메뉴 건너뛰기




Volumn 1, Issue , 2006, Pages 985-990

Towards an ontology-based security management

Author keywords

Risk assessment; Security knowledge; Security management; Security ontology

Indexed keywords

COMPUTATIONAL COMPLEXITY; DATABASE SYSTEMS; INTEROPERABILITY; KNOWLEDGE BASED SYSTEMS; MANAGEMENT INFORMATION SYSTEMS;

EID: 33751088049     PISSN: 1550445X     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/AINA.2006.329     Document Type: Conference Paper
Times cited : (107)

References (38)
  • 3
  • 9
    • 0011795457 scopus 로고    scopus 로고
    • A collaborative approach to ontology design
    • Holsapple C., Joshi K., "A collaborative approach to ontology design", Com. of the ACM, 45(2):42-47, 2002.
    • (2002) Com. of the ACM , vol.45 , Issue.2 , pp. 42-47
    • Holsapple, C.1    Joshi, K.2
  • 12
    • 33751114731 scopus 로고    scopus 로고
    • Sep.
    • Protégé Ontology Development Environment, available at http://protege.stanford.edu/ (Sep. 2005)
    • (2005)
  • 13
    • 33751084922 scopus 로고    scopus 로고
    • Sep.
    • Protégé OWL Plugin, available at http://protege.stanford. edu/pluging/owl/ (Sep. 2005)
    • (2005)
  • 15
    • 62349137903 scopus 로고    scopus 로고
    • BSI, Germany (Mar.)
    • BSI, IT Baseline Protection Manual, Germany available at www.bsi.bund.de/ (Mar. 2005).
    • (2005) IT Baseline Protection Manual
  • 16
    • 33751101931 scopus 로고    scopus 로고
    • Mar.
    • Cisco Security Advisories, available at www.cisco.com/go/psirt/ (Mar. 2005).
    • (2005)
  • 17
    • 33751081596 scopus 로고    scopus 로고
    • Mar.
    • SecurityFocus security portal, available at www.securityfocus.com (Mar. 2005).
    • (2005)
  • 18
    • 33751082725 scopus 로고    scopus 로고
    • Mar.
    • Org Security Mailing List Archive, available at www.seclists.org (Mar. 2005).
    • (2005)
  • 19
    • 33751083638 scopus 로고    scopus 로고
    • Mar.
    • Common Vulnerabilities and Exposures, available at www.cve.mitre.org/ (Mar. 2005).
    • (2005)
  • 20
    • 33751094643 scopus 로고    scopus 로고
    • Mar.
    • Nmap scanner, available at wwvv.insecure.org/nmap (Mar. 2005).
    • (2005) Nmap Scanner
  • 23
    • 84944048132 scopus 로고    scopus 로고
    • The ponder policy specification language
    • Workshop on Policies for Distributed Systems and Networks
    • Damianou N., et al., "The Ponder Policy Specification Language". In Workshop on Policies for Distributed Systems and Networks, Springer-Verlag (LNCS 1995), 2001, pp. 18-39.
    • (2001) Springer-Verlag (LNCS) , vol.1995 , pp. 18-39
    • Damianou, N.1
  • 25
    • 4544385439 scopus 로고    scopus 로고
    • Ponder policy implementation and validation in a CIM and differentiated services framework
    • Seoul
    • Lymberopoulos L., Lupu E., Sloman M., "Ponder Policy Implementation and Validation in a CIM and Differentiated Services Framework". NOMS 2004, Seoul, 2004.
    • (2004) NOMS 2004
    • Lymberopoulos, L.1    Lupu, E.2    Sloman, M.3
  • 28
    • 33646148762 scopus 로고    scopus 로고
    • Toward a security ontology
    • May
    • Donner M., "Toward a Security Ontology", In IEEE Security and Privacy, Vol. 1, No. 3, pp. 6-7, May 2003.
    • (2003) IEEE Security and Privacy , vol.1 , Issue.3 , pp. 6-7
    • Donner, M.1
  • 34
    • 0242456149 scopus 로고    scopus 로고
    • Ontology in information security: A useful theoretical foundation and methodological tool
    • V. Raskin, et al. (Eds.), ACM, USA
    • Raskin V., et al., "Ontology in Information Security: A Useful Theoretical Foundation and Methodological Tool". In V. Raskin, et al. (Eds.), Proc. of the New Security Paradigms Workshop, ACM, USA, 2001.
    • (2001) Proc. of the New Security Paradigms Workshop
    • Raskin, V.1
  • 37
    • 13244276903 scopus 로고    scopus 로고
    • Semantic web technologies to reconcile privacy and context awareness
    • Gandon F., Sadeh N., "Semantic web technologies to reconcile privacy and context awareness". Web Semantics Journal, 1(3), 2004.
    • (2004) Web Semantics Journal , vol.1 , Issue.3
    • Gandon, F.1    Sadeh, N.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.