메뉴 건너뛰기




Volumn , Issue , 2009, Pages 580-587

Security ontology proposal for mobile applications

Author keywords

[No Author keywords available]

Indexed keywords

KNOWLEDGE BASE; MOBILE APPLICATIONS; QUALITY CONSTRAINTS; SECURITY REQUIREMENTS; SEMANTIC LANGUAGE;

EID: 70349504818     PISSN: 15516245     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/MDM.2009.100     Document Type: Conference Paper
Times cited : (12)

References (33)
  • 1
    • 84888502214 scopus 로고    scopus 로고
    • The GSM Association
    • The GSM Association, http://www.gsm.org.
  • 2
    • 84888538458 scopus 로고    scopus 로고
    • The GSM Association, Market Research
    • The GSM Association, Market Research, 2007, http://gsmworld.com/our-work/ programmesandinitiatives/mobile-money/market-research.htm.
    • (2007)
  • 4
    • 84888500059 scopus 로고    scopus 로고
    • D. Fox and J. Box, Building solutions with the Microsoft .NET Compact Framework, Addison-Wesley Professional, 2003.
    • D. Fox and J. Box, Building solutions with the Microsoft .NET Compact Framework, Addison-Wesley Professional, 2003.
  • 6
    • 84888504068 scopus 로고    scopus 로고
    • The WAP forum
    • The WAP forum, http://www.wapforum.org.
  • 7
    • 84888510214 scopus 로고    scopus 로고
    • ™ 1.0 The Extensible HyperText Markup Language. http://www.w3.org/TR/xhtml1. S. M. Schafer, HTML, XHTML, and CSS Bible, Wiley, 2008, pp. 223-330.
    • ™ 1.0 The Extensible HyperText Markup Language. http://www.w3.org/TR/xhtml1. S. M. Schafer, HTML, XHTML, and CSS Bible, Wiley, 2008, pp. 223-330.
  • 8
    • 84888524624 scopus 로고    scopus 로고
    • World Wide Web Consortium, http://www.w3c.org
  • 9
    • 25144484800 scopus 로고    scopus 로고
    • 3rd edition, Prentice Hall
    • A. Tanenbaum, Réseaux, 3rd edition, Prentice Hall, 1997, pp. 271-273.
    • (1997) Réseaux , pp. 271-273
    • Tanenbaum, A.1
  • 10
    • 52049121858 scopus 로고    scopus 로고
    • S. Beji, N. El Kadhi, An Overview of Mobile Applications Architecture and the Associated Technologies, icwmc,pp.77-83, 2008 The Fourth International Conference on Wireless and Mobile Communications, 2008.
    • S. Beji, N. El Kadhi, "An Overview of Mobile Applications Architecture and the Associated Technologies", icwmc,pp.77-83, 2008 The Fourth International Conference on Wireless and Mobile Communications, 2008.
  • 16
    • 33947123970 scopus 로고    scopus 로고
    • D. Geneiatakis, T. Dagiuklas1, C. Lambrinoudakis, G.Kambourakis and S. Gritzalis, Novel Protecting Mechanism for SIP-Based Infrastructure against Malformed Message Attacks: Performance Evaluation Study, Computer Networks: The International Journal of Computer and Telecommunications Networking, 51 , July 2007, pp. 2580-2593.
    • D. Geneiatakis, T. Dagiuklas1, C. Lambrinoudakis, G.Kambourakis and S. Gritzalis, "Novel Protecting Mechanism for SIP-Based Infrastructure against Malformed Message Attacks: Performance Evaluation Study", Computer Networks: The International Journal of Computer and Telecommunications Networking, Volume 51 , July 2007, pp. 2580-2593.
  • 19
    • 70349551543 scopus 로고    scopus 로고
    • Cross Site Scripting and phishing
    • Avril
    • T. Seyrat, "Cross Site Scripting and phishing", JIP Tunisia, Avril 2005.
    • (2005) JIP Tunisia
    • Seyrat, T.1
  • 21
    • 0035267850 scopus 로고    scopus 로고
    • Agents and the Semantic Web
    • Hendler J., "Agents and the Semantic Web", IEEE Intelligent Systems, Vol 16 No 2, pp 30-37.
    • IEEE Intelligent Systems , vol.16 , Issue.2 , pp. 30-37
    • Hendler, J.1
  • 23
    • 33646699357 scopus 로고    scopus 로고
    • Security Ontology for Annotating Resources
    • Springer-Verlag Berlin Heidelberg
    • A. Kim, J. Luo, and Myong Kang, "Security Ontology for Annotating Resources", LNCS 3761, pp. 1483 - 1499. Springer-Verlag Berlin Heidelberg 2005.
    • (2005) LNCS , vol.3761 , pp. 1483-1499
    • Kim, A.1    Luo, J.2    Kang, M.3
  • 26
    • 0026883734 scopus 로고
    • Representing and using nonfunctional requirements: A process-oriented approach
    • J. Mylopoulos, L. Chung, and B. A. Nixon. "Representing and using nonfunctional requirements: A process-oriented approach" IEEE Transactions on Software Engineering, 18, 1992, pp.483-497.
    • (1992) IEEE Transactions on Software Engineering , vol.18 , pp. 483-497
    • Mylopoulos, J.1    Chung, L.2    Nixon, B.A.3
  • 27
    • 84888498893 scopus 로고    scopus 로고
    • Specification of the Resource Description Framework RDF
    • Specification of the Resource Description Framework (RDF), http://www.w3.org/RDF.
  • 28
    • 84888496911 scopus 로고    scopus 로고
    • OWL Web Ontology Language Guide, http://www.w3.org/TR/2004/REC-owl-guide- 20040210. S. Lauesen, H. Younessi, Six Styles for Usability Requirements, Proceedings of REFSQ'98, Presses Universitaires de Namur, 1988.
    • OWL Web Ontology Language Guide, http://www.w3.org/TR/2004/REC-owl-guide- 20040210. S. Lauesen, H. Younessi, "Six Styles for Usability Requirements", Proceedings of REFSQ'98, Presses Universitaires de Namur, 1988.
  • 29
    • 84888556452 scopus 로고    scopus 로고
    • Connolly D., Harmelen .F, Horrocks I., McGuinness D.,Patel-Schneider, P. A. Stein, 'DAML+OIL Reference Description, W3C Note'.
    • Connolly D., Harmelen .F, Horrocks I., McGuinness D.,Patel-Schneider, P. A. Stein, 'DAML+OIL Reference Description, W3C Note'.
  • 30
    • 84888525949 scopus 로고    scopus 로고
    • The OWL protege web
    • The OWL protege web page, http://protege.stanford.edu/overview/protege- owl.html.
  • 32
    • 0003767375 scopus 로고
    • Information Processing Systems-Open System Interconnection-Basic Reference Model - Part 2: Security Architecture,
    • ISO 7498-2
    • ISO 7498-2: Information Processing Systems-Open System Interconnection-Basic Reference Model - Part 2: Security Architecture, 1989.
    • (1989)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.