Building a comprehensive and multi-dimensional information security ontology: elicitation process and OWL implementation

I Meriah, L Ben Arfa Rabai, R Khedri - Knowledge and Information …, 2024 - Springer
Ontology is an important tool that provides a full representation of domain knowledge. To
build ontology from heterogeneous data sources, a comprehensive process is required to …

An improved cloud-based business process compliance management system using a user-centered approach

AM Mustapha, OT Arogundade, A Abayomi-Alli… - International Journal of …, 2024 - Springer
Despite the advantages of cloud services, businesses still face compliance challenges.
Some have withdrawn from cloud services due to the inability to adhere completely to …

[PDF][PDF] Corda Security Ontology: Example of Post-Trade Matching and Confirmation.

M Iqbal, R Matulevičius - Baltic Journal of Modern Computing, 2020 - bjmc.lu.lv
Blockchain technology is ready to revolutionise the financial industry. The financial industry
has various security challenges (eg, tampering, repudiation, denial of service, etc). Also, the …

[PDF][PDF] A Reference Model for Security Risk Management of the Blockchain-based Applications.

M Iqbal - CAiSE (Doctoral Consortium), 2020 - researchgate.net
In order to realise the true potential of blockchain-based applications, the first step is to
understand the associated risks and vulnerabilities. Blockchain-based applications are …