메뉴 건너뛰기




Volumn 1, Issue 4, 2007, Pages 1-23

An Ontology of Information Security

Author keywords

computer science; information systems; is security; ontologies; software

Indexed keywords


EID: 85001799494     PISSN: 19301650     EISSN: 19301669     Source Type: Journal    
DOI: 10.4018/jisp.2007100101     Document Type: Article
Times cited : (163)

References (45)
  • 1
    • 0038443107 scopus 로고    scopus 로고
    • A new taxonomy of Web attacks suitable for efficient encoding
    • Álvarez, G., & Petrovic, S. (2003). A new taxonomy of Web attacks suitable for efficient encoding. Computers & Security, 22(5), 435–449.
    • (2003) Computers & Security , vol.22 , Issue.5 , pp. 435-449
    • Álvarez, G.1    Petrovic, S.2
  • 3
    • 0003516333 scopus 로고    scopus 로고
    • Intrusion detection systems: A survey and taxonomy
    • Department of Computer Engineering, Chalmers University of Technology
    • Axelsson, S. (2000). Intrusion detection systems: A survey and taxonomy (Tech. Rep. No. 99–15). Department of Computer Engineering, Chalmers University of Technology.
    • (2000) Tech. Rep. No. 99–15
    • Axelsson, S.1
  • 7
    • 0036871268 scopus 로고    scopus 로고
    • Internet infrastructure security: A taxonomy
    • Chakrabarti, A., & Manimaran, G. (2002). Internet infrastructure security: A taxonomy. IEEE Internet Computing, 16(6), 13–21.
    • (2002) IEEE Internet Computing , vol.16 , Issue.6 , pp. 13-21
    • Chakrabarti, A.1    Manimaran, G.2
  • 8
    • 84976766949 scopus 로고
    • The entity-relationship model: Toward a unified view of data
    • Chen, P.P.-S. (1976). The entity-relationship model: Toward a unified view of data. ACM Transactions on Database Systems (TODS), 1(1), 9–36.
    • (1976) ACM Transactions on Database Systems (TODS) , vol.1 , Issue.1 , pp. 9-36
    • Chen, P.P.-S.1
  • 9
    • 0033293396 scopus 로고    scopus 로고
    • Towards a taxonomy of intrusiondetection systems
    • Debar, H., Dacier, M., & Wespi, A. (1999). Towards a taxonomy of intrusiondetection systems. Computer Networks, 31, 805–822.
    • (1999) Computer Networks , vol.31 , pp. 805-822
    • Debar, H.1    Dacier, M.2    Wespi, A.3
  • 11
    • 33646148762 scopus 로고    scopus 로고
    • Toward a security ontology
    • Donner, M. (2003). Toward a security ontology. IEEE Security and Privacy, 1(3), 6–7.
    • (2003) IEEE Security and Privacy , vol.1 , Issue.3 , pp. 6-7
    • Donner, M.1
  • 12
    • 58149365542 scopus 로고
    • Toward principles for the design of ontologies used for knowledge sharing
    • Gruber, T. R. (1995). Toward principles for the design of ontologies used for knowledge sharing. International Journal of Human-Computer Studies, 43(5–6), 907–928.
    • (1995) International Journal of Human-Computer Studies , vol.43 , Issue.5-6 , pp. 907-928
    • Gruber, T.R.1
  • 15
    • 17444423290 scopus 로고    scopus 로고
    • Sociotechnical architecture for online privacy
    • Jutla, D. N., & Bodorik, P. (2005). Sociotechnical architecture for online privacy. IEEE Security and Privacy, 3(2), 29–39.
    • (2005) IEEE Security and Privacy , vol.3 , Issue.2 , pp. 29-39
    • Jutla, D.N.1    Bodorik, P.2
  • 17
    • 28944449676 scopus 로고    scopus 로고
    • Ontologies in bioinformatics and systems biology
    • In W. Dubitzky & F. Azuaje (Eds.) Springer-Verlag
    • Lambrix, P. (2004). Ontologies in bioinformatics and systems biology. In W. Dubitzky & F. Azuaje (Eds.), Artificial intelligence methods and tools for systems biology (pp. 129–146). Springer-Verlag.
    • (2004) Artificial intelligence methods and tools for systems biology , pp. 129-146
    • Lambrix, P.1
  • 26
    • 70350684549 scopus 로고    scopus 로고
    • Oxford Reference Online). Author
    • Oxford University Press. (2004). A dictionary of computing (Oxford Reference Online). Author.
    • (2004) A dictionary of computing
  • 35
    • 0034332545 scopus 로고    scopus 로고
    • Ontology-based knowledge representation for bioinformatics
    • Stevens, R., Goble, C. A., & Bechhofer, S. (2000). Ontology-based knowledge representation for bioinformatics. Briefings in Bioinformatics, 1(4), 398–414.
    • (2000) Briefings in Bioinformatics , vol.1 , Issue.4 , pp. 398-414
    • Stevens, R.1    Goble, C.A.2    Bechhofer, S.3
  • 40
    • 0038819499 scopus 로고    scopus 로고
    • A taxonomy for information security technologies
    • Venter, H. S., & Eloff, J. H. P. (2003). A taxonomy for information security technologies. Computers & Security, 22(4), 299–307.
    • (2003) Computers & Security , vol.22 , Issue.4 , pp. 299-307
    • Venter, H.S.1    Eloff, J.H.P.2
  • 41
    • 1942521938 scopus 로고    scopus 로고
    • Taxonomy of security considerations and software quality
    • Wang, H., & Wang, C. (2003). Taxonomy of security considerations and software quality. Communications of the ACM, 46(6), 75–78.
    • (2003) Communications of the ACM , vol.46 , Issue.6 , pp. 75-78
    • Wang, H.1    Wang, C.2
  • 44
    • 49049117728 scopus 로고    scopus 로고
    • Modeling and visualizing security properties of code using dependence graphs
    • Retrieved June 28, 2007, from http: //www.idt.mdh.se/serps-05/SERPS05.pdf
    • Wilander, J. (2005). Modeling and visualizing security properties of code using dependence graphs. In Proceedings of the 5th Conference on Software Engineering Research and Practice in Sweden (pp. 65–74). Retrieved June 28, 2007, from http: //www.idt.mdh.se/serps-05/SERPS05.pdf
    • (2005) In Proceedings of the 5th Conference on Software Engineering Research and Practice in Sweden , pp. 65-74
    • Wilander, J.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.