Towards Automated Secure Web Service Execution
NETWORKING '09 Proceedings of the 8th International IFIP-TC 6 Networking Conference
Middleware for Automated Implementation of Security Protocols
ESWC 2009 Heraklion Proceedings of the 6th European Semantic Web Conference on The Semantic Web: Research and Applications
Trust-terms ontology for defining security requirements and metrics
Proceedings of the Fourth European Conference on Software Architecture: Companion Volume
Towards micro architecture for security adaptation
Proceedings of the Fourth European Conference on Software Architecture: Companion Volume
Towards an abstraction layer for security assurance measurements: (invited paper)
Proceedings of the Fourth European Conference on Software Architecture: Companion Volume
Ontological approach toward cybersecurity in cloud computing
Proceedings of the 3rd international conference on Security of information and networks
Enforcing security in semantics driven policy based networks
Computer Standards & Interfaces
Aligning Semantic Web applications with network access controls
Computer Standards & Interfaces
SecurOntology: A semantic web access control framework
Computer Standards & Interfaces
A DSL for specifying autonomic security management strategies
DPM'10/SETOP'10 Proceedings of the 5th international Workshop on data privacy management, and 3rd international conference on Autonomous spontaneous security
Basis for an integrated security ontology according to a systematic review of existing proposals
Computer Standards & Interfaces
Hi-index | 0.00 |
The use of ontologies for representing knowledge provides us with organization, communication and reusability. Information security is a serious requirement which must be carefully considered. Concepts and relations managed by any scientific community need to be formally defined and ontological engineering supports their definition. In this paper, the method of systematic review is applied with the purpose of identifying, extracting and analyzing the main proposals for security ontologies. The main identified proposals are compared using a formal framework and we conclude by stating their early state of development and the need of additional research efforts.