Information Security Fortification by Ontological Mapping of the ISO/IEC 27001 Standard
暂无分享,去创建一个
Edgar R. Weippl | Stefan Fenz | Andreas Ekelhart | Gernot Goluch | Bernhard Riedl | E. Weippl | Bernhard Riedl | S. Fenz | G. Goluch | Andreas Ekelhart
[1] Charles L. Forgy,et al. Rete: A Fast Algorithm for the Many Patterns/Many Objects Match Problem , 1982, Artif. Intell..
[2] Thomas Peltier,et al. Information Technology: Code of Practice for Information Security Management , 2001 .
[3] Ernest Friedman Hill,et al. Jess in Action: Java Rule-Based Systems , 2003 .
[4] H. Lan,et al. SWRL : A semantic Web rule language combining OWL and ruleML , 2004 .
[5] Elena Paslaru Bontas Simperl,et al. OWL2Jess: A Transformational Implementation of the OWL Semantics , 2005, ISPA Workshops.
[6] Edgar R. Weippl,et al. Security Ontology: Simulating Threats to Corporate Assets , 2006, ICISS.
[7] Edgar R. Weippl,et al. Security Ontologies: Improving Quantitative Risk Analysis , 2007, 2007 40th Annual Hawaii International Conference on System Sciences (HICSS'07).
[8] Edgar R. Weippl,et al. Ontological Mapping of Common Criteria's Security Assurance Requirements , 2007, SEC.