2011
DOI: 10.3390/s110808085
|View full text |Cite
|
Sign up to set email alerts
|

Common Criteria Related Security Design Patterns for Intelligent Sensors—Knowledge Engineering-Based Implementation

Abstract: Intelligent sensors experience security problems very similar to those inherent to other kinds of IT products or systems. The assurance for these products or systems creation methodologies, like Common Criteria (ISO/IEC 15408) can be used to improve the robustness of the sensor systems in high risk environments. The paper presents the background and results of the previous research on patterns-based security specifications and introduces a new ontological approach. The elaborated ontology and knowledge base we… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
13
0

Year Published

2013
2013
2020
2020

Publication Types

Select...
5
1

Relationship

1
5

Authors

Journals

citations
Cited by 14 publications
(13 citation statements)
references
References 20 publications
(58 reference statements)
0
13
0
Order By: Relevance
“…However, we can identify works that address other research issues, namely: Requirements [16], [3], [27], [29]; Audit [17], [21], [23], [24]; Knowledge Management [12], [22], [34], [40].…”
Section: Discussion and Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…However, we can identify works that address other research issues, namely: Requirements [16], [3], [27], [29]; Audit [17], [21], [23], [24]; Knowledge Management [12], [22], [34], [40].…”
Section: Discussion and Related Workmentioning
confidence: 99%
“…Table 1 presents the keywords and the search string. [11]; [12]; [13]; [14]; [15,16]; [17]; [18]; [19]; [20]; [21]; [22]; [23]; [24]; [25]; [26]; [27]; [28]; [29]; [30]; [31]; [32]; [33]; [34]; [35]; [36]; [37]; [38]; [39]; [40]; [41]; [42]; [43]; [44]; [45]; [44]; [8]; [46]; [47]. Generic and abstract proposals (Top-Level Ontologies) can be found in [48], [3], [49], [50], and [51].…”
Section: Surveymentioning
confidence: 99%
“…This methodology was validated on an intelligent sensor for early detection of methane. The further formalization of the Common Criteria compliant security model was performed by applying the knowledge engineering methodology [ 12 ]. The IT Security Development Ontology (ITSDO), encompassing security patterns for sensors, has been elaborated according to the basic knowledge engineering rules [ 13 ] and with the use of the Protégé Ontology Editor and Knowledge Acquisition System developed at Stanford University [ 14 ].…”
Section: Introductionmentioning
confidence: 99%
“…The results of the R&D on ITSDO [ 12 ] were used as the input to the CCMODE project, especially to elaborate knowledge engines for the IT security development process (see the short CC primer in Section 1.1 ), evaluation evidences patterns, security models and other supporting tools.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation