메뉴 건너뛰기




Volumn , Issue , 2009, Pages 183-194

Formalizing information security knowledge

Author keywords

Information security; Risk management; Security ontology

Indexed keywords

FORMAL KNOWLEDGE; INFORMATION SECURITY; KNOWLEDGE MODEL; ONTOLOGICAL STRUCTURES;

EID: 74049147592     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1533057.1533084     Document Type: Conference Paper
Times cited : (218)

References (42)
  • 2
    • 9744248703 scopus 로고    scopus 로고
    • Review: Knowledge management and knowledge management systems: Conceptual foundations and research issues
    • M. Alavi and D. E. Leidner. Review: Knowledge management and knowledge management systems: Conceptual foundations and research issues. MIS Quarterly, 25 (1):107-136, 2001.
    • (2001) MIS Quarterly , vol.25 , Issue.1 , pp. 107-136
    • Alavi, M.1    Leidner, D.E.2
  • 6
    • 0027804413 scopus 로고
    • Information systems security design methods: Implications for information systems development
    • December
    • R. Baskerville. Information systems security design methods: Implications for information systems development. ACM Computing Surveys, 25 (4):375-414, December 1993.
    • (1993) ACM Computing Surveys , vol.25 , Issue.4 , pp. 375-414
    • Baskerville, R.1
  • 8
    • 3042782049 scopus 로고    scopus 로고
    • What is computer security?
    • M. Bishop. What is computer security? IEEE Security and Privacy, 1 (1):67-69, 2003.
    • (2003) IEEE Security and Privacy , vol.1 , Issue.1 , pp. 67-69
    • Bishop, M.1
  • 13
    • 77952350223 scopus 로고    scopus 로고
    • DCSSI. EBIOS - Section 2 - Approach. February
    • DCSSI. EBIOS - Section 2 - Approach. February 2004.
    • (2004)
  • 15
    • 51449103458 scopus 로고    scopus 로고
    • Risk management: Implementation principles and inventories for risk management/risk assessment methods and tools
    • ENISA, European Network and Information Security Agency, June
    • ENISA. Risk management: implementation principles and inventories for risk management/risk assessment methods and tools. Technical report, European Network and Information Security Agency, June 2006.
    • (2006) Technical Report
  • 16
    • 58149365542 scopus 로고
    • Toward principles for the design of ontologies used for knowledge sharing
    • T. Gruber. Toward principles for the design of ontologies used for knowledge sharing. International Journal of Humam-Computer Studies, 43 (5-6):907-928, 1995.
    • (1995) International Journal of Humam-Computer Studies , vol.43 , Issue.5-6 , pp. 907-928
    • Gruber, T.1
  • 19
    • 77952368501 scopus 로고    scopus 로고
    • ISO/IEC. ISO/IEC 27001:2005, Information technology - Security techniques - Information security management systems - Requirements
    • ISO/IEC. ISO/IEC 27001:2005, Information technology - Security techniques - Information security management systems - Requirements, 2005.
    • (2005)
  • 23
    • 34547320186 scopus 로고    scopus 로고
    • A knowledge architecture for it security
    • S. Kesh and P. Ratnasingam. A knowledge architecture for it security. Communications of the ACM, 50 (7):103-108, 2007.
    • (2007) Communications of the ACM , vol.50 , Issue.7 , pp. 103-108
    • Kesh, S.1    Ratnasingam, P.2
  • 24
    • 33646699357 scopus 로고    scopus 로고
    • Security ontology for annotating resources
    • A. Kim, J. Luo, and M. Kang. Security ontology for annotating resources. In OTM Conferences (2), pages 1483-1499, 2005.
    • (2005) OTM Conferences (2) , pp. 1483-1499
    • Kim, A.1    Luo, J.2    Kang, M.3
  • 25
    • 0001859044 scopus 로고
    • A technique for the measurement of attitudes
    • R. Likert. A technique for the measurement of attitudes. Archives of Psychology, 140:1-55, 1932.
    • (1932) Archives of Psychology , vol.140 , pp. 1-55
    • Likert, R.1
  • 28
    • 0038562418 scopus 로고
    • An introduction to computer security - The nist handbook
    • NIST, NIST National Institute of Standards and Technology, October, Special Publication
    • NIST. An Introduction to Computer Security - The NIST Handbook. Technical report, NIST (National Institute of Standards and Technology), October 1995. Special Publication 800-12.
    • (1995) Technical Report , pp. 800-812
  • 30
    • 67249108223 scopus 로고    scopus 로고
    • Auerbach Publications, Boca Raton, Florida, ISBN: 0-8493-0880-1
    • T. Peltier. Information Security Risk Analysis. Auerbach Publications, Boca Raton, Florida, 2001. ISBN: 0-8493-0880-1.
    • (2001) Information Security Risk Analysis
    • Peltier, T.1
  • 31
    • 33645766952 scopus 로고    scopus 로고
    • Cyber security: A crisis of prioritization - Report to the president
    • PITAC, President's Information Technology Advisory Committee, February
    • PITAC. Cyber security: A crisis of prioritization - report to the president. Technical report, President's Information Technology Advisory Committee, February 2005.
    • (2005) Technical Report
  • 35
    • 2342563770 scopus 로고    scopus 로고
    • Grand challenges in information security: Process and output
    • S. Smith and E. Spafford. Grand challenges in information security: Process and output. IEEE Security & Privacy, 2 (1):69-71, 2004.
    • (2004) IEEE Security & Privacy , vol.2 , Issue.1 , pp. 69-71
    • Smith, S.1    Spafford, E.2
  • 36
    • 77952392811 scopus 로고    scopus 로고
    • Risk management guide for information technology systems. NIST Special Publication 800-30, National Institute of Standards and Technology NIST, Gaithersburg, MD 20899-8930, July
    • G. Stoneburner, A. Goguen, and A. Feringa. Risk management guide for information technology systems. NIST Special Publication 800-30, National Institute of Standards and Technology (NIST), Gaithersburg, MD 20899-8930, July 2002.
    • (2002)
    • Stoneburner, G.1    Goguen, A.2    Feringa, A.3
  • 37
    • 0001133137 scopus 로고    scopus 로고
    • Coping with systems risk: Security planning models for management decision making
    • December
    • D. Straub and R. Welke. Coping with systems risk: Security planning models for management decision making. MIS Quarterly, 22 (4):441-469, December 1998.
    • (1998) MIS Quarterly , vol.22 , Issue.4 , pp. 441-469
    • Straub, D.1    Welke, R.2
  • 38
    • 77952324468 scopus 로고    scopus 로고
    • United Nations. United Nations Standard Products and Services Code
    • United Nations. United Nations Standard Products and Services Code, 2006.
    • (2006)
  • 39
    • 0030166318 scopus 로고    scopus 로고
    • Ontologies: Principles, methods and applications
    • M. Uschold and M. Grninger. Ontologies: Principles, methods and applications. Knowledge Engineering Review, 11 (2):93-155, 1996.
    • (1996) Knowledge Engineering Review , vol.11 , Issue.2 , pp. 93-155
    • Uschold, M.1    Grninger, M.2
  • 40
    • 77952324971 scopus 로고    scopus 로고
    • W3C. OWL - web ontology language, February
    • W3C. OWL - web ontology language, February 2004.
    • (2004)
  • 41
    • 77952344218 scopus 로고    scopus 로고
    • W3C. SPARQL - query language for RDF
    • W3C. SPARQL - query language for RDF, 2007.
    • (2007)
  • 42
    • 4243198165 scopus 로고    scopus 로고
    • Enemy at the gate: Threats to information security
    • M. Whitman. Enemy at the gate: threats to information security. Communications of the ACM, 46 (8):91-95, 2003.
    • (2003) Communications of the ACM , vol.46 , Issue.8 , pp. 91-95
    • Whitman, M.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.