2005
DOI: 10.1007/11575801_34
|View full text |Cite
|
Sign up to set email alerts
|

Security Ontology for Annotating Resources

Abstract: Public reporting burden for this collection of information is estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing this collection of information. Send comments regarding this burden estimate or any other aspect of this collection of information, including suggestions for reducing this burden to Department of Defense, Washington Headquarters Services, Directorate for Info… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
62
0

Year Published

2006
2006
2022
2022

Publication Types

Select...
5
3
2

Relationship

0
10

Authors

Journals

citations
Cited by 105 publications
(62 citation statements)
references
References 6 publications
0
62
0
Order By: Relevance
“…On the technical level, the plan is to keep the ontology up to date and perform the necessary migrations to the latest available versions (OWL/Protégé). Kim et al [40] Undercoffer et al [17] Geneiataki s et al [18] Denker et al [ …”
Section: Discussionmentioning
confidence: 99%
“…On the technical level, the plan is to keep the ontology up to date and perform the necessary migrations to the latest available versions (OWL/Protégé). Kim et al [40] Undercoffer et al [17] Geneiataki s et al [18] Denker et al [ …”
Section: Discussionmentioning
confidence: 99%
“…Previous research in relation to applying ontologies to the security domain had primarily focused on security classifications and tended to go no further than providing abstract taxonomy's [12,13]. However, our research provides, in conjunction with providing an explicit specification and basic DL reasoning from a taxonomy perspective, inferences at a lower level of granularity.…”
Section: Related Researchmentioning
confidence: 99%
“…Other specific security ontologies are proposed by D. Geneiatakis et al [19] (designed for describing Session Initiation Protocol security flaws), by M. Karyda et al [20] (dedicated for describing applications of e-government), by J. Undercoffer et al [21] (designed for describing computer attacks), by A. Souag [22] (designed for requirements engineering process) and by other authors. A. Kim extended specific ontologies and created one which can be applied to any electronic resource [23]. However this ontology does not overlay all the concepts of information security.…”
Section: Security Ontologymentioning
confidence: 99%