication System for Defending against Attacks of Media Clones: http://www2c.comm.eng.osaka-u.ac.jp/proj/mc/eindex.html
    Echizen Laboratory, National Institute of Informatics: http://research.nii.ac.jp/~iechizen/official/index-e.html
    Yamagishi Laboratory, National Institute of Informatics: http://www.nii.ac.jp/en/faculty/digital_content/yamagishi_junichi/
  7. Qualifications
    Applicants should hold or expect to hold a doctoral degree or equivalent academic credential by the appointment date. Note that preference will be shown to applicants with experience and knowledge of more than one of the areas listed in Item 5 above.
  8. Period of employment
    April 1, 2017 to March 31, 2018
    * The job starting date is negotiable
    * The starting date may be updated based on assessment of work, current status of work, budgetary consideration, etc. However, under no circumstances will the job go beyond March 31, 2018. The contract may be renewed on a yearly basis.
  9. Workdays
    Five days a week, Monday through Friday
    * Days off: Saturdays, Sundays, public holidays, and year-end and New Year's holidays (December 29 - January 3).
    * Summer vacation: Any two consecutive days between August 12 and 18, excluding Saturdays and Sundays.
  10. Working hours
    Seven hours and 45 minutes per day under a discretionary work system.
  11. Vacation
    Conferred in accordance with regulations:
    Annual paid leave
    Vacation other than annual paid leave
  12. Salary
    Paid in accordance with regulations:
    Basic wage: from ¥300,000 to ¥400,000 per month (calculated based on experience)
    Commuting allowance: Amount paid to cover actual commuting costs
    Payday: At month-end closing, generally on the 17th of the next month
  13. Social insurance
    Employment and workers' compensation insurance covered by the Ministry of Education, Culture, Sports, Science and Technology Mutual Aid Association in accordance with laws and regulations.
  14. Documentation
    Mail the following documents to Echizen Laboratory, and write on the envelop "Application for postdoc fellowship position at Echizen Laboratory" in red ink: Curriculum vitae (including academic records, degrees, awards and prizes, return address, and photograph), a list of publications (divided clearly into refereed journal papers and others), copies of three relevant papers, a brief summary of research and related contributions (up to one A4 page in length), and the name and address of one personal reference who can speak on behalf of the applicant.
  15. Selection procedure
    After reviewing application documents, interviews will be arranged with applicants where required. All travel and accommodation expenses incurred in connection with the selection process shall be borne by the applicants.
  16. Notification of application results
    Applicants will be promptly notified of the results of the selection process.
  17. Application deadline
    Application must be received by Monday, February 20, 2017 (screening can be conducted at any time, and the selection process will be terminated when successful applicants have been chosen).
  18. Inquires and address to send applications
    Digital Content and Media Sciences Research Division National Institute of Informatics Hitotsubashi 2-1-2, Chiyoda-ku Tokyo 101-8430
    Contact: Isao Echizen
    Tel: 03-4212-2516
    E-mail: iechizen (at) nii.ac.jp (replace (at) with @ when sending email).
  19. Other
    Please send all inquiries by e-mail to the address shown in Item 17 above. Please include "Echizen Laboratory postdoctoral fellow application" in the subject line.

  20. * Application document will be used solely for the purpose of assessing applicants. At the conclusion of the selection process, all application documents will be destroyed (and cannot be returned) except for those of the successful applicants, which will be used to provide personnel, employment, and salary details.

September 14, 2016
Professor Isao Echizen is awarded as "Best paper award" at the 15th IFIP Conference on e-Business, e-Services and e-Society (IFIP I3E2016)

Authors : Eina Hashimoto, Masatsugu Ichino, Tetsuji Kuboyama, Isao Echizen, Hiroshi Yoshiura
Title : Breaking Anonymity of Social Network Accounts by Using Coordinated and Extensible Classifiers based on Machine Learning, e-Services and e-Society, LNCS 9844, pp.455-470, Swansea, UK, Sep, 2016.  
IFIP I3E2016

August 9, 2016
Talk by Professor Guenter Mueller, University of Freiburg
We are pleased to announce you that Professor Guenter Mueller, University of Freiburg will give a talk at NII.
You are most welcome to come and join us.

* Date: 14h00-15h00PM, Tuesday, August 9th
* Venue: Rooms #2004, 20th floor, National Institute of Informatics
* Title: Heuristic Approaches to Horizontal Security for Industry 4.0
* Speaker: Professor Guenter Mueller, University of Freiburg

There is no security in IoT (Internet of things) especially not in Industry 4.0, unless the concept of security is modified in two directions: 

    1. If access control no longer only includes user identities and if authentication not only examines PII (Personal Identity Information) but demands proof according to rules, then security is possible.
    2. If authorization not only means that a given user identity is included in the access control list but a proven functionality, then security is possible.

 This talk presents new set of heuristic approaches to security since finding an optimal solution seems impossible or impractical, while heuristic detection methods can be used to speed up the process of finding a satisfactory solution for security in IoT.  For this purpose Petri-Nets of the are used for the proof for rules and functionality. In this talk it is assumed that  Industry 4.0 processes are logged and analyzed according to security relevant criteria; e.g. obstruction, behavioral deviation, resource and time or Performance Clustering.  Deviation from expected behavior is considered a hint for potential security issues, but it is not a proof of security violations.

***Bio of Professor Guenter Mueller***

July 6, 2016
Talk by Prof. Weippl, Vienna University of Technology

We are pleased to announce you that Professor Edgar Weippl, Vienna University of Technology, will give a talk at NII.
You are most welcome to come and join us.

* Date: 14h00-15h00PM, Wednesday, July 6th
* Venue: Rooms #1902, 19th floor, National Institute of Informatics
* Title: Empirical Research in Information Security
* Speaker: Professor Edgar Weippl, Vienna University of Technology, Austria

Empirical research in information security is becoming increasingly important as many large scale cloud systems and complex decentralized networked systems are used today by millions of people. Often, the systems’
characteristics cannot be observed directly, either because the operators of centralized services do not provide this information (e.g. Facebook, Amazon) or because the decentralized nature does not allow doing so (e.g. crypto protocols used on servers, Tor). In addition, software development becomes more complex as software is developed in large, globally distributed teams so that one has to operate under the assumption that within any large team there are people trying to incorporate malicious code into the code base. Up to date there is little work that provides any empirical evidence on how widespread such problems are and whether there are effective means (and
which) to mitigate this risk.

Research methodology in information security is evolving and many of the earlier well-known empirical research findings are hard to reproduce for two main reasons: First, the original data is not or no longer available or may have been altered. Second, research ethics have changed and some experiments are no longer an acceptable practice.

In this presentation I will (1) highlight the impact of our past research in the field, (2) show how promising theoretical concepts can be explored and applied to important empirical problems, and (3) explore future research paths in the field.

***Bio of Professor Edgar Weippl***
After working at a research startup for two years, Edgar spent one year teaching Algorithms, AI and Database Systems as an Assistant Professor at Beloit College, WI. From 2002 to 2004, while with the software vendor ISIS Papyrus, he worked as a consultant in New York, NY and Albany, NY, and in Frankfurt, Germany. In 2004 he joined the TU Wien and founded the research center SBA Research together with A Min Tjoa and Markus Klemen, where he has been working full time as Research Director since 2006.

Edgar R. Weippl is member of the editorial board of Elsevier’s Computers & Security (COSE), organizes the ARES conference and was General Chair of SACMAT 2015, PC Chair of Esorics 2015 and is General Chair of ACM CCS 2016.
He is member of many PCs including ACM CCS and Esorics. In 2015 he received the ACM SIGSAC Service Award.

May 27, 2016
PrivacyVisor was released by Nissey Corp.

Article (Japan Times)
   Press release by Nissey Corp. (in Japanese)

March 25, 2016
Shimon Machida (Ph.D. candidate) won the NII Best Student Award.


December 1, 2015
PrivacyVisor has been selected on permanent exhibition of German Museum of Technology

PrivacyVisor has been selected and shown on permanent exhibition (The Network) of German Museum of Technology (Deutsches Technikmuseum) since September 2015.
  German Museum of Technology
  [Permanent exhibition] The Network: People, Cables, Data Streams


September 8, 2015
Talk by Professor Guenter Mueller, University of Freiburg

We are pleased to announce you that Professor Guenter Mueller, University of Freiburg will give a talk at NII. You are most welcome to come and join us.

* Date: 14h00-15h00PM, Tuesday, September 8th
* Venue: Rooms #1903, 19th floor, National Institute of Informatics
* Title: BitCoin - Better than Money?
* Speaker: Professor Guenter Mueller, University of Freiburg

The presently dominating money system has huge transaction costs. These are the profits of the financial organizations and the speculation in exchange rates and prices. The term financial industry implicates an independence from the real economy. Bubbles show that this is an illusion. Bubbles happen when too much money is available, and thus money must be destroyed. CryptoCurrencies can theoretically solve this, and BitCoin is the most advanced cryptosystem. It is not the first, but the most accepted CryptoCurrency. Decentralization by eliminating banks resulted in reduction of transaction cost. Control of money is done by cryptographic algorithms and under the observation of the whole net community in the block chain. This idealistic picture has recently experienced severe damages. Several criminal cases, like the theft at Mt Gox or the money laundering in Silkroad, but also the limited privacy as well as the in transparent decision making of anonymous centralized bodies to solve doublespending and volatility of exchange rates has caused comments that CryptoCurrency at its present state of development supports rather criminals than normal users.
***Bio of Professor Guenter Mueller***

May 23, 2014
  Talk by Dr. Ioannis Krontiris, Goethe University Frankfurt, Germany

We are pleased to announce you that Dr. Ioannis Krontiris, Goethe University Frankfurt, Germany will give a talk at NII. You are most welcome to come and join us.

* Date: 14h00-15h00PM, Monday, June 9th
* Venue: Room 1901, 19th floor, National Institute of Informatics


* Speaker: Dr. Ioannis Krontiris, Goethe University Frankfurt, Germany
* Title: "Privacy Attribute-Based Credentials in practice - concepts and trials"

* Abstract:
When using the Internet people leave various digital tracks that are being used for profiling and identification. Although privacy-enhancing technologies (PETs) can help online users to protect their privacy effectively, not many of them have found their way into the everyday life.
Most frequently stated reasons for the poor adoption are the difficulties for non-specialists to grasp the purpose of the technologies and the necessity of privacy protection, and also poor usability of the tools.
Privacy Attribute-Based Credentials (Privacy-ABCs) is a specific PET that allows users to minimally disclose certified information when authenticating with online service providers. The EU-project ABC4Trust tests for the first time this technology with large-scale user trials and brings it closer to practical adoption. In this presentation we will discuss the possibilities that Privacy-ABCs have to offer for privacy protection and then focus on the experiences from the project and especially from the trials, discussing how the users interacted with the technology.

*Bio of Dr. Ioannis Krontiris:
Dr. Ioannis Krontiris is a senior researcher in the Deutsche Telekom Chair of Mobile Business & Multilateral Security at Goethe University Frankfurt, Germany. Dr. Krontiris holds a Ph.D. in Computer Science from Mannheim University, Germany and a M.Sc. in Information Networking from Carnegie Mellon University, USA. His research focuses on identity management, online privacy, and privacy in mobile applications. He is technical coordinator of ABC4Trust, an EU-project that investigates common architectures for privacy respecting attribute based credential systems and their deployment in practice. He is also the chair of the IFIP WG11.2 on Pervasive Systems Security.

Talk by Professor Guenter Mueller, University of Freiburg

We are pleased to announce you that Professor Guenter Mueller, University of Freiburg will give a talk at NII. You are most welcome to come and join us.

* Date: 14h00-15h00PM, Thursday, March 13th
* Venue: Room 2004, 20th floor, National Institute of Informatics
* Title: "Is Privacy an inferior property in Smart Grids?"
* Speaker: Professor Guenter Mueller, University of Freiburg

Smart Meters allow the remote collection of fine-grained readings to support energy management. It is expected that energy consumption will be reduced and a load management for renewable energy is possible. In the US, but especially in Germany and in the European Union Directive 2009/72/EC promotes the deployment of smart grids. It states that, where initial pilots are positive, 80% of consumers shall be equipped with smart meters by year 2020. Experiences in the United States and Holland have shown that such an efficiency oriented legislation leaves consumers without choice but to accept the associated privacy threats. The success of the infrastructure remains limited. Till to date, policy tools, e.g. data protection laws or voluntary regulation, represent the only employed protective measures against privacy invasions by outsiders or insiders of the energy industry. The talk discusses the European and German approaches and will show in so called feedback loops that pseudonyms have deficits. In the European project IUrban, the author is responsible for privacy mechanisms to be studied in experimental smart grids of the city of Rijeka in Croatia and Plowdiv in Bulgaria. The objective is to reach both privacy and efficiency in energy management.

***Bio of Professor Guenter Mueller***
2011 The Technical University of Darmstadt has honored Prof. Müller with an honorary doctoral degree (Dr. rer. nat. h.c.) in order to recognize his achievements in the field of computer science, especially research in databases, internet, and IT security. Also, the award honors his participation in establishing IT security as its own discipline of research both in Germany and internationally. His contributions to establishment of scientific channels between Japan and Germany was especially honored. 2010 On March 5, Prof. Müller has received the "Ehrenkreuz erster Klasse", a decoration with medal, for services rendered to science and arts. The Austrian consul general, representing the Federal President of Austria, has awarded this distinction to Professor Müller in Munich. A major reason for this award are Professor Müller's contributions to the area of open computer networks. 2009 Upon the recommendation of Prof. Müller, the Austrian President has visited NII in September 2009, especially Prof. Sonehara’s field of activity. 2008 Established MOU between NII and University of Freiburg on behalf of the University of Freiburg, Germany 2006 Chair of International Conference on Emerging Trends in Information and Communication Security (ETRICS) From 1999 to 2006 he represented German Research Foundation with regard to security (research priority program "Security in information and communication technology“). Before, he did the same on more industrialized fashion for Daimler-Benz Foundation. The results are ISO standards for protection goals. 1990 Call of the University of Freiburg as Full Professor and Founder Director of new Institute for Computer Science and Society, University of Freiburg, Germany 1987 Director of IBM and demonstration of first heterogeneous Network at Telecom 87, with OSI, where X-400 (e-mail has been defined) 1985 Founder of European center for computer network research of IBM Heidelberg, Germany 1983 Venia Docendi for Applied Computer Science (University of Vienna, Austria) 1978 IBM Germany GmbH 1977/78 IBM/USA, research lab San José, California, USA ("Postdoc") 1976 PhD for applied computer sciences at University of Duisburg, Germany

February 06, 2014
  NII Lecture Series by Prof. Edgar Weippl, Vienna University of Technology  

We are pleased to announce you that Professor Edgar Weippl, Vienna University of Technology,
 Austria will be giving four lectures at NII.
*Title: Recent Trends in Cyber Security
  Lecture 1: Cloud Security and Mobile Application Security (Feb 18 14:00-15:30)
  Lecture 2: Social Engineering (Feb 19 10:30-12:00)
  Lecture 3: Privacy (Feb 20 10:00-11:30)
  Lecture 4: Malware Analysis, Software Obfuscation and the Ethics of Large Scale Malware
        Evaluation (Feb 21 10:30-12:00)
*Location: Lecture room 2005, 20th floor, National Institute of Informatics
*Fee: Free
*Registration: Not required
*Details of the lectures: http://www.nii.ac.jp/en/event/list/0218

You are most welcome to come and join us.

December 3, 2013
  Talk by Dr. Klaus Rechert, University of Freiburg

We are pleased to announce you that Dr. Klaus Rechert, University of Freiburg will give a talk at NII. You are most welcome to come and join us.

* Date: 13h30-14h30PM, Monday, December 16th
* Venue: Room 1901, 19th floor, National Institute of Informatics
* Title: "Securing access to complex electronic business processes and research data: requirements, challenges and lessons learned"
* Speaker: Dr. Klaus Rechert, University of Freiburg

* Abstract:
The information age has changed the economic landscape and research environments thoroughly. Nearly every piece of valuable scientific or business information is created, transferred and stored digitally.
Moreover, the information is not necessarily bound to single, easy identifiable digital objects but can be embedded in complex (business) processes, which may include multiple interconnected machines. In terms of digital objects and environments even ten years are a huge timespan when trying to keep them accessible and usable as they are threatened by constantly changing technologies and the associated risk of hardware and software obsolescence. Reconstructing and re-enacting these processes and associated digital objects, e.g. due to regulation or legislative requirements, a legal dispute or an audit, may be required at some point. Then, both authenticity of reproduction and associated costs will matter.

*Bio of Dr. Klaus Rechert:
Klaus Rechert is currently the project coordinator of state-wide initiative on research data management and long-term accessibility of research data. His research focus is on privacy protection in complex data and digital forensics.

From 2006-2009 Klaus was a lecturer at the University of Freiburg. In
2010 Klaus was a guest lecturer at Malta College of Art, Science & Technology. From Oct. 2010 - Mar. 2011 he was a visiting researcher at the National Institute of Informatics (NII) in Tokyo, Japan.

Since 2013 Klaus holds doctoral degree from the University of Freiburg.
In 2006 Klaus received the EXIST-Seed scholarship sponsored by the Federal Ministry of Economics and Technology. Klaus studied Computer Science and Economics at the University of Freiburg and received a Diploma in Computer Science in 2005.

July 12, 2013
  Talk by Dr. Volkmar Lotz, SAP Product Security Research

We are pleased to announce you that Dr. Volkmar Lotz, SAP Product Security Research will give a talk at NII. You are most welcome to come and join us.

* Date: 16h30-17h30PM, Friday, August 9th
* Venue: Rooms 2005, 20th floor, National Institute of Informatics
* Title: Securing Applications over the Cloud – A Research Perspective
* Speaker: Dr. Volkmar Lotz, SAP Product Security Research   
* Abstract:
Trust issues still constitute a major barrier for businesses to enter the cloud. The risk of losing control over sensitive data and applications is frequently considered as more significant than the economic advantages offered by the cloud. SLAs only provide a partial remedy, since they increase transparency of the requirements and obligations, but do not by themselves enforce the rules and restrictions – in case of violations a cloud customer needs to resort to contractual law, if such violations can be detected at all. Technology research has therefore been focusing on providing enforcement mechanisms that overcome the trust barrier: trust assumptions – in particular those on benign behavior of cloud providers, cloud-based applications and their users – are replaced by IT architectures and mechanisms that technically enforce the desired security properties in an explicitly defined application scenario and trust context.
In this talk, we present three research directions and recent results, each of which addresses a different scenario and security context. While all of them are suited to reduce the level of trust that needs to be put on entities in the cloud, they differ with respect to the threat model covered, the cloud players addressed, the degree of enforcement that can be achieved and the strength of the remaining trust assumptions.
Ideally, enforcement mechanisms can provide security guarantees and, hence, fully replace trust assumptions in the respective scenario, given that they are correctly implemented. Two of the presented research directions provide such ideal solutions while still being efficient:

  1. Queries on encrypted databases allow outsourcing databases to the cloud while protecting them against disclosure to the cloud provider and its administrators without the need to retrieve the data for processing. Data are encrypted and queries are transformed in a way that they can be directly executed on the encrypted data, the results then being decrypted at the client. To support different types of queries at maximum possible level of security, different encryption schemes with specific properties (random, deterministic, order-preserving, homomorphic etc.) are deployed. Layering of the schemes ensures that a weaker algorithm is only used if it is needed to execute the query. We present a prototype implementation of this concept for SAP HANA, including optimizations balancing security and performance.
  2. Multi-party secure computing addresses scenarios, where joint computations involving several entities are to be performed over a cloud platform, where neither the cloud provider nor the participating entities can be trusted, and no trusted third party can be relied on. Examples of such computations include benchmarking and collaborative Supply Chain Management, where computation results are to be shared among the entities but the input parameters need to be kept secret. The challenge is to find cryptographic schemes that are both secure and efficient and scale to a large problem class. We present concepts and research prototypes that implement such schemes for the abovementioned application scenarios.

The third research direction presented is Usage Control. Usage Control is an extension of access control where access to data is granted only with respect to certain obligations which restrict the behavior of the data processor. Such obligations include notification upon specific events, deletion after a specified period, data retention, or context restrictions. Obligations can be expressed through declarative policies attached to the data (“sticky policies”) which are enforced through specific policy decision and enforcement points which intercept the data access and monitor events. This solution does not replace trust, but focuses the possible degree of enforcement dependent on the applicable trust model. For instance, if the cloud provider can be trusted and data access occurs through the cloud platform’s persistency layer, obligations can be enforced through a policy aware database connector. If in addition the application can be trusted (but not its users), the scope of enforcement can be extended to the application’s local store. We present application prototypes for both scenarios and show the additional effort for policy evaluation can be minimized using in-memory databases for the policy store.
All of the presented research areas contribute to overcome trust issues in the cloud, focusing on specific trust assumptions and application scenarios. With mature solutions emerging, the cloud can unfold its full potential while respecting the protection needs of sensitive businesses.

*Bio of Dr. Volkmar Lotz:
Volkmar Lotz has more than 20 years experience in industrial research on Security and Software Engineering. He is heading SAP’s Product Security Research, a group of 35+ researchers investigating into applied research and innovative security solutions for modern software platforms, networked enterprises and Future Internet applications, covering the whole development and product life cycle. The group defines and executes SAP's security research agenda in alignment with SAP's business strategy and global research trends.
Volkmar’s current research interests include Service Security, Data-centric Security, Security Engineering, Formal Methods and Compliance. Volkmar has published numerous scientific papers in his area of interest and is regularly serving on Programme Committees of internationally renowned conferences. He has been supervising various European projects, including large-scale integrated projects. Volkmar holds a diploma in Computer Science from the University of Kaiserslautern.

July 2, 2013
 `Privacy visor` has been covered in BBC News.

BBC News, How to get away from everyday technology July 1, 2013

June 21, 2013
 `Privacy visor` has been covered in TIME and NBC news.

TIME, Leery of Facial Recognition? These Glasses Might Help June 20, 2013

NBC News, LED-powered 'privacy visor' thwarts facial recognition June 20, 2013

March 18, 2013
  Lecture by Prof. Alexander Pretschner, Technische Universitaet Muenchen

We are pleased to announce you that Professor Alexander Pretschner, Technische Universitaet Muenchen will give a lecture at NII.
You are most welcome to come and join us.

*Date: 10h30-12h00AM, Monday, April 8th
*Venue: Rooms 2009 and 2010, 20th floor, National Institute of Informatics
*Title: Distributed Data Usage Control
*Speaker: Prof. Dr. Alexander Pretschner, Technische Universitaet Muenchen

Distributed data usage control is about what happens to data once it  is given away ("delete after 30 days;" "notify me if data is  forwarded;" "copy at most twice"). In the past, we have considered the  problem in terms of policies, enforcement and guarantees from two
perspectives: (a) In order to protect data, it is necessary to  distinguish between content (a song by Elvis called "Love me
Tender") and representations of that content (song.mp3; song.wav, etc.).
This requires data flow-tracking concepts and capabilities in data usage control frameworks. (b) These representations exist at different  layers of
a picture downloaded from the internet exists as pixmap (window  manager), as element in the browser-created DOM tree (application),  and as cache file (operating system). This requires the data flow  tracking capabilities to transcend the single layers to which they are  deployed. In distributed systems, it has turned out that another  system can be seen as another set of abstraction layers, thus  generalizing the basic model. Demo videos of this work available at http://www22.in.tum.de/forschung/distributed-usage-control/.

 In this talk, we present recent work on extending our approach to not  only protecting entire data items but possibly also fractions of data  items.
This allows us to specify and enforce policies such as "not  more than 20% of the data may leave the system", evidently leading to  interesting questions concerning the interpretation of "20%", and if  the structure of data items cannot be exploited. We present a  respective model, an implementation, and first experimental results.

Bio of Prof. Dr. Alexander Pretschner:
Alexander Pretschner is a full professor of computer science at Technische Universitaet Muenchen. Prior appointments include a full professorship at Karlsruhe Institute of Technology; an adjunct associate professorship at TU Kaiserslautern; a group management position at the Fraunhofer Institute for Experimental Software Engineering in Kaiserslautern; guest professorships at the universities of Rennes, Trento, and Innsbruck; and a senior researcher's position at ETH Zurich. PhD degree from Technische Universitaet Muenchen; Master's degrees from Kansas University, on a Fulbright scholarship, and from RWTH Aachen.  Research interests include software engineering, specifically testing; and information security, specifically distributed data usage control. Recent awards include an IBM faculty award, a Google research award, and a Google focused research award. Member of the editorial board of the IEEE Transactions on Secure and Dependable Computing, the Journal of Software Testing, Verification, and Reliability, and the Journal of Software Systems Modeling; membership in ca. 90 program committees; organization of ca. 25 symposia; frequent invited speaker; frequent reviewer for national and international funding agencies.


February 15, 2013
  NII Lecture Series by Prof. Edgar Weippl, Vienna University of Technology  

We are pleased to announce you that Professor Edgar Weippl, Vienna University of Technology,
 Austria will be giving four lectures at NII.
 *Title: Recent Trends in Cyber Security
  Lecture 1: Cloud Security and Mobile Application Security (Monday, Feb.25, 2013, 10:30-12:00)
  Lecture 2: Digital Forensics 2.0(Tuesday, Feb.26, 2013, 14:00-15:30)
  Lecture 3: Privacy (Wednesday, Feb.27, 2013, 10:30-12:00)
  Lecture 4: Malware Analysis, Software Obfuscation and the Ethics of Large Scale Malware
        Evaluation (Wednesday, Feb.27, 2013, 14:00-15:30)
 *Location: Lecture room 2001, 20th floor, National Institute of Informatics
 *Fee: Free
 *Registration: Not required
 *Details of the lectures: http://www.nii.ac.jp/en/event/list/0225

 You are most welcome to come and join us.

January 23, 2013
 `Privacy visor` has been covered in BBC News.

BBC News(UK), Privacy visor blocks facial recognition software January 22, 2013

December 12, 2012

NII Press Release, Privacy Protection Techniques Using Differences in Human and Device Sensitivity -Protecting Photographed Subjects against Invasion of Privacy Caused by Unintentional Capture in Camera Images-

November 9, 2012

Assoc. Prof. Isao Echizen has been awarded as the Best Poster Award in International Workshop on Security (IWSEC) 2012.

"Privacy Visor: wearable device for privacy protection based on differences in sensory perception between humans and devices" Takayuki YAMADA, Seiichi GOHSHI, Isao ECHIZEN

September 26, 2012

Takayuki Yamada won the NII Best Student Award.

May 8, 2012

Talk by Dr. Michael Salmony   

Title: Banking and Payments in Europe

Speaker: Dr. Michael Salmony
Instigator and Chairman at EISB - Equens Innovation Sounding Board,Adviser Expert Group eInvoicing at European Commission,and Executive Adviser, BoD Strategy at Equens SE

Abstract: I would explore what is unique about the payments business of banking and show that this is undergoing radical change in Europe. Based upon this structural change we have set up a company that processes payments and which has now become the market leader in Europe - and will aim to show why this has been such a success. However basic payments are shown to be only the first step in modern banking business. Innovations around payments are now developing with great speed - more from non-banks like Google, Paypal, Amazon - and it is shown how the banking industry can react to this. Indeed an active counter-strategy of developing innovations using a structured systematic approach is shown. This is a step to what may be considered a contradiction in terms: industrial production of innovations. Some examples of the process to develop this are shown and some examples of concrete innovations which will address the challenges of the future.