2013 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery 2013
DOI: 10.1109/cyberc.2013.20
|View full text |Cite
|
Sign up to set email alerts
|

A Security Ontology with MDA for Software Development

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
25
0
2

Year Published

2014
2014
2022
2022

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 23 publications
(27 citation statements)
references
References 16 publications
0
25
0
2
Order By: Relevance
“…Kang and Liang [214] propose an ontology-based method for MDA (ModelDriven Architecture). For this purpose, the authors develop a set of new ontologies: ontologies to support security analysis at the PIM (Platform Independent Model) level; ontologies to support security analysis at the PSM (Platform Specific Model) level; and ontologies to support security analysis at the code level.…”
Section: Ontology-based Approachesmentioning
confidence: 99%
See 1 more Smart Citation
“…Kang and Liang [214] propose an ontology-based method for MDA (ModelDriven Architecture). For this purpose, the authors develop a set of new ontologies: ontologies to support security analysis at the PIM (Platform Independent Model) level; ontologies to support security analysis at the PSM (Platform Specific Model) level; and ontologies to support security analysis at the code level.…”
Section: Ontology-based Approachesmentioning
confidence: 99%
“…asset identification) to support a system engineer by (semi-)automatically identifying security issues in a system model. Finally, we also provide a process for security experts to constantly enrich the ontology, while Kang and Liang [214] assume that the ontology will not evolve.…”
Section: Ontology-based Approachesmentioning
confidence: 99%
“…In [13] Kang & Liang present a security ontology, for use in the software development process. The proposed ontology can be used for identifying security requirements, as a practical and theoretical basis.…”
Section: Surveymentioning
confidence: 99%
“…Table 1 presents the keywords and the search string. [11]; [12]; [13]; [14]; [15,16]; [17]; [18]; [19]; [20]; [21]; [22]; [23]; [24]; [25]; [26]; [27]; [28]; [29]; [30]; [31]; [32]; [33]; [34]; [35]; [36]; [37]; [38]; [39]; [40]; [41]; [42]; [43]; [44]; [45]; [44]; [8]; [46]; [47]. Generic and abstract proposals (Top-Level Ontologies) can be found in [48], [3], [49], [50], and [51].…”
Section: Surveymentioning
confidence: 99%
“…Zhang, H. proposes the idea of using MDA so as developer focus on business logic more rather than the technical details [9]. Kang, W proposes the use of ontology in MDA for the software development for semantic disposing [10]. Martin first gives the idea of use of EUD i.e the end user intuitive ways to modify the original application according to user requirements [11].…”
Section: Related Workmentioning
confidence: 99%