메뉴 건너뛰기




Volumn 64, Issue , 2009, Pages 261-269

Ontological approach to the IT security development

Author keywords

[No Author keywords available]

Indexed keywords

KNOWLEDGE BASED SYSTEMS; SECURITY OF DATA; SECURITY SYSTEMS;

EID: 80052987496     PISSN: 18675662     EISSN: 18600794     Source Type: Book Series    
DOI: 10.1007/978-3-642-05019-0_28     Document Type: Chapter
Times cited : (5)

References (22)
  • 3
    • 33845468685 scopus 로고    scopus 로고
    • Ontology Development 101: A Guide to Creating Your First Ontology
    • Noy, N.F., McGuiness, D.L.: Ontology Development 101: A Guide to Creating Your First Ontology, Knowledge Systems Laboratory (2001), http://www-ksl.stanford.edu/people/dlm/papers/ontology-tutorial-noy-mcguinness-abstract.html
    • (2001) Knowledge Systems Laboratory
    • Noy, N.F.1    McGuiness, D.L.2
  • 5
    • 36249017853 scopus 로고    scopus 로고
    • Ontological Mapping of Common Criteria’s Security Assurance Requirements
    • Venter, H., Eloff, M., Labuschagne, L., Eloff, J., von Solms, R. (eds.) , Springer, Boston
    • Ekelhart, A., Fenz, S., Goluch, G., Weippl, E.: Ontological Mapping of Common Criteria’s Security Assurance Requirements. In: Venter, H., Eloff, M., Labuschagne, L., Eloff, J., von Solms, R. (eds.) New Approaches for Security, Privacy and Trust in Complex Environments. IFIP, vol. 232, pp. 85–95. Springer, Boston (2007)
    • (2007) New Approaches for Security, Privacy and Trust in Complex Environments. IFIP , vol.232 , pp. 85-95
    • Ekelhart, A.1    Fenz, S.2    Goluch, G.3    Weippl, E.4
  • 8
    • 62749155242 scopus 로고    scopus 로고
    • Security Ontology for Annotating Resources
    • Kim, A., Luo, J., Kang, M.: Security Ontology for Annotating Resources, Naval Research Laboratory, Washington (2005), http://chacs.nrl.navy.mil/publications/CHACS/2005/2005kim-NRLOntologyFinal.pdf
    • (2005) Naval Research Laboratory, Washington
    • Kim, A.1    Luo, J.2    Kang, M.3
  • 9
    • 38349123642 scopus 로고    scopus 로고
    • A Goal Oriented Approach for Modeling and Analyzing Security Trade-Offs
    • Parent, C., Schewe, K.-D., Storey, V.C., Thalheim, B. (eds.), Springer, Heidelberg
    • Elahi, G., Yu, E.: A Goal Oriented Approach for Modeling and Analyzing Security Trade-Offs. In: Parent, C., Schewe, K.-D., Storey, V.C., Thalheim, B. (eds.) ER 2007. LNCS, vol. 4801, pp. 375–390. Springer, Heidelberg (2007)
    • (2007) ER 2007. LNCS , vol.4801 , pp. 375-390
    • Elahi, G.1    Yu, E.2
  • 12
    • 33646150432 scopus 로고    scopus 로고
    • An Ontology-Based Approach to Information Systems Security Management
    • Gorodetsky, V., Kotenko, I., Skormin, V.A. (eds.) , Springer, Heidelberg
    • Tsoumas, B., Dritsas, S., Gritzalis, D.: An Ontology-Based Approach to Information Systems Security Management. In: Gorodetsky, V., Kotenko, I., Skormin, V.A. (eds.) MMM-ACNS 2005. LNCS, vol. 3685, pp. 151–164. Springer, Heidelberg (2005)
    • (2005) MMM-ACNS 2005. LNCS , vol.3685 , pp. 151-164
    • Tsoumas, B.1    Dritsas, S.2    Gritzalis, D.3
  • 14
    • 36049040298 scopus 로고    scopus 로고
    • Semiformal Approach to the IT Security Development
    • Zamojski, W., Mazurkiewicz, J., Sugier, J., Walkowiak, T. (eds.) , IEEE Computer Society, Los Alamitos
    • Bialas, A.: Semiformal Approach to the IT Security Development. In: Zamojski, W., Mazurkiewicz, J., Sugier, J., Walkowiak, T. (eds.) Proc. of the Int. Conf. on Dependability of Comp. Sys. DepCoS-RELCOMEX 2007, pp. 3–11. IEEE Computer Society, Los Alamitos (2007)
    • (2007) Proc. of the Int. Conf. on Dependability of Comp. Sys. Depcos-Relcomex 2007 , pp. 3-11
    • Bialas, A.1
  • 15
    • 70350143738 scopus 로고    scopus 로고
    • Semiformal Common Criteria Compliant IT Security Development Framework
    • Bialas, A.: Semiformal Common Criteria Compliant IT Security Development Framework. Studia Informatica 29 2B(77) (2008), http://www.znsi.aei.polsl.pl/
    • (2008) Studia Informatica , vol.2B , Issue.77 , pp. 29
    • Bialas, A.1
  • 16
    • 62749100602 scopus 로고    scopus 로고
    • Ontology-based Approach to the Common Criteria Compliant IT Security Development
    • In: Arabnia, H., Aissi, S., Bedworth, M. (eds.), CSREA Press (2008)
    • Bialas, A.: Ontology-based Approach to the Common Criteria Compliant IT Security Development. In: Arabnia, H., Aissi, S., Bedworth, M. (eds.) Proc. of the 2008 International Conf. on Security and Management (WORLDCOMP 2008), Las Vegas, pp. 586–592. CSREA Press (2008) ISBN#1-60132-085-X
    • Proc. of the 2008 International Conf. on Security and Management (WORLDCOMP 2008), Las Vegas , pp. 586-592
    • Bialas, A.1
  • 17
    • 70449650807 scopus 로고    scopus 로고
    • Ontology-based Security Problem Definition and Solution for the Common Criteria Compliant Development Process
    • IEEE Computer Society, Los Alamitos
    • Bialas, A.: Ontology-based Security Problem Definition and Solution for the Common Criteria Compliant Development Process. In: Proc. of the Int. Conf. on Dependability of Comp. Sys. DepCoS-RELCOMEX 2009, pp. 3–10. IEEE Computer Society, Los Alamitos (2009)
    • (2009) Proc. of the Int. Conf. on Dependability of Comp. Sys. Depcos-Relcomex 2009 , pp. 3-10
    • Bialas, A.1
  • 19
    • 70350138685 scopus 로고    scopus 로고
    • Security-related design patterns for intelligent sensors requiring measurable assurance
    • R.85 NR 7/2009
    • Bialas, A.: Security-related design patterns for intelligent sensors requiring measurable assurance. Przeglad Elektrotechniczny (Electrical Review), 92–99 (2009); R.85 NR 7/2009, ISSN 0033-2097
    • (2009) Przeglad Elektrotechniczny (Electrical Review) , pp. 92-99
    • Bialas, A.1
  • 21
    • 71949109544 scopus 로고    scopus 로고
    • (EC) No.1360/2002 on recording equipment in road transport, Annex 1B Requirements for Construction, Testing, Installation and Inspection
    • Commission Regulation (EC) No.1360/2002 on recording equipment in road transport, Annex 1B Requirements for Construction, Testing, Installation and Inspection. Official Journal of the EC, L 207, pp. 204–252 (2002)
    • (2002) Official Journal of the EC, L 207 , pp. 204-252
    • Regulation, C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.