메뉴 건너뛰기




Volumn 11, Issue 8, 2011, Pages 8085-8114

Common criteria related security design patterns for intelligent sensors-knowledge engineering-based implementation

Author keywords

Common criteria; Design pattern; Information security; Intelligent sensor; IT security development; Knowledge engineering

Indexed keywords

ALGORITHM; ARTICLE; AUTOMATED PATTERN RECOGNITION; COMPUTER INTERFACE; COMPUTER NETWORK; COMPUTER PROGRAM; COMPUTER SECURITY; COMPUTER SYSTEM; EQUIPMENT DESIGN; GENETIC PROCEDURES; HUMAN; MICROCOMPUTER;

EID: 80052159565     PISSN: 14248220     EISSN: None     Source Type: Journal    
DOI: 10.3390/s110808085     Document Type: Article
Times cited : (17)

References (44)
  • 1
    • 77953517421 scopus 로고    scopus 로고
    • Version 3.1; Common Criteria member organizations, part 1-3, Available online, (accessed on 10 January 2011)
    • Common Criteria for IT Security Evaluation, Version 3.1; Common Criteria member organizations, part 1-3; 2009. Available online: http://www.commoncriteriaportal.org/ (accessed on 10 January 2011).
    • (2009) Common Criteria For it Security Evaluation
  • 2
    • 84876686005 scopus 로고    scopus 로고
    • Common Criteria Portal Home page. Available online, (accessed on 10 January 2011)
    • Common Criteria Portal Home page. Available online: http://www.commoncriteriaportal.org/ (accessed on 10 January 2011).
  • 3
    • 77953508241 scopus 로고    scopus 로고
    • Intelligent sensors security
    • Bialas, A. Intelligent sensors security. Sensors 2010, 10, 822-859.
    • (2010) Sensors , vol.10 , pp. 822-859
    • Bialas, A.1
  • 4
    • 77953495369 scopus 로고    scopus 로고
    • Common Criteria related security design patterns-Validation on the intelligent sensor example designed for mine environment
    • Bialas, A. Common Criteria related security design patterns-Validation on the intelligent sensor example designed for mine environment. Sensors 2010, 10, 4456-4496.
    • (2010) Sensors , vol.10 , pp. 4456-4496
    • Bialas, A.1
  • 5
    • 33244454674 scopus 로고    scopus 로고
    • Stanford University: Menlo Park, CA, USA, Available online, (accessed on 10 January 2011)
    • Protégé Ontology Editor and Knowledge Acquisition System; Stanford University: Menlo Park, CA, USA, 2011. Available online: http://protege.stanford.edu/ (accessed on 10 January 2011).
    • (2011) Protégé Ontology Editor and Knowledge Acquisition System
  • 7
    • 84863314646 scopus 로고    scopus 로고
    • Silesian University of Technology Press: Gliwice, Poland, Available online, (accessed on 10 January 2011)
    • Bialas, A. Semiformal Common Criteria Compliant IT Security Development Framework; Silesian University of Technology Press: Gliwice, Poland, 2008. Available online: http://www.znsi.aei.polsl.pl/ (accessed on 10 January 2011).
    • (2008) Semiformal Common Criteria Compliant it Security Development Framework
    • Bialas, A.1
  • 8
    • 84876694474 scopus 로고    scopus 로고
    • Semiformal Framework for ICT Security Development, Rome, Italy, 25-27 September, available online, currently can be obtained from the author on request)
    • Bialas, A. Semiformal Framework for ICT Security Development. Presented at the 8th International Common Criteria Conference, Rome, Italy, 25-27 September 2007 (available online: http://www.8iccc.com/index.php, currently can be obtained from the author on request).
    • (2007) Presented At the 8th International Common Criteria Conference
    • Bialas, A.1
  • 9
    • 36049040298 scopus 로고    scopus 로고
    • Semiformal Approach to the IT Security Development
    • Poland, 14-16 June 2007; Zamojski, W., Mazurkiewicz, J., Sugier, J., Walkowiak, T., Eds.; IEEE Computer Society: Los Alamitos, Washington, Tokyo
    • Bialas, A. Semiformal Approach to the IT Security Development. In Proceedings of the International Conferences on Dependability of Computer Systems (DepCoS-RELCOMEX 2007), Szklarska Poreba, Poland, 14-16 June 2007; Zamojski, W., Mazurkiewicz, J., Sugier, J., Walkowiak, T., Eds.; IEEE Computer Society: Los Alamitos, Washington, Tokyo, 2007; pp. 3-11.
    • (2007) Proceedings of the International Conferences On Dependability of Computer Systems (DepCoS-RELCOMEX 2007), Szklarska Poreba , pp. 3-11
    • Bialas, A.1
  • 13
    • 77956946300 scopus 로고    scopus 로고
    • Available online, (accessed 18 April 2011)
    • Ontology (information science). Available online: http://en.wikipedia.org/wiki/Ontology_%28information_science%29 (accessed 18 April 2011).
    • Ontology (information Science)
  • 15
    • 70449650807 scopus 로고    scopus 로고
    • Ontology-based Security Problem Definition and Solution for the Common Criteria Compliant Development Process
    • Poland, 30 June-2 July 2009; Zamojski, W., Mazurkiewicz, J., Sugier, J., Walkowiak, T., Eds.; IEEE Computer Society: Los Alamitos, Washington, Tokyo
    • Bialas, A. Ontology-based Security Problem Definition and Solution for the Common Criteria Compliant Development Process. In Proceedings of the International Conferences on Dependability of Computer Systems (DepCoS-RELCOMEX 2009), Brunow, Poland, 30 June-2 July 2009; Zamojski, W., Mazurkiewicz, J., Sugier, J., Walkowiak, T., Eds.; IEEE Computer Society: Los Alamitos, Washington, Tokyo, 2009; pp. 3-10.
    • (2009) Proceedings of the International Conferences On Dependability of Computer Systems (DepCoS-RELCOMEX 2009), Brunow , pp. 3-10
    • Bialas, A.1
  • 16
    • 77953673877 scopus 로고    scopus 로고
    • Validation of the Specification Means Ontology on the Simple Firewall Case
    • Las Vegas, NV, USA, 13-16 July 2009; Arabnia, H., Daimi, K., Eds.; CSREA Press: Las Vegas, NV, USA
    • Bialas, A. Validation of the Specification Means Ontology on the Simple Firewall Case. In Proceedings of the 2009 International Conferences on Security and Management-SAM'09 (The World Congress in Applied Computing), Las Vegas, NV, USA, 13-16 July 2009; Arabnia, H., Daimi, K., Eds.; CSREA Press: Las Vegas, NV, USA, 2009; Volume I, pp. 278-284.
    • (2009) Proceedings of the 2009 International Conferences On Security and Management-SAM'09 (The World Congress In Applied Computing) , vol.1 , pp. 278-284
    • Bialas, A.1
  • 17
    • 71949108340 scopus 로고    scopus 로고
    • Ontological approach to the motion sensor security development
    • Bialas A. Ontological approach to the motion sensor security development. Electr. Rev. (Przegla{ogonek}d Elektrotechniczny) 2009, 85, 36-44.
    • (2009) Electr. Rev. (Przegla{ogonek}d Elektrotechniczny) , vol.85 , pp. 36-44
    • Bialas, A.1
  • 18
    • 77953740851 scopus 로고    scopus 로고
    • Common Criteria Requirements Modeling and its Uses for Quality of Information Assurance (QoIA)
    • Kennesaw, GA, USA, 18-20 March
    • Yavagal, D.S.; Lee, S.W.; Ahn, G-J.; Gandhi, R.A. Common Criteria Requirements Modeling and its Uses for Quality of Information Assurance (QoIA). In Proceedings of the 43rd Annual ACM Southeast Conference (ACMSE'05), Kennesaw, GA, USA, 18-20 March 2005; Volume 2, pp. 130-135.
    • (2005) Proceedings of the 43rd Annual ACM Southeast Conference (ACMSE'05) , vol.2 , pp. 130-135
    • Yavagal, D.S.1    Lee, S.W.2    Ahn, G.-J.3    Gandhi, R.A.4
  • 23
    • 80052155253 scopus 로고    scopus 로고
    • Security Trade-off-ontological approach
    • Akbar Hussain, D.M., Ed.; InTech: Rijeka, Croatia
    • Bialas, A. Security Trade-off-ontological approach. In Advances in Computer Science and IT; Akbar Hussain, D.M., Ed.; InTech: Rijeka, Croatia, 2009; pp. 39-64.
    • (2009) Advances In Computer Science and IT , pp. 39-64
    • Bialas, A.1
  • 24
    • 50049109224 scopus 로고    scopus 로고
    • Information Security Fortification by Ontological Mapping of the ISO/IEC 27001 Standard
    • Melbourne, Australia, 12-17 December 2007; IEEE Computer Society: Washington, DC, USA
    • Ekelhart, A.; Fenz, S.; Goluch, G.; Riedel, B.; Weippl, E. Information Security Fortification by Ontological Mapping of the ISO/IEC 27001 Standard. In Proceedings of the 13th Pacific Rim International Symposium on Dependable Computing, Melbourne, Australia, 12-17 December 2007; IEEE Computer Society: Washington, DC, USA; 2007; pp. 381-388,
    • (2007) Proceedings of the 13th Pacific Rim International Symposium On Dependable Computing , pp. 381-388
    • Ekelhart, A.1    Fenz, S.2    Goluch, G.3    Riedel, B.4    Weippl, E.5
  • 25
    • 80052184084 scopus 로고    scopus 로고
    • Ontological Approach to the Business Continuity Management System Development
    • Las Vegas, NV, USA, 12-15 July 2010; Arabnia, H., Daimi, K., Grimaila, M.R., Markowsky, G., Eds.; CSREA Press: Las Vegas, NV, USA
    • Bialas, A. Ontological Approach to the Business Continuity Management System Development. In Proceedings of the 2010 International Conference on Security and Management-SAM'10 (The World Congress in Applied Computing), Las Vegas, NV, USA, 12-15 July 2010; Arabnia, H., Daimi, K., Grimaila, M.R., Markowsky, G., Eds.; CSREA Press: Las Vegas, NV, USA, 2010; Volume 2, pp. 386-392.
    • (2010) Proceedings of the 2010 International Conference On Security and Management-SAM'10 (The World Congress In Applied Computing) , vol.2 , pp. 386-392
    • Bialas, A.1
  • 26
    • 84876678378 scopus 로고    scopus 로고
    • CSL-Computer Science Laboratory: Menlo Park, CA, USA, Available online, (accessed on 20 April 2011)
    • Security Ontologies in OWL; CSL-Computer Science Laboratory: Menlo Park, CA, USA, 2008. Available online: http://www.csl.sri.com/users/denker/owl-sec/ontologies/ (accessed on 20 April 2011).
    • (2008) Security Ontologies In OWL
  • 27
    • 84876691804 scopus 로고    scopus 로고
    • Available online, (accessed on 20 April 2011)
    • DAML Services-Security and privacy, 2008. Available online: http://www.daml.org/services/owl-s/security.html (accessed on 20 April 2011).
    • (2008) DAML Services-Security and Privacy
  • 28
    • 84876670955 scopus 로고    scopus 로고
    • Linköping University: Linköping, Sweden, Available online, (accessed on 20 April 2011)
    • Herzog's Security Ontology; Linköping University: Linköping, Sweden, 2006. Available online: http://www.ida.liu.se/~iislab/projects/secont/ (accessed on 20 April 2011).
    • (2006) Herzog's Security Ontology
  • 29
    • 84876676602 scopus 로고    scopus 로고
    • Version 2.0; University of Maryland: College Park, MD, USA, Available online, (accessed on 20 April 2011)
    • REI Ontology Specifications, Version 2.0; University of Maryland: College Park, MD, USA, 2008. Available online: http://www.cs.umbc.edu/~lkagal1/rei/ (accessed on 20 April 2011).
    • (2008) REI Ontology Specifications
  • 32
    • 80052165073 scopus 로고    scopus 로고
    • Successful Common Criteria Evaluations-A Practical Guide for Vendors, CreateSpace: Lexington, KY, USA
    • Higaki, W.H. Successful Common Criteria Evaluations-A Practical Guide for Vendors; CreateSpace: Lexington, KY, USA, 2010.
    • (2010)
    • Higaki, W.H.1
  • 33
    • 57049165906 scopus 로고    scopus 로고
    • A Knowledge-Based Tool to Support Clear Relationship between Threats and Countermeasures Based on International Standards
    • APNOMS 2008, Beijing, China, 22-24 October 2008; Springer: Berlin, Germany
    • Ramirez-Caceres, G.H.; Teshigawara, Y. A Knowledge-Based Tool to Support Clear Relationship between Threats and Countermeasures Based on International Standards. In Proceedings of the 11th Asia-Pacific Network Operations and Management Symposium, APNOMS 2008, Beijing, China, 22-24 October 2008; Springer: Berlin, Germany, 2008; pp. 523-526.
    • (2008) Proceedings of the 11th Asia-Pacific Network Operations and Management Symposium , pp. 523-526
    • Ramirez-Caceres, G.H.1    Teshigawara, Y.2
  • 34
    • 84876682674 scopus 로고    scopus 로고
    • CCMODE (Common Criteria compliant, Modular, Open IT security Development Environment) Project; Available online, (accessed on 20 April 2011)
    • CCMODE (Common Criteria compliant, Modular, Open IT security Development Environment) Project; Available online: http://ccmode.emag.pl/ (accessed on 20 April 2011).
  • 36
    • 80052153969 scopus 로고    scopus 로고
    • Patterns improving the common criteria compliant IT security development process
    • Springer-Verlag: Berlin, Germany
    • Bialas, A. Patterns improving the common criteria compliant IT security development process. In Dependable Computer Systems (Advances in Intelligent and Soft Computing); Springer-Verlag: Berlin, Germany, 2011; Volume 97, pp. 1-16.
    • (2011) Dependable Computer Systems (Advances In Intelligent and Soft Computing) , vol.97 , pp. 1-16
    • Bialas, A.1
  • 37
    • 84872945690 scopus 로고    scopus 로고
    • Available online, (accessed on 24 June 2011)
    • SemanticWorks Semantic Web Tool. Available online: http://www.altova.com/semanticworks.html (accessed on 24 June 2011).
    • SemanticWorks Semantic Web Tool
  • 38
    • 84876694737 scopus 로고    scopus 로고
    • Available online, (accessed on 2 July 2011)
    • NeOn Toolkit. Available online: http://neon-toolkit.org/wiki/Main_Page (accessed on 2 July 2011).
    • NeOn Toolkit
  • 39
    • 84870830745 scopus 로고    scopus 로고
    • Available online, (accessed on 2 July 2011)
    • TopBraid Composer. Available online: http://www.topquadrant.com/products/TB_Suite.html (accessed on 2 July 2011).
    • TopBraid Composer
  • 40
    • 21544448034 scopus 로고    scopus 로고
    • 1.3 ed.; The University of Manchester: Manchester, UK, Available online, (accessed on 2 July 2011)
    • Horridge, M. A Practical Guide To Building OWL Ontologies Using Protégé 4 and CO-ODE Tools, 1.3 ed.; The University of Manchester: Manchester, UK, 2011. Available online: http://owl.cs.manchester.ac.uk/tutorials/protegeowltutorial/ (accessed on 2 July 2011).
    • (2011) A Practical Guide to Building OWL Ontologies Using Protégé 4 and CO-ODE Tools
    • Horridge, M.1
  • 42
    • 84876683797 scopus 로고    scopus 로고
    • W3C Semantic Web. Available online, (accessed on 2 July 2011)
    • W3C Semantic Web. Available online: http://www.w3.org/standards/semanticweb/ (accessed on 2 July 2011).
  • 43
    • 84876674276 scopus 로고    scopus 로고
    • D2R Server. Available online, (accessed on 24 June 2011)
    • D2R Server. Available online: http://www4.wiwiss.fu-berlin.de/bizer/d2r-server/ (accessed on 24 June 2011).
  • 44
    • 84876673637 scopus 로고    scopus 로고
    • Enterprise Architect. Available online, (accessed on 24 June 2011)
    • Enterprise Architect. Available online: http://www.sparxsystems.com/ (accessed on 24 June 2011).


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.