-
3
-
-
33845468685
-
Ontology Development 101: A Guide to Creating Your First Ontology
-
Noy, N.F., McGuiness, D.L.: Ontology Development 101: A Guide to Creating Your First Ontology, Knowledge Systems Laboratory (2001), http://www-ksl.stanford.edu/people/dlm/papers/ontology-tutorial-noy-mcguinness-abstract.html
-
(2001)
Knowledge Systems Laboratory
-
-
Noy, N.F.1
McGuiness, D.L.2
-
4
-
-
85019452220
-
Common Criteria Requirements Modeling and its Uses for Quality of Information Assurance (QoIA)
-
Yavagal, D.S., Lee, S.W., Ahn, G.-J., Gandhi, R.A.: Common Criteria Requirements Modeling and its Uses for Quality of Information Assurance (QoIA). In: Proc. of the 43rd Annual ACM Southeast Conference (ACMSE 2005), vol. 2, pp. 130–135 (2005)
-
(2005)
Proc. of the 43Rd Annual ACM Southeast Conference (ACMSE 2005)
, pp. 130-135
-
-
Yavagal, D.S.1
Lee, S.W.2
Ahn, G.-J.3
Gandhi, R.A.4
-
5
-
-
36249017853
-
Ontological Mapping of Common Criteria’s Security Assurance Requirements
-
Venter, H., Eloff, M., Labuschagne, L., Eloff, J., von Solms, R. (eds.) , Springer, Boston
-
Ekelhart, A., Fenz, S., Goluch, G., Weippl, E.: Ontological Mapping of Common Criteria’s Security Assurance Requirements. In: Venter, H., Eloff, M., Labuschagne, L., Eloff, J., von Solms, R. (eds.) New Approaches for Security, Privacy and Trust in Complex Environments. IFIP, vol. 232, pp. 85–95. Springer, Boston (2007)
-
(2007)
New Approaches for Security, Privacy and Trust in Complex Environments. IFIP
, vol.232
, pp. 85-95
-
-
Ekelhart, A.1
Fenz, S.2
Goluch, G.3
Weippl, E.4
-
8
-
-
62749155242
-
Security Ontology for Annotating Resources
-
Kim, A., Luo, J., Kang, M.: Security Ontology for Annotating Resources, Naval Research Laboratory, Washington (2005), http://chacs.nrl.navy.mil/publications/CHACS/2005/2005kim-NRLOntologyFinal.pdf
-
(2005)
Naval Research Laboratory, Washington
-
-
Kim, A.1
Luo, J.2
Kang, M.3
-
9
-
-
38349123642
-
A Goal Oriented Approach for Modeling and Analyzing Security Trade-Offs
-
Parent, C., Schewe, K.-D., Storey, V.C., Thalheim, B. (eds.), Springer, Heidelberg
-
Elahi, G., Yu, E.: A Goal Oriented Approach for Modeling and Analyzing Security Trade-Offs. In: Parent, C., Schewe, K.-D., Storey, V.C., Thalheim, B. (eds.) ER 2007. LNCS, vol. 4801, pp. 375–390. Springer, Heidelberg (2007)
-
(2007)
ER 2007. LNCS
, vol.4801
, pp. 375-390
-
-
Elahi, G.1
Yu, E.2
-
10
-
-
50049109224
-
Information Security Fortification by Ontological Mapping of the ISO/IEC 27001 Standard
-
IEEE Computer Society, Los Alamitos
-
Ekelhart, A., Fenz, S., Goluch, G., Riedel, B., Klemen, M., Weippl, E.: Information Security Fortification by Ontological Mapping of the ISO/IEC 27001 Standard. In: Proc. of the 13th Pacific Rim Int. Symp. on Dependable Computing, Washington DC, USA, pp. 381–388. IEEE Computer Society, Los Alamitos (2007), http://publik.tuwien.ac.at/files/pub-inf_4689.pdf
-
(2007)
Proc. of the 13Th Pacific Rim Int. Symp. on Dependable Computing, Washington DC, USA
, pp. 381-388
-
-
Ekelhart, A.1
Fenz, S.2
Goluch, G.3
Riedel, B.4
Klemen, M.5
Weippl, E.6
-
11
-
-
39749101462
-
Security Ontologies: Improving Quantitative Risk Analysis
-
IEEE Computer Society Press, Los Alamitos
-
Ekelhart, A., Fenz, S., Klemen, M., Weippl, E.: Security Ontologies: Improving Quantitative Risk Analysis. In: Proceedings of the 40th Hawaii International Conference on System Sciences, Big Island, Hawaii, pp. 156–162. IEEE Computer Society Press, Los Alamitos (2007)
-
(2007)
Proceedings of the 40Th Hawaii International Conference on System Sciences, Big Island, Hawaii
, pp. 156-162
-
-
Ekelhart, A.1
Fenz, S.2
Klemen, M.3
Weippl, E.4
-
12
-
-
33646150432
-
An Ontology-Based Approach to Information Systems Security Management
-
Gorodetsky, V., Kotenko, I., Skormin, V.A. (eds.) , Springer, Heidelberg
-
Tsoumas, B., Dritsas, S., Gritzalis, D.: An Ontology-Based Approach to Information Systems Security Management. In: Gorodetsky, V., Kotenko, I., Skormin, V.A. (eds.) MMM-ACNS 2005. LNCS, vol. 3685, pp. 151–164. Springer, Heidelberg (2005)
-
(2005)
MMM-ACNS 2005. LNCS
, vol.3685
, pp. 151-164
-
-
Tsoumas, B.1
Dritsas, S.2
Gritzalis, D.3
-
14
-
-
36049040298
-
Semiformal Approach to the IT Security Development
-
Zamojski, W., Mazurkiewicz, J., Sugier, J., Walkowiak, T. (eds.) , IEEE Computer Society, Los Alamitos
-
Bialas, A.: Semiformal Approach to the IT Security Development. In: Zamojski, W., Mazurkiewicz, J., Sugier, J., Walkowiak, T. (eds.) Proc. of the Int. Conf. on Dependability of Comp. Sys. DepCoS-RELCOMEX 2007, pp. 3–11. IEEE Computer Society, Los Alamitos (2007)
-
(2007)
Proc. of the Int. Conf. on Dependability of Comp. Sys. Depcos-Relcomex 2007
, pp. 3-11
-
-
Bialas, A.1
-
15
-
-
70350143738
-
Semiformal Common Criteria Compliant IT Security Development Framework
-
Bialas, A.: Semiformal Common Criteria Compliant IT Security Development Framework. Studia Informatica 29 2B(77) (2008), http://www.znsi.aei.polsl.pl/
-
(2008)
Studia Informatica
, vol.2B
, Issue.77
, pp. 29
-
-
Bialas, A.1
-
16
-
-
62749100602
-
Ontology-based Approach to the Common Criteria Compliant IT Security Development
-
In: Arabnia, H., Aissi, S., Bedworth, M. (eds.), CSREA Press (2008)
-
Bialas, A.: Ontology-based Approach to the Common Criteria Compliant IT Security Development. In: Arabnia, H., Aissi, S., Bedworth, M. (eds.) Proc. of the 2008 International Conf. on Security and Management (WORLDCOMP 2008), Las Vegas, pp. 586–592. CSREA Press (2008) ISBN#1-60132-085-X
-
Proc. of the 2008 International Conf. on Security and Management (WORLDCOMP 2008), Las Vegas
, pp. 586-592
-
-
Bialas, A.1
-
17
-
-
70449650807
-
Ontology-based Security Problem Definition and Solution for the Common Criteria Compliant Development Process
-
IEEE Computer Society, Los Alamitos
-
Bialas, A.: Ontology-based Security Problem Definition and Solution for the Common Criteria Compliant Development Process. In: Proc. of the Int. Conf. on Dependability of Comp. Sys. DepCoS-RELCOMEX 2009, pp. 3–10. IEEE Computer Society, Los Alamitos (2009)
-
(2009)
Proc. of the Int. Conf. on Dependability of Comp. Sys. Depcos-Relcomex 2009
, pp. 3-10
-
-
Bialas, A.1
-
19
-
-
70350138685
-
Security-related design patterns for intelligent sensors requiring measurable assurance
-
R.85 NR 7/2009
-
Bialas, A.: Security-related design patterns for intelligent sensors requiring measurable assurance. Przeglad Elektrotechniczny (Electrical Review), 92–99 (2009); R.85 NR 7/2009, ISSN 0033-2097
-
(2009)
Przeglad Elektrotechniczny (Electrical Review)
, pp. 92-99
-
-
Bialas, A.1
-
21
-
-
71949109544
-
(EC) No.1360/2002 on recording equipment in road transport, Annex 1B Requirements for Construction, Testing, Installation and Inspection
-
Commission Regulation (EC) No.1360/2002 on recording equipment in road transport, Annex 1B Requirements for Construction, Testing, Installation and Inspection. Official Journal of the EC, L 207, pp. 204–252 (2002)
-
(2002)
Official Journal of the EC, L 207
, pp. 204-252
-
-
Regulation, C.1
|