Filters








27,103 Hits in 2.7 sec

Mapping the State of Security Standards Mappings [chapter]

Andrea Mussmann, University of Innsbruck, Department of Computer Science, Innsbruck, Austria, Michael Brunner, Ruth Breu
2020 WI2020 Zentrale Tracks  
To understand which requirements different security standards stipulate, a systematic overview or mapping of the relevant natural language security standards is necessary.  ...  Creating such standards mappings is a difficult task; to discover which methodologies and tools researchers and practitioners propose and use to map security standards, we conducted a systematic literature  ...  Acknowledgements This work has been partially sponsored by the Austrian Federal Ministry of Education, Science and Research by FFG Project 855383 SALSA "Living Safety&Security Cases for Cyber-Physical  ... 
doi:10.30844/wi_2020_l4-mussmann dblp:conf/wirtschaftsinformatik/MussmannBB20 fatcat:5qahcqaejrgbxhjl4vrrzfefzi

A Systematic Approach to Defining Nutritional Quality of Underutilised Crops

Razlin Azman Halimi, Bronwyn J. Barkla, Liliana Andrés-Hernandéz, Sean Mayes, Graham J. King
2020 Proceedings (MDPI)  
Using bambara groundnut (Vigna subterranea; BG) as a use-case, we present a systematic work-flow that facilitates comparison of nutritional composition and function for underutilised crops.  ...  This includes (i) critical literature review of available data sources for the target and comparator crops, to determine the extent of variation reported for a range of nutritional components; (ii) development  ...  Using bambara groundnut (Vigna subterranea; BG) as a use-case, we present a systematic work-flow that facilitates comparison of nutritional composition and function for underutilised crops.  ... 
doi:10.3390/proceedings2019036176 fatcat:js34ulm2nrfnbdpdcu3gxomixq

D2.3 –Ontology for identification and analysis of cascading effects

Miguel Mira da Silva, André Fernandes, Beatriz Toscano, Luís Sousa
2020 Zenodo  
among these concepts, to be used for identifying and analyzingcascading effects in organizationalecosystems.The ontology presented in this deliverable has the goal of providing a common understanding  ...  This document presentsthe analysis of the main terms and concepts related to the domain of Cascading Effectsin Critical Infrastructuresand the process followed to build an ontology that describes the relations  ...  Systematic Literature Review An SLR is a way to perform a literature review using a systematic manner to identify, analyze, and interpret all available information regarding a specific area, topic, or  ... 
doi:10.5281/zenodo.6107889 fatcat:u6wqxdusbvdkxauqmwk5xmblxm

A Domain Ontology on Cascading Effects in Critical Infrastructures based on a Systematic Literature Review

Flávia Santoro, Miguel Mira Da Silva, André Fernandes, Beatriz Toscano
2022 International Journal of Critical Infrastructures  
A systematic literature review (SLR) was used to obtain information, an essential part of the first phase of SaBiO. This research identified the main concepts in the domain of cascading effects.  ...  In this paper, a domain ontology of cascading effects was developed using the systematic approach to ontology construction (SaBiO) methodology, which provides guidelines for developing domain ontologies  ...  Acknowledgements The research work presented in this paper was undertaken in the scope of project ENSURESEC, which has received funding from the European Union's Horizon 2020 Research and Innovation Programme  ... 
doi:10.1504/ijcis.2022.10044304 fatcat:ohgfps2kzzd53ejdijguqvoew4

Conceptual Characterization of Cybersecurity Ontologies [chapter]

Beatriz F. Martins, Lenin Serrano, José F. Reyes, José Ignacio Panach, Oscar Pastor, Benny Rochwerger
2020 Lecture Notes in Business Information Processing  
The third contribution of the paper is the analysis of the results of the comparison of previous works in the field of Cybersecurity Ontologies.  ...  This article focus on dealing with Cybersecurity from an ontological perspective. The first contribution is a search of previously existing works that have defined Cybersecurity Ontologies.  ...  The systematic literature review [5] covers the ontologies at the Security domain. Their comparison criteria also focus on implementation in OWL, RDF, and DARPA Agent Markup Language (DAML) 8 .  ... 
doi:10.1007/978-3-030-63479-7_22 fatcat:4msphq33pzexhkujfbtrbql6ei

Author Index

2019 2019 International Conference on Informatics, Multimedia, Cyber and Information System (ICIMCIS)  
ISME.2 79 Serious Games for Children: A Systematic Literature Review ISME.1 131 Problem Based Learning Using Gamification: A Systematic Literature Review Rosyiq, Ahmad IF.1 91 Information  ...  Monoxide Levels in Smoker's Body Dabarsyah, Budiman ISME.2 79 Serious Games for Children: A Systematic Literature Review ISME.1 125 Problem Based Learning Using Gamification: A Systematic  ... 
doi:10.1109/icimcis48181.2019.8985220 fatcat:ytjzkbeyovfbbcagwqyavn53yu

A Further Analysis of the Importance of Systematic Reviews to Computer Science

osé Itamar Mendes de Souza Júnior, Valéria Martins Silva, David Nadler Prata, Patrick Letouze
2015 International Journal of Social Science and Humanity  
Only 54.9% of the papers declared in the keywords that it was a systematic review, and only 75.7% declared it in their title.  ...  This work provides a further analysis on the subject through a systematic review in the domain of Computer Science, which was performed using scientific papers databases relevant to Computer Science, from  ...  A systematic review of research on integration of ontologies with the model\&\#45;driven approach. Int. J. Metadata Semant. Ontologies 5, 2 (May 2010), 134-150.  ... 
doi:10.7763/ijssh.2015.v5.540 fatcat:m7whtbnvmraxjekn7ckhgjwvuq

Building problem domain ontology from security requirements in regulatory documents

Seok-Won Lee, Robin Gandhi, Divya Muthurajan, Deepak Yavagal, Gail-Joon Ahn
2006 Proceedings of the 2006 international workshop on Software engineering for secure systems - SESS '06  
We employ advanced ontological engineering processes as our primary modeling technique to represent complex and diverse characteristics of C&A security requirements and related domain knowledge.  ...  We apply our methodology to build problem domain ontology from regulatory documents enforced by the Department of Defense Information Technology Security Certification and Accreditation Process (DITSCAP  ...  of Navy, Charleston, SC.  ... 
doi:10.1145/1137627.1137635 dblp:conf/icse/LeeGMYA06 fatcat:dwhgos566zgxjbpqfbmhdsz6yu

A Review and Comparison of Service E-Contract Architecture Metamodels [chapter]

Ali Braytee, Asif Qumer Gill, Paul J. Kennedy, Farookh Khadeer Hussain
2015 Lecture Notes in Computer Science  
This paper presents a review and comparison of well-known e-contract metamodels using the architecture theory.  ...  There are a number of e-contract metamodels that can be used to create a context specic adaptive service e-contract. The challenge is which one to choose and adopt for adaptive services.  ...  A foundational ontology-driven approach, as proposed here, is one systematic way of researching and creating a metamodel and related template for adaptive services.  ... 
doi:10.1007/978-3-319-26561-2_69 fatcat:3hciuqazw5devgvon3ep2kbtc4

Ontological Meta-Analysis and Synthesis of HIPAA

Arkalgud Ramaprasad, Thant Syn, Khin Than Win
2014 Social Science Research Network  
We present ontological meta-analysis and synthesis of HIPAA (Health Insurance Portability and Accountability Act) as a method for reviewing, mapping, and visualizing the research literature in the domain  ...  We conclude with a discussion of how such a map can be used to realign HIPAA research and practice.  ...  The method is new and in its early stages of development. In the future we propose to systematically address some of the weaknesses mentioned above.  ... 
doi:10.2139/ssrn.2461113 fatcat:ntlvaeljinhlfn4ssmn7rt3xa4

Reusable knowledge in security requirements engineering: a systematic mapping study

Amina Souag, Raúl Mazo, Camille Salinesi, Isabelle Comyn-Wattiau
2015 Requirements Engineering  
The mapping study was a literature review conducted with the goal of identifying, analyzing and categorizing state of the art research on our topic.  ...  Over the last two decades, researchers and engineers have developed a considerable number of methods for security requirements engineering. Some of them rely on the (re) use of security knowledge.  ...  [108] propose a systematic review about security requirements in the cloud computing. However, none of these existing reviews tackled the specific issue of "knowledge reuse".  ... 
doi:10.1007/s00766-015-0220-8 fatcat:5udeoele2vgtlgt32klw3jvo6q

Towards evidence-based ontology for supporting systematic literature review

Yueming Sun, Ye Yang, He Zhang, Wen Zhang, Qing Wang
2012 16th International Conference on Evaluation & Assessment in Software Engineering (EASE 2012)  
[Conclusions]: The approach of using ontology could effectively and efficiently support the conducting of systematic literature review.  ...  Keywords-systematic literature review; ontology; structured abstract; software cost estimation I.  ...  Then we propose a specification extension of SLRONT on cost estimation systematic review, and build the structure of COSt estimation ONTology (COSONT).  ... 
doi:10.1049/ic.2012.0022 dblp:conf/ease/SunYZZW12 fatcat:nanzynuqcbfvld2l6bg35dfjwm

Towards Evidence-Based Ontology for Supporting Systematic Literature Review [article]

Yueming Sun, Ye Yang, He Zhang, Wen Zhang, Qing Wang
2016 arXiv   pre-print
[Conclusions]: The approach of using ontology could effectively and efficiently support the conducting of systematic literature review.  ...  [Method]: First, we propose an ontology, SLRONT, built on SLR experiences and best practices as a groundwork to capture common terminologies and their relationships during SLR processes; second, we present  ...  Then we propose a specification extension of SLRONT on cost estimation systematic review, and build the structure of COSt estimation ONTology (COSONT).  ... 
arXiv:1609.08049v1 fatcat:vwt52ulr4jgdxgysp7amkvtroa

Supporting the Comparison of Business-Level Security Requirements within Cross-Enterprise Service Development [chapter]

Jason R. C. Nurse, Jane E. Sinclair
2009 Lecture Notes in Business Information Processing  
This ontology will act as the basis for a future tool to state requirements and factors which influenced them, in a common, formal format, to allow for easier analysis and comparison across enterprises  ...  For businesses planning interactions online, particularly those using Web services, managing risks and accommodating each other's varying business-level security requirements is a complex but critical  ...  assets and services to be protected; (ii) analysis of their innate vulnerabilities; and (iii) a review of the security threats which endanger the assets.  ... 
doi:10.1007/978-3-642-01190-0_6 fatcat:pisxwbrau5d3phrly3sinmpmau

How Good Is a Security Policy against Real Breaches? A HIPAA Case Study

Ozgur Kafali, Jasmine Jones, Megan Petruso, Laurie Williams, Munindar P. Singh
2017 2017 IEEE/ACM 39th International Conference on Software Engineering (ICSE)  
We propose SEMAVER, a framework for determining coverage of breaches by policies via comparison of individual policy clauses and breach descriptions. We represent a security policy as a set of norms.  ...  Our research goal is to help analysts measure the gaps between security policies and reported breaches by developing a systematic process based on semantic reasoning.  ...  ACKNOWLEDGMENTS This research is supported by the US Department of Defense under the Science of Security Lablet grant.  ... 
doi:10.1109/icse.2017.55 dblp:conf/icse/KafaliJPWS17 fatcat:g7bzwgi6kzas3i32w25rfjreoy
« Previous Showing results 1 — 15 out of 27,103 results