Toward principles for the design of ontologies used for knowledge sharing
International Journal of Human-Computer Studies - Special issue: the role of formal ontology in the information technology
Software engineering for security: a roadmap
Proceedings of the Conference on The Future of Software Engineering
Extracting focused knowledge from the semantic web
International Journal of Human-Computer Studies
Ontology in information security: a useful theoretical foundation and methodological tool
Proceedings of the 2001 workshop on New security paradigms
Security Engineering: A Guide to Building Dependable Distributed Systems
Security Engineering: A Guide to Building Dependable Distributed Systems
Information Security Management: Global Challenges in the New Millennium
Information Security Management: Global Challenges in the New Millennium
Managing Information Security Risks: The Octave Approach
Managing Information Security Risks: The Octave Approach
Building a Chemical Ontology Using Methontology and the Ontology Design Environment
IEEE Intelligent Systems
A cooperative framework for integrating ontologies
International Journal of Human-Computer Studies
RE '02 Proceedings of the 10th Anniversary IEEE Joint International Conference on Requirements Engineering
Using Abuse Case Models for Security Requirements Analysis
ACSAC '99 Proceedings of the 15th Annual Computer Security Applications Conference
IEEE Security and Privacy
Jess in Action: Java Rule-Based Systems
Jess in Action: Java Rule-Based Systems
The PROMPT suite: interactive tools for ontology merging and mapping
International Journal of Human-Computer Studies
Basic Concepts and Taxonomy of Dependable and Secure Computing
IEEE Transactions on Dependable and Secure Computing
Achieving Privacy in Trust Negotiations with an Ontology-Based Approach
IEEE Transactions on Dependable and Secure Computing
Secure information sharing enabled by Trusted Computing and PEI models
ASIACCS '06 Proceedings of the 2006 ACM Symposium on Information, computer and communications security
Towards an Ontology-based Security Management
AINA '06 Proceedings of the 20th International Conference on Advanced Information Networking and Applications - Volume 01
An ontology for secure e-government applications
ARES '06 Proceedings of the First International Conference on Availability, Reliability and Security
Building problem domain ontology from security requirements in regulatory documents
Proceedings of the 2006 international workshop on Software engineering for secure systems
Security Attack Ontology for Web Services
SKG '06 Proceedings of the Second International Conference on Semantics, Knowledge, and Grid
Ontology based IT-security planning
PRDC '06 Proceedings of the 12th Pacific Rim International Symposium on Dependable Computing
An ontology description for SIP security flaws
Computer Communications
Visual modeling and formal specification of constraints of RBAC using semantic web technology
Knowledge-Based Systems
Towards the design of intelligent CAD systems: An ontological approach
Advanced Engineering Informatics
Security Ontologies: Improving Quantitative Risk Analysis
HICSS '07 Proceedings of the 40th Annual Hawaii International Conference on System Sciences
An Integrated QoS-Aware Service Development and Management Framework
WICSA '07 Proceedings of the Sixth Working IEEE/IFIP Conference on Software Architecture
Bringing Semantics to Web Services with OWL-S
World Wide Web
Integrating Security and Software Engineering: Advances and Future Vision
Integrating Security and Software Engineering: Advances and Future Vision
Advanced Methods for Inconsistent Knowledge Management (Advanced Information and Knowledge Processing)
Integration of an Ontological Information Security Concept in Risk Aware Business Process Management
HICSS '08 Proceedings of the Proceedings of the 41st Annual Hawaii International Conference on System Sciences
A Domain-Independent Ontology for Non-Functional Requirements
ICEBE '07 Proceedings of the IEEE International Conference on e-Business Engineering
Information Security Fortification by Ontological Mapping of the ISO/IEC 27001 Standard
PRDC '07 Proceedings of the 13th Pacific Rim International Symposium on Dependable Computing
A Systematic Review and Comparison of Security Ontologies
ARES '08 Proceedings of the 2008 Third International Conference on Availability, Reliability and Security
OntoArch Approach for Reliability-Aware Software Architecture Development
COMPSAC '08 Proceedings of the 2008 32nd Annual IEEE International Computer Software and Applications Conference
OntoSPIT: SPIT management through ontologies
Computer Communications
AURUM: A Framework for Information Security Risk Management
HICSS '09 Proceedings of the 42nd Hawaii International Conference on System Sciences
Formalizing information security knowledge
Proceedings of the 4th International Symposium on Information, Computer, and Communications Security
Security Ontology Proposal for Mobile Applications
MDM '09 Proceedings of the 2009 Tenth International Conference on Mobile Data Management: Systems, Services and Middleware
An information security ontology incorporating human-behavioural implications
Proceedings of the 2nd international conference on Security of information and networks
A service-centric model for intrusion detection in next-generation networks
Computer Standards & Interfaces
Security standards for the semantic web
Computer Standards & Interfaces
Applications of Ontology in Management of Information Asset
IIH-MSP '09 Proceedings of the 2009 Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing
Dynamic security reconfiguration for the semantic web
Engineering Applications of Artificial Intelligence
Security in the Semantic Web using OWL
Information Security Tech. Report
Ontology-based generation of IT-security metrics
Proceedings of the 2010 ACM Symposium on Applied Computing
Information systems development: a trust ontology
OTM'07 Proceedings of the 2007 OTM confederated international conference on On the move to meaningful internet systems - Volume Part I
Evaluating the semantic web: a task-based approach
ISWC'07/ASWC'07 Proceedings of the 6th international The semantic web and 2nd Asian conference on Asian semantic web conference
Security ontology to facilitate web service description and discovery
Journal on data semantics IX
SecurOntology: A semantic web access control framework
Computer Standards & Interfaces
Security ontology for annotating resources
OTM'05 Proceedings of the 2005 OTM Confederated international conference on On the Move to Meaningful Internet Systems: CoopIS, COA, and ODBASE - Volume Part II
Security ontology: simulating threats to corporate assets
ICISS'06 Proceedings of the Second international conference on Information Systems Security
SABUMO: Towards a collaborative and semantic framework for knowledge sharing
Expert Systems with Applications: An International Journal
Towards an ontology modeling tool. A validation in software engineering scenarios
Expert Systems with Applications: An International Journal
Future Generation Computer Systems
International Journal of Internet Technology and Secured Transactions
Hi-index | 0.00 |
The use of ontologies to represent knowledge provides us with organization, communication and reusability. The concepts and relations managed by any scientific community need to be formally defined. Since security in information technologies has evolved as a critical aspect and many related topics have been developed, this paper applies the method of systematic review for identifying, extracting and analyzing the principal proposals for security ontologies. The most mature proposals have been selected and compared by using a formal framework, extracting the key requirements that an integrated and unified security ontology should have, and providing the first steps towards its definition.