2008 19th International Conference on Database and Expert Systems Applications 2008
DOI: 10.1109/dexa.2008.110
|View full text |Cite
|
Sign up to set email alerts
|

An Ontological Interface for Software Developers to Select Security Patterns

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2009
2009
2023
2023

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 21 publications
(8 citation statements)
references
References 7 publications
0
8
0
Order By: Relevance
“…Ontologies [28][29][30][31][32][33] are typically used to organize and structure context-specific terminology, which helps security analysts to classify and reason over security controls in regulatory documents. Ontologies, at their core, consist of a set of entities [34] that represent concrete concepts, or types of things, and a set of relations [34] that connect disparate concepts.…”
Section: Security Requirement Extraction and Modelingmentioning
confidence: 99%
See 1 more Smart Citation
“…Ontologies [28][29][30][31][32][33] are typically used to organize and structure context-specific terminology, which helps security analysts to classify and reason over security controls in regulatory documents. Ontologies, at their core, consist of a set of entities [34] that represent concrete concepts, or types of things, and a set of relations [34] that connect disparate concepts.…”
Section: Security Requirement Extraction and Modelingmentioning
confidence: 99%
“…These entities could be related together using common ontological relationships like is_a or part_of, e.g., John Lennon is_a Person who is part_of the Beatles. Applications of ontologies to the security lifecycle include assisting organizations in the security control selection and design-time software engineering process [33,35], providing support during the policy decision making process [36], enabling run-time adaptations (such as web service replacement) [37], and providing the building blocks for structuring regulatory terms and controls [38,39].…”
Section: Security Requirement Extraction and Modelingmentioning
confidence: 99%
“…The relationships used in their work are similar to the dependencies among security problem patterns suggested by Hatebur et al [15] . In [16], an ontological interface for software developers to select security patterns was proposed. The proposed interface contains a mapping between security requirements on the one side and threat models, security bugs, security errors on the other side taking into consideration their contexts of applicability.…”
Section: Review Of Security Pattern Selectionmentioning
confidence: 99%
“…The ontology "knows" which threats threaten which assets, and which security patterns could lower the probability of occurrence in which contexts. It is meaningful for the software developer to find the appropriate security patterns by adopting an ontology based approach [16] .…”
Section: Security Ontologymentioning
confidence: 99%
“…Our pattern-based approach consists in the creation of a pattern repository accompanied by a query mechanism [34] that helps application designers to select and customize the appropriate security solutions for their applications. In fact, such methodology homogenizes the quality of the security assurance for new applications and makes it independent from the expertise of the application developers.…”
Section: B Serenity Design Time and Runtime Frameworkmentioning
confidence: 99%