Employing Ontologies for the Development of Security Critical Applications: The secure e-poll paradigm

S Dritsas, L Gymnopoulos, M Karyda… - … of Expanding Internet: E …, 2005 - Springer
Incorporating security in the application development process is a fundamental requirement
for building secure applications, especially with regard to security sensitive domains, such …

Towards a comprehensive framework for secure systems development

H Mouratidis, J Jürjens, J Fox - … 2006, Luxembourg, Luxembourg, June 5-9 …, 2006 - Springer
Security involves technical as well as social challenges. In the development of security-
critical applications, system developers must consider both the technical and the social …

Security in the Semantic Web using OWL

G Denker, L Kagal, T Finin - Information Security Technical Report, 2005 - Elsevier
Information assurance, security, and privacy have moved from narrow topics of interest to
information system designers to become critical issues of fundamental importance to society …

A security ontology for security requirements elicitation

A Souag, C Salinesi, R Mazo… - … Secure Software and …, 2015 - Springer
Security is an important issue that needs to be taken into account at all stages of information
system development, including early requirements elicitation. Early analysis of security …

Supporting security requirements engineering through the development of the secure development ontology

J Steinmann, O Ochoa - 2022 IEEE 16th International …, 2022 - ieeexplore.ieee.org
Security: the forgotten requirement. With the coming of the digital age comes new
challenges to protect assets. Security of systems has become the top priority for many …

[PDF][PDF] The design, instantiation, and usage of information security measuring ontology

A Evesti, R Savola, E Ovaska, J Kuusijärvi - MOPAS 2011, The Second …, 2011 - Citeseer
Measuring security is a complex task and requires a great deal of knowledge. Managing this
knowledge and presenting it in a universal way is challenging. This paper describes the …

A framework for conceptual characterization of ontologies and its application in the cybersecurity domain

BF Martins, LJ Serrano Gil, JF Reyes Román… - Software and Systems …, 2022 - Springer
Organizations are actively seeking efficient solutions for the management and protection of
their assets. However, Cybersecurity is a vast and complex domain, especially for large …

[PDF][PDF] An Ontology for Secure Web Applications.

M Busch, M Wirsing - Int. J. Softw. Informatics, 2015 - pmi.pst.ifi.lmu.de
It is commonly known that most applications suffer from security holes that are sooner or
later exploited. One reason is that for developers the term “security” is difficult to grasp. Many …

The stac (security toolbox: attacks & countermeasures) ontology

A Gyrard, C Bonnet, K Boudaoud - Proceedings of the 22nd International …, 2013 - dl.acm.org
We present a security ontology to help non-security expert software designers or developers
to:(1) design secure software and,(2) to understand and be aware of main security concepts …

Ontology-based policy specification and management

W Nejdl, D Olmedilla, M Winslett, CC Zhang - The Semantic Web …, 2005 - Springer
Abstract The World Wide Web makes it easy to share information and resources, but offers
few ways to limit the manner in which these resources are shared. The specification and …