Building a comprehensive and multi-dimensional information security ontology: elicitation process and OWL implementation
Ontology is an important tool that provides a full representation of domain knowledge. To
build ontology from heterogeneous data sources, a comprehensive process is required to …
build ontology from heterogeneous data sources, a comprehensive process is required to …
An improved cloud-based business process compliance management system using a user-centered approach
Despite the advantages of cloud services, businesses still face compliance challenges.
Some have withdrawn from cloud services due to the inability to adhere completely to …
Some have withdrawn from cloud services due to the inability to adhere completely to …
[PDF][PDF] Corda Security Ontology: Example of Post-Trade Matching and Confirmation.
M Iqbal, R Matulevičius - Baltic Journal of Modern Computing, 2020 - bjmc.lu.lv
Blockchain technology is ready to revolutionise the financial industry. The financial industry
has various security challenges (eg, tampering, repudiation, denial of service, etc). Also, the …
has various security challenges (eg, tampering, repudiation, denial of service, etc). Also, the …
[PDF][PDF] A Reference Model for Security Risk Management of the Blockchain-based Applications.
M Iqbal - CAiSE (Doctoral Consortium), 2020 - researchgate.net
In order to realise the true potential of blockchain-based applications, the first step is to
understand the associated risks and vulnerabilities. Blockchain-based applications are …
understand the associated risks and vulnerabilities. Blockchain-based applications are …