메뉴 건너뛰기




Volumn , Issue , 2010, Pages 100-109

Ontological approach toward cybersecurity in cloud computing

Author keywords

Cloud computing; Cybersecurity; Information exchange; Ontology

Indexed keywords

CLOUD COMPUTING; CYBER SECURITY; DATA PROVENANCE; INFORMATION EXCHANGES; INITIAL STAGES; ONTOLOGICAL APPROACH; RESOURCE DEPENDENCIES;

EID: 77958047034     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1854099.1854121     Document Type: Conference Paper
Times cited : (60)

References (38)
  • 1
    • 77958077520 scopus 로고    scopus 로고
    • European Network and Information Security Agency(ENISA). URL http://www.enisa.europa.eu/.
  • 2
    • 77957312094 scopus 로고    scopus 로고
    • Security Guidance for Critical Areas of Focus in Cloud Computing V2.1, December
    • Security Guidance for Critical Areas of Focus in Cloud Computing V2.1. Cloud Security Alliance, December 2009.
    • (2009) Cloud Security Alliance
  • 3
    • 77958039345 scopus 로고    scopus 로고
    • Common Result Format (CRF) Specification Version 0.3, September
    • J. Baker, A. Buttner, and T. Wittbold. Common Result Format (CRF) Specification Version 0.3. URL http://crf.mitre.org/, September 2009.
    • (2009)
    • Baker, J.1    Buttner, A.2    Wittbold, T.3
  • 8
    • 17044383806 scopus 로고    scopus 로고
    • Security in the Semantic Web using OWL
    • DOI 10.1016/j.istr.2004.11.002, PII S1363412704000032
    • G. Denker, L. Kagal, and T. Finin. Security in the semantic web using owl. In Information Security Technical Report, pages 51-58, 2005. (Pubitemid 40497376)
    • (2005) Information Security Technical Report , vol.10 , Issue.1 , pp. 51-58
    • Denker, G.1    Kagal, L.2    Finin, T.3
  • 9
    • 77958046573 scopus 로고    scopus 로고
    • Distributed Management Task Force, Inc. Interoperabile Clouds - A White Paper from the Open Cloud Standards Incubator Version 1.0.0. DSP-IS0101, November 2009
    • Distributed Management Task Force, Inc. Interoperabile Clouds - A White Paper from the Open Cloud Standards Incubator Version 1.0.0. DSP-IS0101, November 2009.
  • 12
    • 58149365542 scopus 로고
    • Toward principles for the design of ontologies used for knowledge sharing
    • T. R. Gruber. Toward principles for the design of ontologies used for knowledge sharing. International Journal of Human-Computer Studies, 43(5-6):907-928, 1995.
    • (1995) International Journal of Human-Computer Studies , vol.43 , Issue.5-6 , pp. 907-928
    • Gruber, T.R.1
  • 14
    • 26444578366 scopus 로고    scopus 로고
    • Failure to detect mismatches between intention and outcome in a simple decision task
    • P. Johansson, L. Hall, S. Sikstrom, and A. Olsson.Failure to detect mismatches between intention and outcome in a simple decision task. Science, 310(5745):116, 2005.
    • (2005) Science , vol.310 , Issue.5745 , pp. 116
    • Johansson, P.1    Hall, L.2    Sikstrom, S.3    Olsson, A.4
  • 16
    • 78651070465 scopus 로고    scopus 로고
    • The common vulnerability scoring system (CVSS) and its applicability to federal agency systems
    • August
    • P. Mell, K. Scarfone, and S. Romanosky. The Common Vulnerability Scoring System (CVSS) and Its Applicability to Federal Agency Systems. NIST Interagency Report 7435, August 2007.
    • (2007) NIST Interagency Report , vol.7435
    • Mell, P.1    Scarfone, K.2    Romanosky, S.3
  • 19
    • 77958024909 scopus 로고    scopus 로고
    • National Institute of Standards and Technology
    • National Institute of Standards and Technology. National Vulnerability Database (NVD). URL http://nvd.nist.gov/.
  • 22
    • 77958028645 scopus 로고    scopus 로고
    • Storage Networking Industry Association. Cloud Data Management Interface Version 1.0, April
    • Storage Networking Industry Association. Cloud Data Management Interface Version 1.0. URL http://cdmi.sniacloud.com/, April 2010.
    • (2010)
  • 24
    • 77958073086 scopus 로고    scopus 로고
    • The MITRE Corporation, September
    • The MITRE Corporation. Common Attack Pattern Enumeration and Classification (CAPEC). URL http://capec.mitre.org/, September 2009.
    • (2009)
  • 25
    • 77958046021 scopus 로고    scopus 로고
    • The MITRE Corporation, March
    • The MITRE Corporation. Common Vulnerability and Exposures (CVE). URL http://cve.mitre.org/, March 2009.
    • (2009)
  • 26
    • 77958050422 scopus 로고    scopus 로고
    • The MITRE Corporation, March
    • The MITRE Corporation. Assessment Results Format (ARF). URL http://measurablesecurity.mitre.org/incubator/arf/, March 2010.
    • (2010)
  • 27
    • 77958025237 scopus 로고    scopus 로고
    • The MITRE Corporation, March
    • The MITRE Corporation. Common Configuration Enumeration (CCE). URL http://cce.mitre.org/, March 2010.
    • (2010)
  • 28
    • 77958052452 scopus 로고    scopus 로고
    • The MITRE Corporation, January
    • The MITRE Corporation. Common Event Expression (CEE). URL http://cee.mitre.org/, January 2010.
    • (2010)
  • 29
    • 77958028942 scopus 로고    scopus 로고
    • The MITRE Corporation, February
    • The MITRE Corporation. Common Weakness Enumeration (CWE). URL http://cwe.mitre.org/, February 2010.
    • (2010)
  • 30
    • 77958061814 scopus 로고    scopus 로고
    • The MITRE Corporation, February
    • The MITRE Corporation. Common Weakness Scoring System (CWSS). URL http://cwe.mitre.org/cwss/index.html, February 2010.
    • (2010)
  • 32
    • 77958061532 scopus 로고    scopus 로고
    • The MITRE Corporation, February
    • The MITRE Corporation. Open Vulnerability and Assessment Language (OVAL). URL http://oval.mitre.org/, February 2010.
    • (2010)
  • 33
    • 77958031234 scopus 로고    scopus 로고
    • Use cases and requirements for a Cloud API
    • January
    • Thijs Metsch. Use cases and requirements for a Cloud API. Open Cloud Computing Interface GFD-I. 162, January 2010.
    • (2010) Open Cloud Computing Interface GFD-I , vol.162
    • Metsch, T.1
  • 34
    • 33646150432 scopus 로고    scopus 로고
    • An ontology-based approach to information systems security management
    • B. Tsoumas, S. Dritsas, and D. Gritzalis. An ontology-based approach to information systems security management. Computer Network Security, pages 151-164, 2005.
    • (2005) Computer Network Security , pp. 151-164
    • Tsoumas, B.1    Dritsas, S.2    Gritzalis, D.3
  • 38
    • 62349121390 scopus 로고    scopus 로고
    • Specification for the Extensible Configuration Checklist Description Format (XCCDF) version 1.1.4
    • January
    • N. Ziring and S. D. Quinn. Specification for the Extensible Configuration Checklist Description Format (XCCDF) version 1.1.4. NIST Interagency Report 7275 Revision 3, January 2008.
    • (2008) NIST Interagency Report 7275 Revision 3
    • Ziring, N.1    Quinn, S.D.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.