Sciweavers

10 search results - page 1 / 2
» Ontological Mapping of Information Security Best-Practice Gu...
Sort
View
BIS
2009
112views Business» more  BIS 2009»
13 years 2 months ago
Ontological Mapping of Information Security Best-Practice Guidelines
Abstract. Due to a rapid growth in the use of electronic data processing and networking, an information security management system with a holistic and widespread view becomes more ...
Stefan Fenz, Thomas Pruckner, Arman Manutscheri
SEC
2007
13 years 6 months ago
Ontological Mapping of Common Criteria's Security Assurance Requirements
The Common Criteria (CC) for Information Technology Security Evaluation provides comprehensive guidelines for the evaluation and certification of IT security regarding data securit...
Andreas Ekelhart, Stefan Fenz, Gernot Goluch, Edga...
CCS
2009
ACM
14 years 5 months ago
Formalizing information security knowledge
Unified and formal knowledge models of the information security domain are fundamental requirements for supporting and enhancing existing risk management approaches. This paper de...
Stefan Fenz, Andreas Ekelhart
CAISE
2004
Springer
13 years 10 months ago
A Step Towards Context Insensitive Quality Control for Ontology Building Methodologies
A methodology provides description of process and guidance for producing ontology that facilitates management of the enterprise engineering products. Method support in terms of det...
Sari Hakkarainen, Raimundas Matulevicius, Darijus ...
COOPIS
2004
IEEE
13 years 8 months ago
Learning Classifiers from Semantically Heterogeneous Data
Semantically heterogeneous and distributed data sources are quite common in several application domains such as bioinformatics and security informatics. In such a setting, each dat...
Doina Caragea, Jyotishman Pathak, Vasant Honavar