2013 IEEE 37th Annual Computer Software and Applications Conference Workshops 2013
DOI: 10.1109/compsacw.2013.124
|View full text |Cite
|
Sign up to set email alerts
|

Using Security and Domain Ontologies for Security Requirements Analysis

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
20
0

Year Published

2013
2013
2021
2021

Publication Types

Select...
4
3

Relationship

3
4

Authors

Journals

citations
Cited by 23 publications
(20 citation statements)
references
References 10 publications
0
20
0
Order By: Relevance
“…The focus was mainly on security ontologies that have been used in security requirements engineering [9][10] [11][12].…”
Section: Discussionmentioning
confidence: 99%
See 2 more Smart Citations
“…The focus was mainly on security ontologies that have been used in security requirements engineering [9][10] [11][12].…”
Section: Discussionmentioning
confidence: 99%
“…Several research studies have addressed the issue of knowledge for the field of security [7] [8]. The research presented in this paper is part of a larger ongoing research project that aims at proposing a method that exploits ontologies for security requirements engineering [9]. In [9], a small security ontology was first used for the elicitation and analysis of security requirements.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…the lack of information security knowledge, deficiency of training for eliciting security requirements, lack of domain knowledge, absence of a domain model), some methods were proposed in the literature [8] [19]. However, they remain too general, in the sense that they are for general problem domains where problem-specific domain knowledge is not used and that they do not support explicitly the utilization of domain knowledge [9].…”
Section: Introductionmentioning
confidence: 99%
“…Security experts can join the requirements engineers while using the method to validate some requirements, although lot of their expertise is formalized into the security ontology. This paper presents the AMAN-DA method (though some primary versions of it are reported in prior early works on the project in [9] and [27]). The paper reports the evaluation of the method's utility and effectiveness using a case study related to the maritime domain followed by an experiment with experts to assess the method's usefulness.…”
Section: Introductionmentioning
confidence: 99%