메뉴 건너뛰기




Volumn , Issue , 2008, Pages 813-820

A systematic review and comparison of security ontologies

Author keywords

[No Author keywords available]

Indexed keywords

INFORMATION SERVICES; TECHNOLOGY;

EID: 49049087973     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ARES.2008.33     Document Type: Conference Paper
Times cited : (107)

References (38)
  • 1
    • 58149365542 scopus 로고
    • Towards Principles for the Design of Ontologies used for Knowledge Sharing
    • Gruber, T., Towards Principles for the Design of Ontologies used for Knowledge Sharing. International Journal of Human-Computer Studies, 1995. 43(5/6): p. 907-928.
    • (1995) International Journal of Human-Computer Studies , vol.43 , Issue.5-6 , pp. 907-928
    • Gruber, T.1
  • 2
    • 49049106851 scopus 로고    scopus 로고
    • Dobson, G. and P. Sawyer, Revisiting Ontology-Based Requirements Engineering in the age of the Semantic Web. International Seminar on Dependable Requirements Engineering of Computerised Systems at NPPs, Institute for Energy Technology (IFE), Halden, 2006.
    • Dobson, G. and P. Sawyer, Revisiting Ontology-Based Requirements Engineering in the age of the Semantic Web. International Seminar on "Dependable Requirements Engineering of Computerised Systems at NPPs", Institute for Energy Technology (IFE), Halden, 2006.
  • 4
    • 0002971942 scopus 로고    scopus 로고
    • Ontology Applications and Design
    • Gruninger, M. and J. Lee, Ontology Applications and Design. Communications of the ACM, 2002. 45(2): p. 39-41.
    • (2002) Communications of the ACM , vol.45 , Issue.2 , pp. 39-41
    • Gruninger, M.1    Lee, J.2
  • 9
    • 0002698747 scopus 로고    scopus 로고
    • Information system security management in the new millennium
    • Dhillon, G. and J. Backhouse, Information system security management in the new millennium. Communications of the ACM, 2000. 43(7): p. 125-128.
    • (2000) Communications of the ACM , vol.43 , Issue.7 , pp. 125-128
    • Dhillon, G.1    Backhouse, J.2
  • 11
    • 33751088049 scopus 로고    scopus 로고
    • Tsoumas, B. and D. Gritzalis, Towards an Ontology-based Security Management. Proceedings of the 20th International Conference on Advanced Information Networking and Applications. IEEE Computer Society, 2006. 1 (AINA'06) - 01 AINA '06.
    • Tsoumas, B. and D. Gritzalis, Towards an Ontology-based Security Management. Proceedings of the 20th International Conference on Advanced Information Networking and Applications. IEEE Computer Society, 2006. Volume 1 (AINA'06) - Volume 01 AINA '06.
  • 12
    • 49049105374 scopus 로고    scopus 로고
    • Kitchenham, B., Procedures for performing systematic reviews (Joint Technical Report), in TR/SE-0401. 2004, Software Engineering Group. Department of Computer Science: Keele University. p. 33 p.
    • Kitchenham, B., Procedures for performing systematic reviews (Joint Technical Report), in TR/SE-0401. 2004, Software Engineering Group. Department of Computer Science: Keele University. p. 33 p.
  • 13
    • 42149158539 scopus 로고    scopus 로고
    • Systems Engineering and Computer Science Department, UFRJ: Río de Janeiro, Brazil
    • Biolchini, J. and P. Gomes, Systematic Review in Software Engineering. 2005, Systems Engineering and Computer Science Department, UFRJ: Río de Janeiro, Brazil.
    • (2005) Systematic Review in Software Engineering
    • Biolchini, J.1    Gomes, P.2
  • 18
    • 49049116215 scopus 로고    scopus 로고
    • An ontology description for SIP security flaws
    • Corrected Proof, In Press
    • Geneiatakis, D. and C. Lambrinoudakis, An ontology description for SIP security flaws. Computer Communications, 2006. In Press, Corrected Proof.
    • (2006) Computer Communications
    • Geneiatakis, D.1    Lambrinoudakis, C.2
  • 20
    • 49249114417 scopus 로고    scopus 로고
    • Modeling conversation policies using permissions and obligations
    • AAMAS workshop on Agent communication, Springer-Verlag
    • Kagal, L. and T. Finin, Modeling conversation policies using permissions and obligations. AAMAS workshop on Agent communication, LNCS. Springer-Verlag, 2005.
    • (2005) LNCS
    • Kagal, L.1    Finin, T.2
  • 23
    • 49049115424 scopus 로고    scopus 로고
    • Visual modeling and formal specification of constraints of RBAC using semantic web technology
    • Corrected Proof, In Press
    • Kwon, J. and C.-J. Moon, Visual modeling and formal specification of constraints of RBAC using semantic web technology. Knowledge-Based Systems, 2006. In Press, Corrected Proof.
    • (2006) Knowledge-Based Systems
    • Kwon, J.1    Moon, C.-J.2
  • 25
    • 33646503483 scopus 로고    scopus 로고
    • Towards an ontology-based approach for specifying and securing Web services
    • Maamar, Z., N.C. Narendra, and S. Sattanathan, Towards an ontology-based approach for specifying and securing Web services. Information and Software Technology, 2006. 48(7): p. 441-455.
    • (2006) Information and Software Technology , vol.48 , Issue.7 , pp. 441-455
    • Maamar, Z.1    Narendra, N.C.2    Sattanathan, S.3
  • 26
    • 17744389776 scopus 로고    scopus 로고
    • A service-centric model for intrusion detection in next-generation networks
    • McGibney, J., N. Schmidt, and A. Patel, A service-centric model for intrusion detection in next-generation networks. Computer Standards & Interfaces, 2005. 27(5): p. 513-520.
    • (2005) Computer Standards & Interfaces , vol.27 , Issue.5 , pp. 513-520
    • McGibney, J.1    Schmidt, N.2    Patel, A.3
  • 30
    • 10044293324 scopus 로고    scopus 로고
    • Security standards for the semantic web
    • Thuraisingham, B., Security standards for the semantic web. Computer Standards & Interfaces, 2005. 27(3): p. 257-268.
    • (2005) Computer Standards & Interfaces , vol.27 , Issue.3 , pp. 257-268
    • Thuraisingham, B.1
  • 32
    • 49049100141 scopus 로고    scopus 로고
    • DOD, Orange Book. Estándar DOD 5200.58-STD., in www.radium.ncsc.mil/tpep/library/rainbow/5200.28-STD.html, D.d.d.d.l. EEUU, Editor. 1970.
    • DOD, Orange Book. Estándar DOD 5200.58-STD., in www.radium.ncsc.mil/tpep/library/rainbow/5200.28-STD.html, D.d.d.d.l. EEUU, Editor. 1970.
  • 36
    • 49049097377 scopus 로고    scopus 로고
    • Zhou, J., E. Niemela, and P. Savolainen, An Integrated QoS-Aware Service Development and Management Framework. wicsa, 2007: p. 13.
    • Zhou, J., E. Niemela, and P. Savolainen, An Integrated QoS-Aware Service Development and Management Framework. wicsa, 2007: p. 13.
  • 38
    • 1542273520 scopus 로고    scopus 로고
    • A Method to Choose the Appropriate Ontology
    • ONTOMETRIC
    • Lozano-Tello, A. and A. Gómez-Pérez, ONTOMETRIC: A Method to Choose the Appropriate Ontology. Journal of Database Management. Special Issue on Ontological analysis, Evaluation, and Engineering of Business Systems Analysis Methods, 2004. 15(2).
    • (2004) Journal of Database Management , vol.15 , Issue.2
    • Lozano-Tello, A.1    Gómez-Pérez, A.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.