메뉴 건너뛰기




Volumn , Issue , 2008, Pages 78-88

An ontology-based framework for modelling security requirements

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER SOFTWARE REUSABILITY; FORMAL METHODS; INDUSTRIAL MANAGEMENT; INFORMATION SYSTEMS; INFORMATION THEORY; REQUIREMENTS ENGINEERING; RISK ANALYSIS; RISK ASSESSMENT; SAFETY FACTOR; SEMANTIC WEB; SEMANTICS; STANDARDIZATION; TECHNICAL PRESENTATIONS;

EID: 58049148060     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (3)

References (28)
  • 1
    • 2342563770 scopus 로고    scopus 로고
    • Smith, S.W.Spafford, E.H., Grand Challenges in Information Security: Process and Output. IEEE Security & Privacy, 2(1): (2004). p. 69-71.
    • Smith, S.W.Spafford, E.H., Grand Challenges in Information Security: Process and Output. IEEE Security & Privacy, 2(1): (2004). p. 69-71.
  • 2
    • 84970947585 scopus 로고    scopus 로고
    • Devanbu, P.Stubblebine, S., Software engineering for security: a roadmap. ACM Press. Future of Software Engineering: (2000). p. 227-239.
    • Devanbu, P.Stubblebine, S., Software engineering for security: a roadmap. ACM Press. Future of Software Engineering: (2000). p. 227-239.
  • 4
    • 34748841665 scopus 로고    scopus 로고
    • Cheng, B.Atlee, M. Research Directions in Requirements Engineering, in Future of Software Engineering 2007 (FOSE 2007) Minneapolis, Minnesota (2007).
    • Cheng, B.Atlee, M. Research Directions in Requirements Engineering, in Future of Software Engineering 2007 (FOSE 2007) Minneapolis, Minnesota (2007).
  • 5
    • 58049188769 scopus 로고    scopus 로고
    • ISO27002, ISO/IEC 17799-27002 Code of Practice for Information Security Managament. (2005).
    • ISO27002, ISO/IEC 17799-27002 Code of Practice for Information Security Managament. (2005).
  • 6
    • 0142134956 scopus 로고    scopus 로고
    • Strategies for Software Reuse: A Principal Component Analysis of Reuse Practices
    • Rothenberger, M.A., Dooley, K.J., Kulkarni, U.R., Nada, N., Strategies for Software Reuse: A Principal Component Analysis of Reuse Practices. IEEE Trans. on Soft. Eng., 29(9): (2003). p. 825-837.
    • (2003) IEEE Trans. on Soft. Eng , vol.29 , Issue.9 , pp. 825-837
    • Rothenberger, M.A.1    Dooley, K.J.2    Kulkarni, U.R.3    Nada, N.4
  • 7
  • 8
    • 2942753973 scopus 로고    scopus 로고
    • Specifying Reusable Security Requirements
    • Firesmith, D., Specifying Reusable Security Requirements. Journal of Object Technology, 3(1): (2004). p. 61-75.
    • (2004) Journal of Object Technology , vol.3 , Issue.1 , pp. 61-75
    • Firesmith, D.1
  • 10
    • 85008034351 scopus 로고    scopus 로고
    • Brewster, C.O'Hara, K., Knowledge Representation with Ontologies: The Present and Future. IEEE Intelligent Systems, 19:1: (2004). p. 72-73.
    • Brewster, C.O'Hara, K., Knowledge Representation with Ontologies: The Present and Future. IEEE Intelligent Systems, 19:1: (2004). p. 72-73.
  • 11
    • 58149365542 scopus 로고
    • Towards Principles for the Design of Ontologies used for Knowledge Sharing
    • Gruber, T., Towards Principles for the Design of Ontologies used for Knowledge Sharing. International Journal of Human-Computer Studies, 43(5/6): (1995). p. 907-928.
    • (1995) International Journal of Human-Computer Studies , vol.43 , Issue.5-6 , pp. 907-928
    • Gruber, T.1
  • 12
    • 0242456149 scopus 로고    scopus 로고
    • Ontology in Information Security: A Useful Theoretical Foundation and Methodological Tool
    • ACM Press Clouford, New Mexico, USA
    • Raskin, V., Hempelmann, C.F., Triezenberg, K.E., Nirenburg, S. Ontology in Information Security: A Useful Theoretical Foundation and Methodological Tool, in New Paradigms Security Workshop NSPW'01. ACM Press Clouford, New Mexico, USA (2001).
    • (2001) New Paradigms Security Workshop NSPW'01
    • Raskin, V.1    Hempelmann, C.F.2    Triezenberg, K.E.3    Nirenburg, S.4
  • 13
    • 58049186208 scopus 로고    scopus 로고
    • Tsoumas, B.Gritzalis, D., Towards an Ontology-based Security Management. Proceedings of the 20th International Conference on Advanced Information Networking and Applications (AINA'06). IEEE Computer Society, 1 : (2006).
    • Tsoumas, B.Gritzalis, D., Towards an Ontology-based Security Management. Proceedings of the 20th International Conference on Advanced Information Networking and Applications (AINA'06). IEEE Computer Society, 1 : (2006).
  • 14
    • 58049189771 scopus 로고    scopus 로고
    • Mouratidis, H.Giorgini, P., Integrating Security and Software Engineering: Advances and Future Visions: Idea Group Publishing (2007a).
    • Mouratidis, H.Giorgini, P., Integrating Security and Software Engineering: Advances and Future Visions: Idea Group Publishing (2007a).
  • 17
    • 58049181857 scopus 로고    scopus 로고
    • ISO15408, ISO/IEC 15408 (Common Criteria v3.0) Information Technology Security Techniques-Evaluation Criteria for IT Security .(2005).
    • ISO15408, ISO/IEC 15408 (Common Criteria v3.0) "Information Technology Security Techniques-Evaluation Criteria for IT Security ".(2005).
  • 21
    • 57549095655 scopus 로고    scopus 로고
    • Martínez, M.A., Lasheras, J., Toval, A., Piattini, M. An Audit Method of Personal Data Based on Requirements Engineering, in The 4th International Workshop on Security In Information Systems (WOSIS-2006). Paphos, Chipre (2006).
    • Martínez, M.A., Lasheras, J., Toval, A., Piattini, M. An Audit Method of Personal Data Based on Requirements Engineering, in The 4th International Workshop on Security In Information Systems (WOSIS-2006). Paphos, Chipre (2006).
  • 22
    • 1542273520 scopus 로고    scopus 로고
    • Lozano-Tello, A.Gómez-Pérez, A., ONTOMETRIC: A Method to Choose the Appropriate Ontology. Journal of Database Management. Special Issue on Ontological analysis, Evaluation, and Engineering of Business Systems Analysis Methods, 15(2): (2004).
    • Lozano-Tello, A.Gómez-Pérez, A., ONTOMETRIC: A Method to Choose the Appropriate Ontology. Journal of Database Management. Special Issue on Ontological analysis, Evaluation, and Engineering of Business Systems Analysis Methods, 15(2): (2004).
  • 23
    • 58049140385 scopus 로고    scopus 로고
    • Blanco, C., Lasheras, J., Valencia-García, R., Fernández-Media, E., Toval, A., Piattini, M. A Systematic Review and Comparison of Security Ontologies, in International Workshop on Frontiers in Availability, Reliability and Security (FARES) in conjunction with ARES. Barcelona (2007).
    • Blanco, C., Lasheras, J., Valencia-García, R., Fernández-Media, E., Toval, A., Piattini, M. A Systematic Review and Comparison of Security Ontologies, in International Workshop on Frontiers in Availability, Reliability and Security (FARES) in conjunction with ARES. Barcelona (2007).
  • 24
    • 58049140983 scopus 로고    scopus 로고
    • Dobson, G.Sawyer, P., Revisiting Ontology-Based Requirements Engineering in the age of the Semantic Web. International Seminar on Dependable Requirements Engineering of Computerised Systems at NPPs, Institute for Energy Technology (IFE), Halden: (2006).
    • Dobson, G.Sawyer, P., Revisiting Ontology-Based Requirements Engineering in the age of the Semantic Web. International Seminar on "Dependable Requirements Engineering of Computerised Systems at NPPs", Institute for Energy Technology (IFE), Halden: (2006).


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.