IFIP International Federation for Information Processing
DOI: 10.1007/0-387-29773-1_13
|View full text |Cite
|
Sign up to set email alerts
|

Employing Ontologies for the Development of Security Critical Applications

Abstract: Abstract:Key words:Incorporating security in the application development process is a fundamental requirement for building secure applications, especially with regard to security sensitive domains, such as e-government. In this paper we follow a novel approach to demonstrate how the process of developing an e-poll application can be substantially facilitated by employing a specialized security ontology. To accomplish this, we describe the security ontology we have developed, and provide a set of indicative que… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
20
0

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 11 publications
(20 citation statements)
references
References 9 publications
0
20
0
Order By: Relevance
“…[4] use ontologies to develop a secure application; they use the ontologies to answer questions about the requirements but not to guide the actual design.…”
Section: Discussion and Related Workmentioning
confidence: 99%
“…[4] use ontologies to develop a secure application; they use the ontologies to answer questions about the requirements but not to guide the actual design.…”
Section: Discussion and Related Workmentioning
confidence: 99%
“…Dritsas et al [215] develop an ontology with an intention to support design and development of e-commerce systems. However, the support is limited to asking a proper competence questions formulated by a system engineer.…”
Section: Ontology-based Approachesmentioning
confidence: 99%
“…Their analysis applies to any internet voting system but focuses on implementation aspects and does not use a conceptual model as reference to enumerate threats. Dritsas et al (2005) propose the use of ontologies to build secure systems and applies them to a secure e-polling system. The authors don't separate clearly analysis from design aspects and their threat analysis is not systematic.…”
Section: Related Workmentioning
confidence: 99%