2008 3rd International Conference on Information and Communication Technologies: From Theory to Applications 2008
DOI: 10.1109/ictta.2008.4530312
|View full text |Cite
|
Sign up to set email alerts
|

Ontology Development for Industrial Risk Analysis

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2009
2009
2018
2018

Publication Types

Select...
5
2

Relationship

1
6

Authors

Journals

citations
Cited by 14 publications
(4 citation statements)
references
References 4 publications
0
4
0
Order By: Relevance
“…In a very similar previous work by Denker et al [16,17,18], the proposed ontology fails to consider vulnerabilities, assets and threats; but a reasoning engine matches between the request requirements and the capabilities of a potential web service. The risk based security ontologies of Fenz et al [3] and Lenne et al [21] could be useful for a risk based requirement analysis. However, to the best of our knowledge, there are no propositions combining both sides.…”
Section: Discussion and Evaluationmentioning
confidence: 99%
See 1 more Smart Citation
“…In a very similar previous work by Denker et al [16,17,18], the proposed ontology fails to consider vulnerabilities, assets and threats; but a reasoning engine matches between the request requirements and the capabilities of a potential web service. The risk based security ontologies of Fenz et al [3] and Lenne et al [21] could be useful for a risk based requirement analysis. However, to the best of our knowledge, there are no propositions combining both sides.…”
Section: Discussion and Evaluationmentioning
confidence: 99%
“…Fenz et al [3] proposed a security ontology framework based on four parts (the security and dependability taxonomy from [10], the underlying risk analysis methodology, the concepts of the IT infrastructure domain, and a simulation enabling enterprises to analyze various policy scenarios). Lenne et al [21] proposed to develop a knowledge base containing ontologies for the analysis of industrial risks describing concepts used for the achievement of a risk analysis.…”
Section: Fig 1 Classification Of Security Ontologies Into 8 Familiesmentioning
confidence: 99%
“…The same scenario is followed by Maalel et al [70] to develop an ontological CBR system for railroad accidents application. Their methodology depended on [71,72] ontology development methodologies.…”
Section: B Ontologies As Case Base and Domain Vocabularymentioning
confidence: 99%
“…The sentence punctuation follows the bracket [2]. Refer simply to the reference number, as in [3]-do not use "Ref. [3]" or "reference [3]" except at the beginning of a sentence: "Reference [3] was the first .…”
Section: Referencesmentioning
confidence: 99%