Revisiting security ontologies

V Singh, SK Pandey - International Journal of Computer …, 2014 - search.proquest.com
… of cloud computing security, one of which is ontology. In this paper, a critical study of security
ontologies has been accomplished in which these ontologies have been further classified …

A systematic review and comparison of security ontologies

C Blanco, J Lasheras… - … and Security, 2008 - ieeexplore.ieee.org
… to propose a security ontology with which to develop secure applications. It captures the
security knowledge of experts to support the communication between security experts, users …

States and ontological security: A historical rethinking

A Zarakol - Cooperation and conflict, 2017 - journals.sagepub.com
… to assume that all ‘states’ seek ontological security: this generalisation applies only to those
… the concept of ontological security to a synonym for ‘state identity’ – ontological security can …

The security assessment domain: a survey of taxonomies and ontologies

FF Rosa, R Bonacin, M Jino - arXiv preprint arXiv:1706.09772, 2017 - arxiv.org
… of the security domain. Thus, this paper presents a literature survey on ontologies and
taxonomies concerning the Security … This study addresses the question: which security ontology is …

Basis for an integrated security ontology according to a systematic review of existing proposals

C Blanco, J Lasheras, E Fernández-Medina… - Computer Standards & …, 2011 - Elsevier
… define a general purpose security ontology, to define a security ontology focused on a certain
… formally define an ontology. As can be seen in Table 3, although security ontologies with a …

Towards an ontological approach to information system security and safety requirement modeling and reuse

OT Arogundade, AT Akinwale, Z Jin… - Information Security …, 2012 - Taylor & Francis
… Building a use-misuse case ontology will allow each of the concepts to be semantically … In
addition, the ontology presented in this paper defines safety and security concepts in a unified …

Concepts and relationships in safety and security ontologies: A comparative study

M Adach, K Hänninen… - 2022 6th International …, 2022 - ieeexplore.ieee.org
… Sawyer, “Revisiting ontology-based requirements engineering in the age of the semantic
web,” International Seminar on Dependable Requirements Engineering of Computerised …

A comparative study of cloud security ontologies

V Singh, SK Pandey - Proceedings of 3rd International …, 2014 - ieeexplore.ieee.org
… lacking in security sphere as there is no specification, which ontology should … Security
Ontology. This paper presents a brief discussion on five major ontologies namely: Cloud Ontology

Modelling reusable security requirements based on an ontology framework

JL Velasco, R Valencia-García… - Journal of Research …, 2009 - search.informit.org
… has constraints of which threat can be occurred to which asset, so in the security requirements
ontology we can infer if a threat associated to a requirement can be inconsistent with the …

Security ontology for annotating resources

A Kim, J Luo, M Kang - On the Move to Meaningful Internet Systems 2005 …, 2005 - Springer
security requirements. This paper presents the NRL Security Ontology, which complements
existing ontologies … Types of security information that could be described include mechanisms…