Revisiting security ontologies
… of cloud computing security, one of which is ontology. In this paper, a critical study of security
ontologies has been accomplished in which these ontologies have been further classified …
ontologies has been accomplished in which these ontologies have been further classified …
A systematic review and comparison of security ontologies
C Blanco, J Lasheras… - … and Security, 2008 - ieeexplore.ieee.org
… to propose a security ontology with which to develop secure applications. It captures the
security knowledge of experts to support the communication between security experts, users …
security knowledge of experts to support the communication between security experts, users …
States and ontological security: A historical rethinking
A Zarakol - Cooperation and conflict, 2017 - journals.sagepub.com
… to assume that all ‘states’ seek ontological security: this generalisation applies only to those
… the concept of ontological security to a synonym for ‘state identity’ – ontological security can …
… the concept of ontological security to a synonym for ‘state identity’ – ontological security can …
The security assessment domain: a survey of taxonomies and ontologies
… of the security domain. Thus, this paper presents a literature survey on ontologies and
taxonomies concerning the Security … This study addresses the question: which security ontology is …
taxonomies concerning the Security … This study addresses the question: which security ontology is …
Basis for an integrated security ontology according to a systematic review of existing proposals
… define a general purpose security ontology, to define a security ontology focused on a certain
… formally define an ontology. As can be seen in Table 3, although security ontologies with a …
… formally define an ontology. As can be seen in Table 3, although security ontologies with a …
Towards an ontological approach to information system security and safety requirement modeling and reuse
OT Arogundade, AT Akinwale, Z Jin… - Information Security …, 2012 - Taylor & Francis
… Building a use-misuse case ontology will allow each of the concepts to be semantically … In
addition, the ontology presented in this paper defines safety and security concepts in a unified …
addition, the ontology presented in this paper defines safety and security concepts in a unified …
Concepts and relationships in safety and security ontologies: A comparative study
M Adach, K Hänninen… - 2022 6th International …, 2022 - ieeexplore.ieee.org
… Sawyer, “Revisiting ontology-based requirements engineering in the age of the semantic
web,” International Seminar on Dependable Requirements Engineering of Computerised …
web,” International Seminar on Dependable Requirements Engineering of Computerised …
A comparative study of cloud security ontologies
… lacking in security sphere as there is no specification, which ontology should … Security
Ontology. This paper presents a brief discussion on five major ontologies namely: Cloud Ontology…
Ontology. This paper presents a brief discussion on five major ontologies namely: Cloud Ontology…
Modelling reusable security requirements based on an ontology framework
JL Velasco, R Valencia-García… - Journal of Research …, 2009 - search.informit.org
… has constraints of which threat can be occurred to which asset, so in the security requirements
ontology we can infer if a threat associated to a requirement can be inconsistent with the …
ontology we can infer if a threat associated to a requirement can be inconsistent with the …
Security ontology for annotating resources
… security requirements. This paper presents the NRL Security Ontology, which complements
existing ontologies … Types of security information that could be described include mechanisms…
existing ontologies … Types of security information that could be described include mechanisms…
相关搜索
- security ontology existing proposals
- security ontology software development
- systematic literature review security ontologies
- information system security ontological approach
- information security ontological mapping
- ontological security in international relations
- ontological security studies
- securitization of identity ontological security
- ontological security in world politics
- historical rethinking ontological security
- dynamics of crisis ontological security
- state personhood ontological security
- embodied state ontological security
- peace building ontological security
- ontology framework reusable security requirements
- extended ontology security requirements