-
1
-
-
77953517421
-
-
Version 3.1; Common Criteria member organizations, part 1-3, Available online, (accessed on 10 January 2011)
-
Common Criteria for IT Security Evaluation, Version 3.1; Common Criteria member organizations, part 1-3; 2009. Available online: http://www.commoncriteriaportal.org/ (accessed on 10 January 2011).
-
(2009)
Common Criteria For it Security Evaluation
-
-
-
2
-
-
84876686005
-
-
Common Criteria Portal Home page. Available online, (accessed on 10 January 2011)
-
Common Criteria Portal Home page. Available online: http://www.commoncriteriaportal.org/ (accessed on 10 January 2011).
-
-
-
-
3
-
-
77953508241
-
Intelligent sensors security
-
Bialas, A. Intelligent sensors security. Sensors 2010, 10, 822-859.
-
(2010)
Sensors
, vol.10
, pp. 822-859
-
-
Bialas, A.1
-
4
-
-
77953495369
-
Common Criteria related security design patterns-Validation on the intelligent sensor example designed for mine environment
-
Bialas, A. Common Criteria related security design patterns-Validation on the intelligent sensor example designed for mine environment. Sensors 2010, 10, 4456-4496.
-
(2010)
Sensors
, vol.10
, pp. 4456-4496
-
-
Bialas, A.1
-
5
-
-
33244454674
-
-
Stanford University: Menlo Park, CA, USA, Available online, (accessed on 10 January 2011)
-
Protégé Ontology Editor and Knowledge Acquisition System; Stanford University: Menlo Park, CA, USA, 2011. Available online: http://protege.stanford.edu/ (accessed on 10 January 2011).
-
(2011)
Protégé Ontology Editor and Knowledge Acquisition System
-
-
-
7
-
-
84863314646
-
-
Silesian University of Technology Press: Gliwice, Poland, Available online, (accessed on 10 January 2011)
-
Bialas, A. Semiformal Common Criteria Compliant IT Security Development Framework; Silesian University of Technology Press: Gliwice, Poland, 2008. Available online: http://www.znsi.aei.polsl.pl/ (accessed on 10 January 2011).
-
(2008)
Semiformal Common Criteria Compliant it Security Development Framework
-
-
Bialas, A.1
-
8
-
-
84876694474
-
-
Semiformal Framework for ICT Security Development, Rome, Italy, 25-27 September, available online, currently can be obtained from the author on request)
-
Bialas, A. Semiformal Framework for ICT Security Development. Presented at the 8th International Common Criteria Conference, Rome, Italy, 25-27 September 2007 (available online: http://www.8iccc.com/index.php, currently can be obtained from the author on request).
-
(2007)
Presented At the 8th International Common Criteria Conference
-
-
Bialas, A.1
-
9
-
-
36049040298
-
Semiformal Approach to the IT Security Development
-
Poland, 14-16 June 2007; Zamojski, W., Mazurkiewicz, J., Sugier, J., Walkowiak, T., Eds.; IEEE Computer Society: Los Alamitos, Washington, Tokyo
-
Bialas, A. Semiformal Approach to the IT Security Development. In Proceedings of the International Conferences on Dependability of Computer Systems (DepCoS-RELCOMEX 2007), Szklarska Poreba, Poland, 14-16 June 2007; Zamojski, W., Mazurkiewicz, J., Sugier, J., Walkowiak, T., Eds.; IEEE Computer Society: Los Alamitos, Washington, Tokyo, 2007; pp. 3-11.
-
(2007)
Proceedings of the International Conferences On Dependability of Computer Systems (DepCoS-RELCOMEX 2007), Szklarska Poreba
, pp. 3-11
-
-
Bialas, A.1
-
10
-
-
33750050331
-
-
John Wiley and Sons: Chichester, UK
-
Schumacher, M.; Fernandez-Buglioni, E.; Hybertson, D.; Buschmann, F.; Sommerlad, P. Security Patterns: Integrating Security and Systems Engineering; John Wiley and Sons: Chichester, UK, 2006.
-
(2006)
Security Patterns: Integrating Security and Systems Engineering
-
-
Schumacher, M.1
Fernandez-Buglioni, E.2
Hybertson, D.3
Buschmann, F.4
Sommerlad, P.5
-
11
-
-
42449139876
-
A survey on security patterns
-
Yoshioka, N.; Washizaki, H.; Maruyama, K. A survey on security patterns. Prog. Inf. 2008, 5, 35-47.
-
(2008)
Prog. Inf
, vol.5
, pp. 35-47
-
-
Yoshioka, N.1
Washizaki, H.2
Maruyama, K.3
-
13
-
-
77956946300
-
-
Available online, (accessed 18 April 2011)
-
Ontology (information science). Available online: http://en.wikipedia.org/wiki/Ontology_%28information_science%29 (accessed 18 April 2011).
-
Ontology (information Science)
-
-
-
14
-
-
0242517622
-
-
Knowledge Systems Laboratory, Stanford University: Stanford, CA, USA, March
-
Noy, N.F.; McGuiness, D.L. Ontology Development 101: A Guide to Creating Your First Ontology; Knowledge Systems Laboratory, Stanford University: Stanford, CA, USA, March 2001.
-
(2001)
Ontology Development 101: A Guide to Creating Your First Ontology
-
-
Noy, N.F.1
McGuiness, D.L.2
-
15
-
-
70449650807
-
Ontology-based Security Problem Definition and Solution for the Common Criteria Compliant Development Process
-
Poland, 30 June-2 July 2009; Zamojski, W., Mazurkiewicz, J., Sugier, J., Walkowiak, T., Eds.; IEEE Computer Society: Los Alamitos, Washington, Tokyo
-
Bialas, A. Ontology-based Security Problem Definition and Solution for the Common Criteria Compliant Development Process. In Proceedings of the International Conferences on Dependability of Computer Systems (DepCoS-RELCOMEX 2009), Brunow, Poland, 30 June-2 July 2009; Zamojski, W., Mazurkiewicz, J., Sugier, J., Walkowiak, T., Eds.; IEEE Computer Society: Los Alamitos, Washington, Tokyo, 2009; pp. 3-10.
-
(2009)
Proceedings of the International Conferences On Dependability of Computer Systems (DepCoS-RELCOMEX 2009), Brunow
, pp. 3-10
-
-
Bialas, A.1
-
16
-
-
77953673877
-
Validation of the Specification Means Ontology on the Simple Firewall Case
-
Las Vegas, NV, USA, 13-16 July 2009; Arabnia, H., Daimi, K., Eds.; CSREA Press: Las Vegas, NV, USA
-
Bialas, A. Validation of the Specification Means Ontology on the Simple Firewall Case. In Proceedings of the 2009 International Conferences on Security and Management-SAM'09 (The World Congress in Applied Computing), Las Vegas, NV, USA, 13-16 July 2009; Arabnia, H., Daimi, K., Eds.; CSREA Press: Las Vegas, NV, USA, 2009; Volume I, pp. 278-284.
-
(2009)
Proceedings of the 2009 International Conferences On Security and Management-SAM'09 (The World Congress In Applied Computing)
, vol.1
, pp. 278-284
-
-
Bialas, A.1
-
17
-
-
71949108340
-
Ontological approach to the motion sensor security development
-
Bialas A. Ontological approach to the motion sensor security development. Electr. Rev. (Przegla{ogonek}d Elektrotechniczny) 2009, 85, 36-44.
-
(2009)
Electr. Rev. (Przegla{ogonek}d Elektrotechniczny)
, vol.85
, pp. 36-44
-
-
Bialas, A.1
-
18
-
-
77953740851
-
Common Criteria Requirements Modeling and its Uses for Quality of Information Assurance (QoIA)
-
Kennesaw, GA, USA, 18-20 March
-
Yavagal, D.S.; Lee, S.W.; Ahn, G-J.; Gandhi, R.A. Common Criteria Requirements Modeling and its Uses for Quality of Information Assurance (QoIA). In Proceedings of the 43rd Annual ACM Southeast Conference (ACMSE'05), Kennesaw, GA, USA, 18-20 March 2005; Volume 2, pp. 130-135.
-
(2005)
Proceedings of the 43rd Annual ACM Southeast Conference (ACMSE'05)
, vol.2
, pp. 130-135
-
-
Yavagal, D.S.1
Lee, S.W.2
Ahn, G.-J.3
Gandhi, R.A.4
-
19
-
-
36249017853
-
Ontological Mapping of Common Criteria's Security Assurance Requirements
-
Venter, H., Eloff, M., Labuschagne, L., Eloff, J., von Solms, R., Eds.; Springer: Boston, MA, USA
-
Ekelhart, A.; Fenz, S.; Goluch, G.; Weippl, E. Ontological Mapping of Common Criteria's Security Assurance Requirements. In New Approaches for Security, Privacy and Trust in Complex Environments, International Federation for Information Processing; Venter, H., Eloff, M., Labuschagne, L., Eloff, J., von Solms, R., Eds.; Springer: Boston, MA, USA, 2007; Volume 232, pp. 85-95.
-
(2007)
New Approaches For Security, Privacy and Trust In Complex Environments, International Federation For Information Processing
, vol.232
, pp. 85-95
-
-
Ekelhart, A.1
Fenz, S.2
Goluch, G.3
Weippl, E.4
-
20
-
-
39749101462
-
Security Ontologies: Improving Quantitative Risk Analysis
-
Big Island, HI, USA; 3-6 Jane 2007; IEEE Computer Society Press: Washington, DC, USA
-
Ekelhart, A.; Fenz, S.; Klemen, M., Weippl, E. Security Ontologies: Improving Quantitative Risk Analysis. In Proceedings of the 40th Hawaii International Conference on System Sciences (HICSS'07), Big Island, HI, USA; 3-6 Jane 2007; IEEE Computer Society Press: Washington, DC, USA, 2007; pp. 156-162.
-
(2007)
Proceedings of the 40th Hawaii International Conference On System Sciences (HICSS'07)
, pp. 156-162
-
-
Ekelhart, A.1
Fenz, S.2
Klemen, M.3
Weippl, E.4
-
21
-
-
33646150432
-
An Ontology-Based Approach to Information Systems Security Management
-
MMM-ACNS, St. Petersburg, Russia, September 2005; Lecture Notes in Computer Science, Volume 3685/2005
-
Tsoumas, B.; Dritsas, S.; Gritzalis, D. An Ontology-Based Approach to Information Systems Security Management. In Proceedings of 3rd International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS, St. Petersburg, Russia, September 2005; Lecture Notes in Computer Science, Volume 3685/2005, pp. 151-164.
-
(2005)
Proceedings of 3rd International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security
, vol.3685
, pp. 151-164
-
-
Tsoumas, B.1
Dritsas, S.2
Gritzalis, D.3
-
22
-
-
71049152780
-
Concepts for an Ontology-centric Technology Risk Management Architecture in the Banking Industry
-
Hong Kong, China, October 2006;, IEEE Computer Society: Washington, DC, USA
-
Atkinson, C.; Cuske, Ch.; Dickopp, T. Concepts for an Ontology-centric Technology Risk Management Architecture in the Banking Industry. In Proceedings of 10th IEEE International Enterprise Distributed Object Computing Conference Workshops (EDOCW'06), Hong Kong, China, October 2006; IEEE Computer Society: Washington, DC, USA, 2006; pp. 21-29.
-
(2006)
Proceedings of 10th IEEE International Enterprise Distributed Object Computing Conference Workshops (EDOCW'06)
, pp. 21-29
-
-
Atkinson, C.1
Cuske, C.H.2
Dickopp, T.3
-
23
-
-
80052155253
-
Security Trade-off-ontological approach
-
Akbar Hussain, D.M., Ed.; InTech: Rijeka, Croatia
-
Bialas, A. Security Trade-off-ontological approach. In Advances in Computer Science and IT; Akbar Hussain, D.M., Ed.; InTech: Rijeka, Croatia, 2009; pp. 39-64.
-
(2009)
Advances In Computer Science and IT
, pp. 39-64
-
-
Bialas, A.1
-
24
-
-
50049109224
-
Information Security Fortification by Ontological Mapping of the ISO/IEC 27001 Standard
-
Melbourne, Australia, 12-17 December 2007; IEEE Computer Society: Washington, DC, USA
-
Ekelhart, A.; Fenz, S.; Goluch, G.; Riedel, B.; Weippl, E. Information Security Fortification by Ontological Mapping of the ISO/IEC 27001 Standard. In Proceedings of the 13th Pacific Rim International Symposium on Dependable Computing, Melbourne, Australia, 12-17 December 2007; IEEE Computer Society: Washington, DC, USA; 2007; pp. 381-388,
-
(2007)
Proceedings of the 13th Pacific Rim International Symposium On Dependable Computing
, pp. 381-388
-
-
Ekelhart, A.1
Fenz, S.2
Goluch, G.3
Riedel, B.4
Weippl, E.5
-
25
-
-
80052184084
-
Ontological Approach to the Business Continuity Management System Development
-
Las Vegas, NV, USA, 12-15 July 2010; Arabnia, H., Daimi, K., Grimaila, M.R., Markowsky, G., Eds.; CSREA Press: Las Vegas, NV, USA
-
Bialas, A. Ontological Approach to the Business Continuity Management System Development. In Proceedings of the 2010 International Conference on Security and Management-SAM'10 (The World Congress in Applied Computing), Las Vegas, NV, USA, 12-15 July 2010; Arabnia, H., Daimi, K., Grimaila, M.R., Markowsky, G., Eds.; CSREA Press: Las Vegas, NV, USA, 2010; Volume 2, pp. 386-392.
-
(2010)
Proceedings of the 2010 International Conference On Security and Management-SAM'10 (The World Congress In Applied Computing)
, vol.2
, pp. 386-392
-
-
Bialas, A.1
-
26
-
-
84876678378
-
-
CSL-Computer Science Laboratory: Menlo Park, CA, USA, Available online, (accessed on 20 April 2011)
-
Security Ontologies in OWL; CSL-Computer Science Laboratory: Menlo Park, CA, USA, 2008. Available online: http://www.csl.sri.com/users/denker/owl-sec/ontologies/ (accessed on 20 April 2011).
-
(2008)
Security Ontologies In OWL
-
-
-
27
-
-
84876691804
-
-
Available online, (accessed on 20 April 2011)
-
DAML Services-Security and privacy, 2008. Available online: http://www.daml.org/services/owl-s/security.html (accessed on 20 April 2011).
-
(2008)
DAML Services-Security and Privacy
-
-
-
28
-
-
84876670955
-
-
Linköping University: Linköping, Sweden, Available online, (accessed on 20 April 2011)
-
Herzog's Security Ontology; Linköping University: Linköping, Sweden, 2006. Available online: http://www.ida.liu.se/~iislab/projects/secont/ (accessed on 20 April 2011).
-
(2006)
Herzog's Security Ontology
-
-
-
29
-
-
84876676602
-
-
Version 2.0; University of Maryland: College Park, MD, USA, Available online, (accessed on 20 April 2011)
-
REI Ontology Specifications, Version 2.0; University of Maryland: College Park, MD, USA, 2008. Available online: http://www.cs.umbc.edu/~lkagal1/rei/ (accessed on 20 April 2011).
-
(2008)
REI Ontology Specifications
-
-
-
30
-
-
33646699357
-
Security ontology for annotating resources
-
Springer: Berlin, Germany
-
Kim, A.; Luo, J.; Kang, M. Security ontology for annotating resources. In On the Move to Meaningful Internet Systems 2005: CoopIS, DOA, and ODBASE; Springer: Berlin, Germany, 2005; pp. 1483-1499.
-
(2005)
On the Move to Meaningful Internet Systems 2005: CoopIS, DOA, and ODBASE
, pp. 1483-1499
-
-
Kim, A.1
Luo, J.2
Kang, M.3
-
31
-
-
84869138544
-
An Ontological Approach Applied to Information Security and Trust
-
Toowoomba, QLD, Australia, 5-7 December
-
Vorobiev, A.; Bekmamedova, N. An Ontological Approach Applied to Information Security and Trust. In Proceedings of the 18th Australasian Conference on Information Systems, Toowoomba, QLD, Australia, 5-7 December 2007.
-
(2007)
Proceedings of the 18th Australasian Conference On Information Systems
-
-
Vorobiev, A.1
Bekmamedova, N.2
-
32
-
-
80052165073
-
-
Successful Common Criteria Evaluations-A Practical Guide for Vendors, CreateSpace: Lexington, KY, USA
-
Higaki, W.H. Successful Common Criteria Evaluations-A Practical Guide for Vendors; CreateSpace: Lexington, KY, USA, 2010.
-
(2010)
-
-
Higaki, W.H.1
-
33
-
-
57049165906
-
A Knowledge-Based Tool to Support Clear Relationship between Threats and Countermeasures Based on International Standards
-
APNOMS 2008, Beijing, China, 22-24 October 2008; Springer: Berlin, Germany
-
Ramirez-Caceres, G.H.; Teshigawara, Y. A Knowledge-Based Tool to Support Clear Relationship between Threats and Countermeasures Based on International Standards. In Proceedings of the 11th Asia-Pacific Network Operations and Management Symposium, APNOMS 2008, Beijing, China, 22-24 October 2008; Springer: Berlin, Germany, 2008; pp. 523-526.
-
(2008)
Proceedings of the 11th Asia-Pacific Network Operations and Management Symposium
, pp. 523-526
-
-
Ramirez-Caceres, G.H.1
Teshigawara, Y.2
-
34
-
-
84876682674
-
-
CCMODE (Common Criteria compliant, Modular, Open IT security Development Environment) Project; Available online, (accessed on 20 April 2011)
-
CCMODE (Common Criteria compliant, Modular, Open IT security Development Environment) Project; Available online: http://ccmode.emag.pl/ (accessed on 20 April 2011).
-
-
-
-
36
-
-
80052153969
-
Patterns improving the common criteria compliant IT security development process
-
Springer-Verlag: Berlin, Germany
-
Bialas, A. Patterns improving the common criteria compliant IT security development process. In Dependable Computer Systems (Advances in Intelligent and Soft Computing); Springer-Verlag: Berlin, Germany, 2011; Volume 97, pp. 1-16.
-
(2011)
Dependable Computer Systems (Advances In Intelligent and Soft Computing)
, vol.97
, pp. 1-16
-
-
Bialas, A.1
-
37
-
-
84872945690
-
-
Available online, (accessed on 24 June 2011)
-
SemanticWorks Semantic Web Tool. Available online: http://www.altova.com/semanticworks.html (accessed on 24 June 2011).
-
SemanticWorks Semantic Web Tool
-
-
-
38
-
-
84876694737
-
-
Available online, (accessed on 2 July 2011)
-
NeOn Toolkit. Available online: http://neon-toolkit.org/wiki/Main_Page (accessed on 2 July 2011).
-
NeOn Toolkit
-
-
-
39
-
-
84870830745
-
-
Available online, (accessed on 2 July 2011)
-
TopBraid Composer. Available online: http://www.topquadrant.com/products/TB_Suite.html (accessed on 2 July 2011).
-
TopBraid Composer
-
-
-
40
-
-
21544448034
-
-
1.3 ed.; The University of Manchester: Manchester, UK, Available online, (accessed on 2 July 2011)
-
Horridge, M. A Practical Guide To Building OWL Ontologies Using Protégé 4 and CO-ODE Tools, 1.3 ed.; The University of Manchester: Manchester, UK, 2011. Available online: http://owl.cs.manchester.ac.uk/tutorials/protegeowltutorial/ (accessed on 2 July 2011).
-
(2011)
A Practical Guide to Building OWL Ontologies Using Protégé 4 and CO-ODE Tools
-
-
Horridge, M.1
-
42
-
-
84876683797
-
-
W3C Semantic Web. Available online, (accessed on 2 July 2011)
-
W3C Semantic Web. Available online: http://www.w3.org/standards/semanticweb/ (accessed on 2 July 2011).
-
-
-
-
43
-
-
84876674276
-
-
D2R Server. Available online, (accessed on 24 June 2011)
-
D2R Server. Available online: http://www4.wiwiss.fu-berlin.de/bizer/d2r-server/ (accessed on 24 June 2011).
-
-
-
-
44
-
-
84876673637
-
-
Enterprise Architect. Available online, (accessed on 24 June 2011)
-
Enterprise Architect. Available online: http://www.sparxsystems.com/ (accessed on 24 June 2011).
-
-
-
|