-
2
-
-
70350181116
-
Semiformal framework for ICT security development
-
Rome, 25-27 September
-
Bialas A.: Semiformal framework for ICT security development, The 8th International Common Criteria Conference, Rome, 25-27 September 2007. http://www.8iccc.com/index.php
-
(2007)
The 8th International Common Criteria Conference
-
-
Bialas, A.1
-
3
-
-
36049040298
-
Semiformal approach to the IT security development
-
DepCoS-RELCOMEX IEEE Computer Society, Los Alamitos, Washington, Tokyo, ISBN 0-7695-2850-3.
-
Bialas A.: Semiformal Approach to the IT Security Development In: Zamojski W., Mazurkiewicz J., Sugier J., Walkowiak T.: Proc. of the Int. Conf. on Dependability of Comp. Sys. DepCoS-RELCOMEX 2007, IEEE Computer Society, Los Alamitos, Washington, Tokyo, ISBN 0-7695-2850-3. pp. 3-11.
-
(2007)
Zamojski W., Mazurkiewicz J., Sugier J., Walkowiak T.: Proc. of the Int. Conf. on Dependability of Comp. Sys.
, pp. 3-11
-
-
Bialas, A.1
-
4
-
-
70350143738
-
Semiformal common criteria compliant IT security development framework
-
Number 2B(77), Silesian Univ. of Technology Press, Gliwice
-
Bialas A.: Semiformal Common Criteria Compliant IT Security Development Framework, Studia Informatica vol. 29, Number 2B(77), Silesian Univ. of Technology Press, Gliwice 2008. http://www.znsi.aei.polsl.pl/
-
(2008)
Studia Informatica
, vol.29
-
-
Bialas, A.1
-
5
-
-
62749100602
-
Ontology-based approach to the common criteria compliant IT security development
-
Las Vegas, July
-
Bialas A.: Ontology-based Approach to the Common Criteria Compliant IT Security Development, In: Proceedings of the 2008 Int. Conf. on Security and Management - SAM'08, Las Vegas, July 2008, pp. 586-592.
-
(2008)
Proceedings of the 2008 Int. Conf. on Security and Management - SAM'08
, pp. 586-592
-
-
Bialas, A.1
-
6
-
-
36249017853
-
Ontological mapping of common criteria's security assurance requirements
-
Venter et al (eds.), Boston: Springer
-
Ekelhart A., Fenz, S., Goluch, G., and Weippl, E.: Ontological Mapping of Common Criteria's Security Assurance Requirements, 2007 IFIP, Volume 232, New Approaches for Security, Privacy and Trust in Complex Environments, Venter et al (eds.), Boston: Springer 2007, pp. 85-95.
-
(2007)
2007 IFIP, Volume 232, New Approaches for Security, Privacy and Trust in Complex Environments
, pp. 85-95
-
-
Ekelhart, A.1
Fenz, S.2
Goluch, G.3
Weippl, E.4
-
7
-
-
70449641302
-
Common criteria ontology
-
Common Criteria ontology, Secure Business. http://research. securityresearch.at/research/focus/common-criteria-security-assurance/
-
Secure Business
-
-
-
8
-
-
77953740851
-
Common criteria requirements modeling and its uses for quality of information assurance (QoIA)
-
(ACMSE'05), March 18-20, Kennesaw State Univ. Kennesaw, Georgia.
-
Yavagal D.S., Lee S.W., Ahn G-J., Gandhi R.A.: Common Criteria Requirements Modeling and its Uses for Quality of Information Assurance (QoIA), In: Proc. of the 43rd Annual ACM Southeast Conference (ACMSE'05), Vol. 2, pp. 130-135, March 18-20, Kennesaw State Univ. Kennesaw, Georgia. 2005.
-
(2005)
Proc. of the 43rd Annual ACM Southeast Conference
, vol.2
, pp. 130-135
-
-
Yavagal, D.S.1
Lee, S.W.2
Ahn, G.-J.3
Gandhi, R.A.4
-
9
-
-
84869138544
-
An ontological approach applied to information security and trust, 18th australasian conf
-
Toowoomba
-
Vorobiev A., Bekmamedova N.: An Ontological Approach Applied to Information Security and Trust, 18th Australasian Conf. on Inform. Syst., Toowoomba, 2007. http://www.acis2007.usq.edu.au/assets/papers/144.pdf
-
(2007)
Inform. Syst.
-
-
Vorobiev, A.1
Bekmamedova, N.2
-
11
-
-
70449633331
-
OWL security ontologies in OWL
-
OWL Security ontologies in OWL, Computer Science Laboratory. http://www.csl.sri.com/users/denker/owl-sec/ontologies/
-
Computer Science Laboratory
-
-
-
12
-
-
70449678821
-
DAML services
-
DAML Services - Security and privacy. http://www.daml.org/services/owl-s/ security.html
-
Security and Privacy
-
-
-
13
-
-
84870743708
-
-
web site Linköping University.
-
A. Herzog's web site "Security Ontology", Linköping University. http://www.ida.liu.se/~iislab/projects/secont/
-
Security Ontology
-
-
Herzog's, A.1
-
14
-
-
77957279658
-
-
ver. 2.0, University of Maryland.
-
REI Ontology Specifications, ver. 2.0, University of Maryland. http://www.cs.umbc.edu/~lkagal1/rei/
-
REI Ontology Specifications
-
-
-
15
-
-
50049109224
-
Information security fortification by ontological mapping of the ISO/IEC 27001 standard
-
Ekelhart A., Fenz S., Goluch, G., Riedel B., et al.: Information Security Fortification by Ontological Mapping of the ISO/IEC 27001 Standard, Proc. of the 13th Pacific Rim Int. Symp. on Dependable Computing, IEEE Computer Society, 2007, pp. 381-388. http://publik.tuwien.ac.at/files/pub-inf-4689.pdf
-
(2007)
Proc. of the 13th Pacific Rim Int. Symp. on Dependable Computing, IEEE Computer Society
, pp. 381-388
-
-
Ekelhart, A.1
Fenz, S.2
Goluch, G.3
Riedel, B.4
-
16
-
-
70449657986
-
Using ontologies to assist security management
-
Martimiano L.A.F, Moreira EdS.
-
Martimiano L.A.F, Moreira EdS.: Using ontologies to assist security management, 8th Intl. Protégé Conf., 2005. http://www.ppgia.pucpr. br/~maziero/pesquisa/ceseg/sbseg06/conteudo/artigos/resumos/19513.pdf
-
(2005)
8th Intl. Protégé Conf.
-
-
-
17
-
-
39749101462
-
Security ontologies: Improving quantitative risk analysis
-
Big Island, IEEE Computer Soc. Press
-
Ekelhart A., Fenz S., Klemen M., Weippl E.: Security Ontologies: Improving Quantitative Risk Analysis, Proc. of the 40th Hawaii Int. Conf. on System Sciences, Big Island, IEEE Computer Soc. Press, 2007.
-
(2007)
Proc. of the 40th Hawaii Int. Conf. on System Sciences
-
-
Ekelhart, A.1
Fenz, S.2
Klemen, M.3
Weippl, E.4
-
18
-
-
33646150432
-
An ontology-Based approach to information systems security management
-
Springer Berlin/ Heidelberg
-
Tsoumas B., Dritsas S., Gritzalis D.: An Ontology-Based Approach to Information Systems Security Management, LNCS, Volume 3685/2005, Springer Berlin/ Heidelberg 2005, pp. 151-164.
-
(2005)
LNCS, Volume 3685/2005
, pp. 151-164
-
-
Tsoumas, B.1
Dritsas, S.2
Gritzalis, D.3
-
19
-
-
70449643348
-
An OWL-based security incident ontology
-
Martimiano L.A.F, Moreira EdS. Madrid
-
Martimiano L.A.F, Moreira EdS.: An OWL-based Security Incident Ontology, 8th Intl. Protégé Conf. Madrid, 2005. http://protege.stanford.edu/ conference/2005/submissions/posters/poster-martimiano.pdf
-
(2005)
8th Intl. Protégé Conf.
-
-
|