Ontology-based network management: study cases and lessons learned
JE López de Vergara, A Guerrero, VA Villagrá… - Journal of Network and …, 2009 - Springer
Ontology based network management has recently evolved from a theoretical proposal to a
more mature technology. As such, it is now being applied in many research projects in a …
more mature technology. As such, it is now being applied in many research projects in a …
An ontology-based approach to react to network attacks
N Cuppens-Boulahia, F Cuppens… - … of Information and …, 2009 - inderscienceonline.com
Intrusion detection requirements enforced by Intrusions Detection Systems (IDSs) are
generally considered independently from the remainder of the security policy. Our approach …
generally considered independently from the remainder of the security policy. Our approach …
ToCo: an ontology for representing hybrid telecommunication networks
The TOUCAN project proposed an ontology for telecommunication networks with hybrid
technologies–the TOUCAN Ontology (ToCo), available at http://purl. org/toco/, as well as a …
technologies–the TOUCAN Ontology (ToCo), available at http://purl. org/toco/, as well as a …
Deriving implementation-level policies for usage control enforcement
P Kumari, A Pretschner - Proceedings of the second ACM conference on …, 2012 - dl.acm.org
Usage control is concerned with how data is used after access to it has been granted. As
such, it is particularly relevant to end users who own the data. System implementations of …
such, it is particularly relevant to end users who own the data. System implementations of …
Model-based specification and refinement of usage control policies
In existing usage control policy frameworks, policies consisting of authorizations and
obligations are specified at a low level of abstraction. As a consequence, these policy …
obligations are specified at a low level of abstraction. As a consequence, these policy …
Model-based usage control policy derivation
P Kumari, A Pretschner - … Symposium on Engineering Secure Software and …, 2013 - Springer
Usage control is concerned with how data is used after access to it has been granted. In
existing usage control enforcement frameworks, policies are assumed to exist and the …
existing usage control enforcement frameworks, policies are assumed to exist and the …
[PDF][PDF] Ontology-driven knowledge based autonomic management for telecommunication networks: theory, implementation, and applications
Q Zhou - 2018 - core.ac.uk
Current telecommunication networks are heterogeneous, with devices manufactured by
different vendors, operating on different protocols, and recorded by databases with different …
different vendors, operating on different protocols, and recorded by databases with different …
[PDF][PDF] Use of Ontologies for the Definition of Alerts and Policies in a Network Security Platform.
JEL de Vergara, E Vázquez, A Martin, S Dubus… - J. Networks, 2009 - Citeseer
A quick and efficient reaction to an attack is important to address the evolution of security
incidents in current communication networks. The ReD (Reaction after Detection) project's …
incidents in current communication networks. The ReD (Reaction after Detection) project's …
Semantic aware processing of user defined inference rules to manage home networks
AI Rana, B Jennings - Journal of Network and Computer Applications, 2017 - Elsevier
Increasing complexity makes it difficult for users to manage their home networks in a way
that optimises their experience when using rich multimedia services. Current network …
that optimises their experience when using rich multimedia services. Current network …
An approach for knowledge-based IT management of air traffic control systems
F Meyer, R Kroeger, R Heidger… - Proceedings of the 9th …, 2013 - ieeexplore.ieee.org
In this paper, an approach for runtime analysis and automated knowledge-based IT
management is presented and applied to the example of an Air Traffic Control (ATC) system …
management is presented and applied to the example of an Air Traffic Control (ATC) system …