Toward principles for the design of ontologies used for knowledge sharing
International Journal of Human-Computer Studies - Special issue: the role of formal ontology in the information technology
Ontobroker: Ontology Based Access to Distributed and Semi-Structured Information
DS-8 Proceedings of the IFIP TC2/WG2.6 Eighth Working Conference on Database Semantics- Semantic Issues in Multimedia Systems
Towards an Ontology-based Security Management
AINA '06 Proceedings of the 20th International Conference on Advanced Information Networking and Applications - Volume 01
The provenance of electronic data
Communications of the ACM - The psychology of security: why do good users make bad decisions?
A Systematic Review and Comparison of Security Ontologies
ARES '08 Proceedings of the 2008 Third International Conference on Availability, Reliability and Security
Formalizing information security knowledge
Proceedings of the 4th International Symposium on Information, Computer, and Communications Security
OVM: an ontology for vulnerability management
Proceedings of the 5th Annual Workshop on Cyber Security and Information Intelligence Research: Cyber Security and Information Intelligence Challenges and Strategies
An information security ontology incorporating human-behavioural implications
Proceedings of the 2nd international conference on Security of information and networks
Security Data Mining in an Ontology for Vulnerability Management
IJCBS '09 Proceedings of the 2009 International Joint Conference on Bioinformatics, Systems Biology and Intelligent Computing
Security in the Semantic Web using OWL
Information Security Tech. Report
Building ontology of cybersecurity operational information
Proceedings of the Sixth Annual Workshop on Cyber Security and Information Intelligence Research
An ontology-based approach to information systems security management
MMM-ACNS'05 Proceedings of the Third international conference on Mathematical Methods, Models, and Architectures for Computer Network Security
CYBEX: the cybersecurity information exchange framework (x.1500)
ACM SIGCOMM Computer Communication Review
Review: An intrusion detection and prevention system in cloud computing: A systematic review
Journal of Network and Computer Applications
Taxonomy and proposed architecture of intrusion detection and prevention systems for cloud computing
CSS'12 Proceedings of the 4th international conference on Cyberspace Safety and Security
Risk visualization and alerting system: architecture and proof-of-concept implementation
Proceedings of the first international workshop on Security in embedded systems and smartphones
Hi-index | 0.00 |
Widespread deployment of the Internet enabled building of an emerging IT delivery model, i.e., cloud computing. Albeit cloud computing-based services have rapidly developed, their security aspects are still at the initial stage of development. In order to preserve cybersecurity in cloud computing, cybersecurity information that will be exchanged within it needs to be identified and discussed. For this purpose, we propose an ontological approach to cybersecurity in cloud computing. We build an ontology for cybersecurity operational information based on actual cybersecurity operations mainly focused on non-cloud computing. In order to discuss necessary cybersecurity information in cloud computing, we apply the ontology to cloud computing. Through the discussion, we identify essential changes in cloud computing such as data-asset decoupling and clarify the cybersecurity information required by the changes such as data provenance and resource dependency information.