메뉴 건너뛰기




Volumn 3685 LNCS, Issue , 2005, Pages 151-164

An ontology-based approach to information systems security management

Author keywords

IS Security; Security Management; Security Ontology; Security Policy

Indexed keywords

CONTROL SYSTEMS; IDENTIFICATION (CONTROL SYSTEMS); KNOWLEDGE BASED SYSTEMS; SECURITY OF DATA; STANDARDS;

EID: 33646150432     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11560326_12     Document Type: Conference Paper
Times cited : (21)

References (44)
  • 1
    • 33646156001 scopus 로고    scopus 로고
    • Wireless network security: 802.11
    • NIST Special Publication no. 800-48, US Dept. of Commerce, USA
    • Karygiannis T., Owens L., Wireless Network Security: 802.11, Bluetooth and Handheld Devices, NIST Special Publication no. 800-48, US Dept. of Commerce, USA 2002.
    • (2002) Bluetooth and Handheld Devices
    • Karygiannis, T.1    Owens, L.2
  • 2
    • 33646123579 scopus 로고    scopus 로고
    • EU-1ST-2001-37763, Deliverable D4, May
    • PAMPAS ("Pioneering Advanced Mobile Privacy and Security") Project, EU-1ST-2001-37763, Final Roadmap, Deliverable D4, www.pampas.eu.org/, May 2003.
    • (2003) Final Roadmap
  • 3
    • 33646164935 scopus 로고    scopus 로고
    • Feb.
    • DMTF CIM Policy Model v. 2.81, available at http://www.dmtf.org/ standards/published_documents.php (Feb. 2005).
    • (2005) DMTF CIM Policy Model V. 2.81
  • 4
    • 33646156227 scopus 로고    scopus 로고
    • Representing security policies in web information systems, policy management for the web - WWW2005 workshop
    • May Chiba, Japan
    • Clemente F., Perez G., Blaya J., Skarmeta A., Representing Security Policies in Web Information Systems, Policy Management for the Web - WWW2005 Workshop, 14th International World Wide Web Conference, May 2005, Chiba, Japan.
    • (2005) 14th International World Wide Web Conference
    • Clemente, F.1    Perez, G.2    Blaya, J.3    Skarmeta, A.4
  • 5
  • 6
    • 0002734441 scopus 로고    scopus 로고
    • Ontobroker: Ontology based access to distributed and semi-structured information
    • R. Meersman et al. (Eds.), Kluwer Academic Publishers
    • Decker S., et al., "Ontobroker: Ontology based access to distributed and semi-structured information". In R. Meersman et al. (Eds.), DS-8: Semantic Issues in Multimedia Systems. Kluwer Academic Publishers, 1999.
    • (1999) DS-8: Semantic Issues in Multimedia Systems
    • Decker, S.1
  • 7
    • 84944048132 scopus 로고    scopus 로고
    • The ponder policy specification language
    • Workshop on Policies for Distributed Systems and Networks
    • Damianou N. et al., "The Ponder Policy Specification Language". In Workshop on Policies for Distributed Systems and Networks, Springer-Verlag LNCS 1995, 2001, pp. 18-39.
    • (2001) Springer-Verlag LNCS , vol.1995 , pp. 18-39
    • Damianou, N.1
  • 10
    • 62349137903 scopus 로고    scopus 로고
    • Germany (Mar.)
    • BSI, IT Baseline Protection Manual, Germany available at http://www.bsi.bund.de/english/index.htm (Mar. 2005).
    • (2005) IT Baseline Protection Manual
  • 13
    • 33646128300 scopus 로고    scopus 로고
    • Mar.
    • Seclists. Org Security Mailing List Archive (http://seclists.org (Mar. 2005).
    • (2005)
  • 17
    • 8344253615 scopus 로고    scopus 로고
    • Evolving GATE to meet new challenges in language engineering
    • to appear
    • Bontcheva K., et al., Evolving GATE to Meet New Challenges in Language Engineering. Natural Language Engineering (to appear).
    • Natural Language Engineering
    • Bontcheva, K.1
  • 19
    • 0242517622 scopus 로고    scopus 로고
    • Ontology development 101: A guide to creating your first ontology
    • and Stanford Medical Informatics Technical Report SMI-2001-0880, March
    • Noy N., McGuiness D., "Ontology Development 101: A Guide to Creating Your First Ontology", Stanford Knowledge Systems Laboratory Technical Report KSL-01-05 and Stanford Medical Informatics Technical Report SMI-2001-0880, March 2001.
    • (2001) Stanford Knowledge Systems Laboratory Technical Report , vol.KSL-01-05
    • Noy, N.1    McGuiness, D.2
  • 20
    • 0011795457 scopus 로고    scopus 로고
    • A collaborative approach to ontology design
    • Holsapple C., Joshi K., "A collaborative approach to ontology design", Com. of the ACM, 45(2):42-47, 2002.
    • (2002) Com. of the ACM , vol.45 , Issue.2 , pp. 42-47
    • Holsapple, C.1    Joshi, K.2
  • 24
    • 33751094643 scopus 로고    scopus 로고
    • Mar.
    • Nmap scanner, available at http://www.insecure.org/nmap (Mar. 2005).
    • (2005) Nmap Scanner
  • 28
    • 4544385439 scopus 로고    scopus 로고
    • Ponder policy implementation and validation in a CIM and differentiated services framework
    • Seoul, April
    • L. Lymberopoulos, E. C. Lupu, M. S. Sloman "Ponder Policy Implementation and Validation in a CIM and Differentiated Services Framework". Presented at NOMS 2004, Seoul, April 2004.
    • (2004) NOMS 2004
    • Lymberopoulos, L.1    Lupu, E.C.2    Sloman, M.S.3
  • 33
    • 33646148762 scopus 로고    scopus 로고
    • Toward a security ontology
    • May
    • Donner M., "Toward a Security Ontology", In IEEE Security and Privacy, Vol. 1, No. 3, pp. 6-7, May 2003.
    • (2003) IEEE Security and Privacy , vol.1 , Issue.3 , pp. 6-7
    • Donner, M.1
  • 39
    • 0242456149 scopus 로고    scopus 로고
    • Ontology in information security: A useful theoretical foundation and methodological tool
    • V. Raskin, et al. (Eds.), ACM, USA
    • Raskin V., et al., "Ontology in Information Security: A Useful Theoretical Foundation and Methodological Tool". In V. Raskin, et al. (Eds.), Proc. of the New Security Paradigms Workshop, ACM, USA, 2001.
    • (2001) Proc. of the New Security Paradigms Workshop
    • Raskin, V.1
  • 42
    • 13244276903 scopus 로고    scopus 로고
    • Semantic web technologies to reconcile privacy and context awareness
    • Gandon F. L., Sadeh M. N., "Semantic web technologies to reconcile privacy and context awareness". Web Semantics Journal, 1 (3), 2004.
    • (2004) Web Semantics Journal , vol.1 , Issue.3
    • Gandon, F.L.1    Sadeh, M.N.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.