-
1
-
-
77958077520
-
-
European Network and Information Security Agency(ENISA). URL http://www.enisa.europa.eu/.
-
-
-
-
2
-
-
77957312094
-
-
Security Guidance for Critical Areas of Focus in Cloud Computing V2.1, December
-
Security Guidance for Critical Areas of Focus in Cloud Computing V2.1. Cloud Security Alliance, December 2009.
-
(2009)
Cloud Security Alliance
-
-
-
3
-
-
77958039345
-
-
Common Result Format (CRF) Specification Version 0.3, September
-
J. Baker, A. Buttner, and T. Wittbold. Common Result Format (CRF) Specification Version 0.3. URL http://crf.mitre.org/, September 2009.
-
(2009)
-
-
Baker, J.1
Buttner, A.2
Wittbold, T.3
-
4
-
-
49049087973
-
A systematic review and comparison of security ontologies
-
C. Blanco, J. Lasheras, R. Valencia-Garcia, E. Fernandez-Medina, A. Toval, and M. Piattini. A systematic review and comparison of security ontologies. In The Third International Conference on Availability, Reliability and Security, 2008.
-
(2008)
The Third International Conference on Availability, Reliability and Security
-
-
Blanco, C.1
Lasheras, J.2
Valencia-Garcia, R.3
Fernandez-Medina, E.4
Toval, A.5
Piattini, M.6
-
8
-
-
17044383806
-
Security in the Semantic Web using OWL
-
DOI 10.1016/j.istr.2004.11.002, PII S1363412704000032
-
G. Denker, L. Kagal, and T. Finin. Security in the semantic web using owl. In Information Security Technical Report, pages 51-58, 2005. (Pubitemid 40497376)
-
(2005)
Information Security Technical Report
, vol.10
, Issue.1
, pp. 51-58
-
-
Denker, G.1
Kagal, L.2
Finin, T.3
-
9
-
-
77958046573
-
-
Distributed Management Task Force, Inc. Interoperabile Clouds - A White Paper from the Open Cloud Standards Incubator Version 1.0.0. DSP-IS0101, November 2009
-
Distributed Management Task Force, Inc. Interoperabile Clouds - A White Paper from the Open Cloud Standards Incubator Version 1.0.0. DSP-IS0101, November 2009.
-
-
-
-
10
-
-
74049147592
-
Formalizing information security knowledge
-
New York, NY, USA. ACM
-
S. Fenz and A. Ekelhart. Formalizing information security knowledge. In ASIACCS '09: Proceedings of the 4th International Symposium on Information, Computer, and Communications Security, pages 183-194, New York, NY, USA, 2009. ACM.
-
(2009)
ASIACCS '09: Proceedings of the 4th International Symposium on Information, Computer, and Communications Security
, pp. 183-194
-
-
Fenz, S.1
Ekelhart, A.2
-
12
-
-
58149365542
-
Toward principles for the design of ontologies used for knowledge sharing
-
T. R. Gruber. Toward principles for the design of ontologies used for knowledge sharing. International Journal of Human-Computer Studies, 43(5-6):907-928, 1995.
-
(1995)
International Journal of Human-Computer Studies
, vol.43
, Issue.5-6
, pp. 907-928
-
-
Gruber, T.R.1
-
14
-
-
26444578366
-
Failure to detect mismatches between intention and outcome in a simple decision task
-
P. Johansson, L. Hall, S. Sikstrom, and A. Olsson.Failure to detect mismatches between intention and outcome in a simple decision task. Science, 310(5745):116, 2005.
-
(2005)
Science
, vol.310
, Issue.5745
, pp. 116
-
-
Johansson, P.1
Hall, L.2
Sikstrom, S.3
Olsson, A.4
-
16
-
-
78651070465
-
The common vulnerability scoring system (CVSS) and its applicability to federal agency systems
-
August
-
P. Mell, K. Scarfone, and S. Romanosky. The Common Vulnerability Scoring System (CVSS) and Its Applicability to Federal Agency Systems. NIST Interagency Report 7435, August 2007.
-
(2007)
NIST Interagency Report
, vol.7435
-
-
Mell, P.1
Scarfone, K.2
Romanosky, S.3
-
17
-
-
42149109673
-
The provenance of electronic data
-
L. Moreau, P. Groth, S. Miles, J. Vazquez-Salceda, J. Ibbotson, S. Jiang, S. Munroe, O. Rana, A. Schreiber, V. Tan, and L. Varga. The provenance of electronic data. Commun. ACM, 51(4):52-58, 2008.
-
(2008)
Commun. ACM
, vol.51
, Issue.4
, pp. 52-58
-
-
Moreau, L.1
Groth, P.2
Miles, S.3
Vazquez-Salceda, J.4
Ibbotson, J.5
Jiang, S.6
Munroe, S.7
Rana, O.8
Schreiber, A.9
Tan, V.10
Varga, L.11
-
19
-
-
77958024909
-
-
National Institute of Standards and Technology
-
National Institute of Standards and Technology. National Vulnerability Database (NVD). URL http://nvd.nist.gov/.
-
-
-
-
21
-
-
70350630540
-
An information security ontology incorporating human-behavioural implications
-
New York, NY, USA. ACM
-
S. E. Parkin, A. van Moorsel, and R. Coles. An information security ontology incorporating human-behavioural implications. In SIN '09: Proceedings of the 2nd international conference on Security of information and networks, pages 46-55, New York, NY, USA, 2009. ACM.
-
(2009)
SIN '09: Proceedings of the 2nd International Conference on Security of Information and Networks
, pp. 46-55
-
-
Parkin, S.E.1
Van Moorsel, A.2
Coles, R.3
-
22
-
-
77958028645
-
-
Storage Networking Industry Association. Cloud Data Management Interface Version 1.0, April
-
Storage Networking Industry Association. Cloud Data Management Interface Version 1.0. URL http://cdmi.sniacloud.com/, April 2010.
-
(2010)
-
-
-
24
-
-
77958073086
-
-
The MITRE Corporation, September
-
The MITRE Corporation. Common Attack Pattern Enumeration and Classification (CAPEC). URL http://capec.mitre.org/, September 2009.
-
(2009)
-
-
-
25
-
-
77958046021
-
-
The MITRE Corporation, March
-
The MITRE Corporation. Common Vulnerability and Exposures (CVE). URL http://cve.mitre.org/, March 2009.
-
(2009)
-
-
-
26
-
-
77958050422
-
-
The MITRE Corporation, March
-
The MITRE Corporation. Assessment Results Format (ARF). URL http://measurablesecurity.mitre.org/incubator/arf/, March 2010.
-
(2010)
-
-
-
27
-
-
77958025237
-
-
The MITRE Corporation, March
-
The MITRE Corporation. Common Configuration Enumeration (CCE). URL http://cce.mitre.org/, March 2010.
-
(2010)
-
-
-
28
-
-
77958052452
-
-
The MITRE Corporation, January
-
The MITRE Corporation. Common Event Expression (CEE). URL http://cee.mitre.org/, January 2010.
-
(2010)
-
-
-
29
-
-
77958028942
-
-
The MITRE Corporation, February
-
The MITRE Corporation. Common Weakness Enumeration (CWE). URL http://cwe.mitre.org/, February 2010.
-
(2010)
-
-
-
30
-
-
77958061814
-
-
The MITRE Corporation, February
-
The MITRE Corporation. Common Weakness Scoring System (CWSS). URL http://cwe.mitre.org/cwss/index.html, February 2010.
-
(2010)
-
-
-
32
-
-
77958061532
-
-
The MITRE Corporation, February
-
The MITRE Corporation. Open Vulnerability and Assessment Language (OVAL). URL http://oval.mitre.org/, February 2010.
-
(2010)
-
-
-
33
-
-
77958031234
-
Use cases and requirements for a Cloud API
-
January
-
Thijs Metsch. Use cases and requirements for a Cloud API. Open Cloud Computing Interface GFD-I. 162, January 2010.
-
(2010)
Open Cloud Computing Interface GFD-I
, vol.162
-
-
Metsch, T.1
-
34
-
-
33646150432
-
An ontology-based approach to information systems security management
-
B. Tsoumas, S. Dritsas, and D. Gritzalis. An ontology-based approach to information systems security management. Computer Network Security, pages 151-164, 2005.
-
(2005)
Computer Network Security
, pp. 151-164
-
-
Tsoumas, B.1
Dritsas, S.2
Gritzalis, D.3
-
35
-
-
33751088049
-
Towards an ontology-based security management
-
Washington, DC, USA. IEEE Computer Society
-
B. Tsoumas and D. Gritzalis. Towards an ontology-based security management. In AINA '06: Proceedings of the 20th International Conference on Advanced Information Networking and Applications, pages 985-992, Washington, DC, USA, 2006. IEEE Computer Society.
-
(2006)
AINA '06: Proceedings of the 20th International Conference on Advanced Information Networking and Applications
, pp. 985-992
-
-
Tsoumas, B.1
Gritzalis, D.2
-
36
-
-
77954712362
-
OVM: An ontology for vulnerability management
-
New York, NY, USA. ACM
-
J. A. Wang and M. Guo. OVM: an ontology for vulnerability management. In CSIIRW '09: Proceedings of the 5th Annual Workshop on Cyber Security and Information Intelligence Research, pages 1-4, New York, NY, USA, 2009. ACM.
-
(2009)
CSIIRW '09: Proceedings of the 5th Annual Workshop on Cyber Security and Information Intelligence Research
, pp. 1-4
-
-
Wang, J.A.1
Guo, M.2
-
38
-
-
62349121390
-
Specification for the Extensible Configuration Checklist Description Format (XCCDF) version 1.1.4
-
January
-
N. Ziring and S. D. Quinn. Specification for the Extensible Configuration Checklist Description Format (XCCDF) version 1.1.4. NIST Interagency Report 7275 Revision 3, January 2008.
-
(2008)
NIST Interagency Report 7275 Revision 3
-
-
Ziring, N.1
Quinn, S.D.2
|