An Ontological Approach Applied to Information Security and Trust
暂无分享,去创建一个
[1] P. Pettit. The Cunning of Trust , 1995 .
[2] Joobin Choobineh,et al. Trust in electronic commerce: definition and theoretical considerations , 1998, Proceedings of the Thirty-First Hawaii International Conference on System Sciences.
[3] Dan Brickley,et al. Resource description framework (RDF) schema specification , 1998 .
[4] Michael Uschold,et al. The Enterprise Ontology , 1998, The Knowledge Engineering Review.
[5] James A. Hendler,et al. The semantic Web and its languages , 2000 .
[6] N. F. Noy,et al. Ontology Development 101: A Guide to Creating Your First Ontology , 2001 .
[7] Khaled M. Khan,et al. A security characterisation framework for trustworthy component based software systems , 2003, Proceedings 27th Annual International Computer Software and Applications Conference. COMPAC 2003.
[8] James Michael Stewart,et al. CISSP: Certified Information Systems Security Professional Study Guide, 2nd Edition , 2004 .
[9] Timothy W. Finin,et al. A Target-Centric Ontology for Intrusion Detection , 2003, IJCAI 2003.
[10] Gerardo A. Guerra,et al. Economics of Trust in the Information Economy: Issues of Identity, Privacy and Security , 2003 .
[11] Grit Denker,et al. OWL-S Semantics of Security Web Services: a Case Study , 2004, ESWS.
[12] P. Ratnasingam. E‐Commerce relationships: The impact of trust on relationship continuity , 2005 .
[13] Robert C. Seacord,et al. A Structured Approach to Classifying Security Vulnerabilities , 2005 .
[14] Myong H. Kang,et al. Security Ontology for Annotating Resources , 2005, OTM Conferences.
[15] Jun Han,et al. Security Attack Ontology for Web Services , 2006, SKG.
[16] Luciana Andréia Fondazzi Martimiano,et al. The Evaluation Process of a Computer Security Incident Ontology , 2006, WONTO.
[17] Jun Han,et al. Specifying Dynamic Security Properties of Web Service Based Systems , 2006, SKG.
[18] 肖欣,et al. CISSP学习工具和策略如何通过Certified Information Systems Security Professional考试 , 2008 .