메뉴 건너뛰기




Volumn , Issue , 2009, Pages 3-10

Ontology-based security problem definition and solution for the common criteria compliant development process

Author keywords

[No Author keywords available]

Indexed keywords

COMMON CRITERIA; DEVELOPMENT PROCESS; ISO/IEC 15408; IT SECURITY; KNOWLEDGE BASE; ONTOLOGY-BASED; SECURITY OBJECTIVES; SECURITY POLICY; SECURITY PROBLEMS;

EID: 70449650807     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/DepCoS-RELCOMEX.2009.15     Document Type: Conference Paper
Times cited : (13)

References (21)
  • 2
    • 70350181116 scopus 로고    scopus 로고
    • Semiformal framework for ICT security development
    • Rome, 25-27 September
    • Bialas A.: Semiformal framework for ICT security development, The 8th International Common Criteria Conference, Rome, 25-27 September 2007. http://www.8iccc.com/index.php
    • (2007) The 8th International Common Criteria Conference
    • Bialas, A.1
  • 4
    • 70350143738 scopus 로고    scopus 로고
    • Semiformal common criteria compliant IT security development framework
    • Number 2B(77), Silesian Univ. of Technology Press, Gliwice
    • Bialas A.: Semiformal Common Criteria Compliant IT Security Development Framework, Studia Informatica vol. 29, Number 2B(77), Silesian Univ. of Technology Press, Gliwice 2008. http://www.znsi.aei.polsl.pl/
    • (2008) Studia Informatica , vol.29
    • Bialas, A.1
  • 5
    • 62749100602 scopus 로고    scopus 로고
    • Ontology-based approach to the common criteria compliant IT security development
    • Las Vegas, July
    • Bialas A.: Ontology-based Approach to the Common Criteria Compliant IT Security Development, In: Proceedings of the 2008 Int. Conf. on Security and Management - SAM'08, Las Vegas, July 2008, pp. 586-592.
    • (2008) Proceedings of the 2008 Int. Conf. on Security and Management - SAM'08 , pp. 586-592
    • Bialas, A.1
  • 7
    • 70449641302 scopus 로고    scopus 로고
    • Common criteria ontology
    • Common Criteria ontology, Secure Business. http://research. securityresearch.at/research/focus/common-criteria-security-assurance/
    • Secure Business
  • 8
    • 77953740851 scopus 로고    scopus 로고
    • Common criteria requirements modeling and its uses for quality of information assurance (QoIA)
    • (ACMSE'05), March 18-20, Kennesaw State Univ. Kennesaw, Georgia.
    • Yavagal D.S., Lee S.W., Ahn G-J., Gandhi R.A.: Common Criteria Requirements Modeling and its Uses for Quality of Information Assurance (QoIA), In: Proc. of the 43rd Annual ACM Southeast Conference (ACMSE'05), Vol. 2, pp. 130-135, March 18-20, Kennesaw State Univ. Kennesaw, Georgia. 2005.
    • (2005) Proc. of the 43rd Annual ACM Southeast Conference , vol.2 , pp. 130-135
    • Yavagal, D.S.1    Lee, S.W.2    Ahn, G.-J.3    Gandhi, R.A.4
  • 9
    • 84869138544 scopus 로고    scopus 로고
    • An ontological approach applied to information security and trust, 18th australasian conf
    • Toowoomba
    • Vorobiev A., Bekmamedova N.: An Ontological Approach Applied to Information Security and Trust, 18th Australasian Conf. on Inform. Syst., Toowoomba, 2007. http://www.acis2007.usq.edu.au/assets/papers/144.pdf
    • (2007) Inform. Syst.
    • Vorobiev, A.1    Bekmamedova, N.2
  • 11
    • 70449633331 scopus 로고    scopus 로고
    • OWL security ontologies in OWL
    • OWL Security ontologies in OWL, Computer Science Laboratory. http://www.csl.sri.com/users/denker/owl-sec/ontologies/
    • Computer Science Laboratory
  • 12
    • 70449678821 scopus 로고    scopus 로고
    • DAML services
    • DAML Services - Security and privacy. http://www.daml.org/services/owl-s/ security.html
    • Security and Privacy
  • 13
    • 84870743708 scopus 로고    scopus 로고
    • web site Linköping University.
    • A. Herzog's web site "Security Ontology", Linköping University. http://www.ida.liu.se/~iislab/projects/secont/
    • Security Ontology
    • Herzog's, A.1
  • 14
    • 77957279658 scopus 로고    scopus 로고
    • ver. 2.0, University of Maryland.
    • REI Ontology Specifications, ver. 2.0, University of Maryland. http://www.cs.umbc.edu/~lkagal1/rei/
    • REI Ontology Specifications
  • 16
    • 70449657986 scopus 로고    scopus 로고
    • Using ontologies to assist security management
    • Martimiano L.A.F, Moreira EdS.
    • Martimiano L.A.F, Moreira EdS.: Using ontologies to assist security management, 8th Intl. Protégé Conf., 2005. http://www.ppgia.pucpr. br/~maziero/pesquisa/ceseg/sbseg06/conteudo/artigos/resumos/19513.pdf
    • (2005) 8th Intl. Protégé Conf.
  • 18
    • 33646150432 scopus 로고    scopus 로고
    • An ontology-Based approach to information systems security management
    • Springer Berlin/ Heidelberg
    • Tsoumas B., Dritsas S., Gritzalis D.: An Ontology-Based Approach to Information Systems Security Management, LNCS, Volume 3685/2005, Springer Berlin/ Heidelberg 2005, pp. 151-164.
    • (2005) LNCS, Volume 3685/2005 , pp. 151-164
    • Tsoumas, B.1    Dritsas, S.2    Gritzalis, D.3
  • 19
    • 70449643348 scopus 로고    scopus 로고
    • An OWL-based security incident ontology
    • Martimiano L.A.F, Moreira EdS. Madrid
    • Martimiano L.A.F, Moreira EdS.: An OWL-based Security Incident Ontology, 8th Intl. Protégé Conf. Madrid, 2005. http://protege.stanford.edu/ conference/2005/submissions/posters/poster-martimiano.pdf
    • (2005) 8th Intl. Protégé Conf.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.