메뉴 건너뛰기




Volumn 14, Issue 6, 2013, Pages 935-946

Comprehensive security integrated model and ontology within cloud computing

Author keywords

Cloud computing; Knowledge base; Knowledge engineering; Network attack classification; Ontology

Indexed keywords

ANTI-VIRUS SYSTEMS; CONFIGURABLE COMPUTING; INTEGRATED MODELING; KNOWLEDGE BASE; NETWORK ATTACK; NETWORK SECURITY PROBLEMS; SECURITY THREATS; TRADITIONAL COMPUTERS;

EID: 84890372403     PISSN: 16079264     EISSN: 20794029     Source Type: Journal    
DOI: 10.6138/JIT.2013.14.6.08     Document Type: Article
Times cited : (10)

References (28)
  • 1
    • 84863520750 scopus 로고    scopus 로고
    • On-demand security architecture for cloud computing
    • Jianyong Chen, Yang Wang and Xiaomin Wang, On-Demand Security Architecture for Cloud Computing, Computer, Vol.45, No.7, 2012, pp.73-78.
    • (2012) Computer , vol.45 , Issue.7 , pp. 73-78
    • Chen, J.1    Wang, Y.2    Wang, X.3
  • 2
    • 79953657305 scopus 로고    scopus 로고
    • Understanding cloud computing vulnerabilities
    • Bernd Grobauer, Tobias Walloschek and Elmar Stöcker, Understanding Cloud Computing Vulnerabilities, IEEE Security & Privacy, Vol.9, No.2, 2011, pp.50-57.
    • (2011) IEEE Security & Privacy , vol.9 , Issue.2 , pp. 50-57
    • Grobauer, B.1    Walloschek, T.2    Stöcker, E.3
  • 3
    • 84862907810 scopus 로고    scopus 로고
    • Security challenges for the public cloud
    • Kui Ren, Cong Wang and Qian Wang, Security Challenges for the Public Cloud, IEEE Internet Computing, Vol.16, No.1, 2012, pp.69-73.
    • (2012) IEEE Internet Computing , vol.16 , Issue.1 , pp. 69-73
    • Ren, K.1    Wang, C.2    Wang, Q.3
  • 7
    • 84890392723 scopus 로고    scopus 로고
    • Stanford Center for Biomedical Informatics Research
    • Stanford Center for Biomedical Informatics Research, What is Protégé?, 2013, protege.stanford.edu/overview/
    • (2013) What is Protégé?
  • 8
    • 16344386685 scopus 로고
    • What is there to worry about? An introduction to the computer security problem
    • Marshall D. Abrams, Sushil Jajodia and Harold J. Podell (Eds.), IEEE Computer Society Press, Los Alamitos, CA
    • Donald L. Brinkley and Roger R. Schell, What Is There to Worry About? An Introduction to the Computer Security Problem. Marshall D. Abrams, Sushil Jajodia and Harold J. Podell (Eds.), Information Security: An Integrated Collection of Essays, IEEE Computer Society Press, Los Alamitos, CA, 1995, pp.11-40.
    • (1995) Information Security: An Integrated Collection of Essays , pp. 11-40
    • Brinkley, D.L.1    Schell, R.R.2
  • 10
    • 0030701247 scopus 로고    scopus 로고
    • Information system attacks: A preliminary classification scheme
    • Fred Cohen, Information System Attacks: A Preliminary Classification Scheme, Computers & Security, Vol.16, No.1, 1997, pp.29-46.
    • (1997) Computers & Security , vol.16 , Issue.1 , pp. 29-46
    • Cohen, F.1
  • 11
    • 0030674941 scopus 로고    scopus 로고
    • Information system defenses: A preliminary classification scheme
    • Fred Cohen, Information System Defenses: A Preliminary Classification Scheme, Computers & Security, Vol.16, No.2, 1997, pp.94-114.
    • (1997) Computers & Security , vol.16 , Issue.2 , pp. 94-114
    • Cohen, F.1
  • 12
    • 0038443107 scopus 로고    scopus 로고
    • A new taxonomy of web attacks suitable for efficient encoding
    • Gonzalo Álvarez and Slobodan Petrović, A New Taxonomy of Web Attacks Suitable for Efficient Encoding, Computers & Security, Vol.22, No.5, 2003, pp.435-449.
    • (2003) Computers & Security , vol.22 , Issue.5 , pp. 435-449
    • Álvarez, G.1    Petrović, S.2
  • 13
    • 15944369564 scopus 로고    scopus 로고
    • Classification of computer attacks using a self-organizing map
    • West Point, NY, June
    • L. L. DeLooze, Classification of Computer Attacks Using a Self-Organizing Map, Proceedings of the Fifth Annual IEEE SMC, West Point, NY, June, 2004, pp.365-369.
    • (2004) Proceedings Of The Fifth Annual IEEE SMC , pp. 365-369
    • DeLooze, L.L.1
  • 14
    • 84890357557 scopus 로고    scopus 로고
    • Internet attacks and protection mechanisms
    • Chih-Ching Chang and Ying-Dar Lin, Internet Attacks and Protection Mechanisms, Network Magazine Taiwan, 2000, http://speed.cis.nctu.edu.tw/~ydlin/ miscpub/hack-antihack.pdf
    • (2000) Network Magazine Taiwan
    • Chang, C.-C.1    Lin, Y.-D.2
  • 16
    • 84890326683 scopus 로고    scopus 로고
    • Taiwan Information & Communication Security Technology Center
    • Taiwan Information & Communication Security Technology Center, Security Bulletins, 2012, http://www.icst.org.tw/NewsRSS.aspx?RSSType= news&lang=en.
    • (2012) Security Bulletins
  • 17
    • 35148839490 scopus 로고
    • A translation approach to portable ontology specifications
    • Thomas R. Gruber, A Translation Approach to Portable Ontology Specifications, Knowledge Acquisition, Vol.5, No.2, 1993, pp.199-220.
    • (1993) Knowledge Acquisition , vol.5 , Issue.2 , pp. 199-220
    • Gruber, T.R.1
  • 20
    • 0031079258 scopus 로고    scopus 로고
    • Understanding, building and using ontologies
    • Nicola Guarino, Understanding, Building and Using Ontologies, International Journal of Human-Computer Studies, Vol.46, No.2-3, 1997, pp.293-310.
    • (1997) International Journal of Human-Computer Studies , vol.46 , Issue.2-3 , pp. 293-310
    • Guarino, N.1
  • 23
    • 36649031620 scopus 로고    scopus 로고
    • A concept-level ontology construction method for automatic summarization
    • Hei-Chia Wang, Chia-Tzung Liu and Tian-Hsiang Huang, A Concept-Level Ontology Construction Method for Automatic Summarization, Journal of Internet Technology, Vol.8, No.4, 2007, pp.381-387.
    • (2007) Journal of Internet Technology , vol.8 , Issue.4 , pp. 381-387
    • Wang, H.-C.1    Liu, C.-T.2    Huang, T.-H.3
  • 24
    • 84863806403 scopus 로고    scopus 로고
    • A context awareness and prediction support system for efficient management of u-city
    • Jae-Hyuk Cho, A Context Awareness and Prediction Support System for Efficient Management of U-City, Journal of Internet Technology, Vol.13, No.3, 2012, pp.509-520.
    • (2012) Journal of Internet Technology , vol.13 , Issue.3 , pp. 509-520
    • Cho, J.-H.1
  • 25
    • 84890318030 scopus 로고    scopus 로고
    • Master's Thesis, Management College of National Defense University, Taipei, Taiwan
    • Wan-Shu Hung, An Ontology-based IT Security Model, Master's Thesis, Management College of National Defense University, Taipei, Taiwan, 2006.
    • (2006) An Ontology-based IT Security Model
    • Hung, W.-S.1
  • 27
    • 78650593518 scopus 로고    scopus 로고
    • An ontology-driven model for digital forensics investigations of computer incidents under the ubiquitous computing environments
    • Hai-Cheng Chu, Der-Jiunn Deng and Han-Chieh Chao, An Ontology-driven Model for Digital Forensics Investigations of Computer Incidents under the Ubiquitous Computing Environments, Wireless Personal Communications, Vol.56, No.1, 2011, pp.5-19.
    • (2011) Wireless Personal Communications , vol.56 , Issue.1 , pp. 5-19
    • Chu, H.-C.1    Deng, D.-J.2    Chao, H.-C.3
  • 28
    • 77950996667 scopus 로고    scopus 로고
    • Constructing enterprise information network security risk management mechanism by ontology
    • Fong-Hao Liu and Wei-Tsong Lee, Constructing Enterprise Information Network Security Risk Management Mechanism by Ontology, Tamkang Journal of Science and Engineering, Vol.13, No.1, 2010, pp.79-87.
    • (2010) Tamkang Journal of Science and Engineering , vol.13 , Issue.1 , pp. 79-87
    • Liu, F.-H.1    Lee, W.-T.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.