References
- J. E. Ibarra-Esquer, F. l. F. Gonzalez-Navarro, B. L. Flores-Rios, L. Burtseva, and M. A. Astorga-Vargas, "Tracking the evolution of the internet of things concept across different application domains," Sensors, vol. 17, p. 1379, 2017.
- M. James, M. Chui, P. Bisson, J. Woetzel, R. Dobbs, J. Bughin, and D. Aharon, "The internet of things: Mapping the value beyond the hype," McKinsey Global Institute, vol. 3, 2015.
- T. R. Gruber, "A translation approach to portable ontology specifications," Knowledge acquisition, vol. 5, pp. 199-220, 1993. https://doi.org/10.1006/knac.1993.1008
- D. L. McGuinness and F. Van Harmelen, "OWL web ontology language overview," W3C recommendation, vol. 10, p. 2004, 2004.
- A. M. Talib, R. Atan, R. Abdullah, and M. A. A. Murad, "Security ontology driven multi agent system architecture for cloud data storage security:: Ontology development," International Journal of Computer Science and Network Security (IJCSNS), vol. 12, p. 63, 2012.
- Z. D. Eri, R. Abdullah, M. A. Jabar, M. A. A. Murad, and A. M. Talib, "Ontology-based virtual communities model for the knowledge management system environment: ontology design," in Ontology-Based Applications for Enterprise Systems and Knowledge Management: IGI Global, 2013, pp. 343-360.
- A. M. Talib and F. O. Alomary, "Towards a Comprehensive Ontology Based-Investigation for Digital Forensics Cybercrime," International Journal on Communications Antenna and Propagation, vol. 5, pp. 263-268, 2015. https://doi.org/10.15866/irecap.v5i5.6112
- A. M. Talib, F. O. Alomary, H. F. Alwadi, and R. R. Albusayli, "Ontology-Based Cyber Security Policy Implementation in Saudi Arabia," Journal of Information Security, vol. 9, pp. 315-333, 2018. https://doi.org/10.4236/jis.2018.94021
- G. Denker and L. Kagal, "Security Annotation for DAML web services," in Proc. 2nd International Semantic Web Conference (ISWC2003), Sanibel Island, Florida, USA, 2003.
- G. Denker, L. Kagal, and T. Finin, "Security in the Semantic Web using OWL," Information Security Technical Report, vol. 10, pp. 51-58, 2005. https://doi.org/10.1016/j.istr.2004.11.002
- A. Kim, J. Luo, and M. Kang, "Security ontology for annotating resources," in OTM Confederated International Conferences" On the Move to Meaningful Internet Systems", 2005, pp. 1483-1499.
- S. Fenz and A. Ekelhart, "Formalizing information security knowledge," in Proceedings of the 4th international Symposium on information, Computer, and Communications Security, 2009, pp. 183-194.
- A. Herzog, N. Shahmehri, and C. Duma, "An ontology of information security," International Journal of Information Security and Privacy (IJISP), vol. 1, pp. 1-23, 2007. https://doi.org/10.4018/jisp.2007100101
- A. Gyrard, C. Bonnet, and K. Boudaoud, "An ontology-based approach for helping to secure the ETSI machine-to-machine architecture," in 2014 IEEE International Conference on Internet of Things (iThings), and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom), 2014, pp. 109-116.
- B. A. Mozzaquatro, R. Jardim-Goncalves, and C. Agostinho, "Towards a reference ontology for security in the Internet of Things," in 2015 IEEE International Workshop on Measurements & Networking (M&N), 2015, pp. 1-6.
- F. de Franco Rosa, M. Jino, and R. Bonacin, "Towards an ontology of security assessment: A core model proposal," in Information Technology-New Generations: Springer, 2018, pp. 75-80.
- M. Tao, J. Zuo, Z. Liu, A. Castiglione, and F. Palmieri, "Multi-layer cloud architectural model and ontology-based security service framework for IoT-based smart homes," Future Generation Computer Systems, vol. 78, pp. 1040-1051, 2018. https://doi.org/10.1016/j.future.2016.11.011
- C. Choi and J. Choi, "Ontology-Based Security Context Reasoning for Power IoT-Cloud Security Service," IEEE Access, vol. 7, pp. 110510-110517, 2019. https://doi.org/10.1109/ACCESS.2019.2933859
- P. Gonzalez-Gil, A. F. Skarmeta, and J. A. Martinez, "Towards an ontology for iot context-based security evaluation," in 2019 Global IoT Summit (GIoTS), 2019, pp. 1-6.
- M. F. Arruda and R. F. BulcALo-Neto, "Toward a lightweight ontology for IoT privacy," in Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, 2019, pp. 880-888.
- T. Priebe, W. Dobmeier, and N. Kamprath, "Supporting attribute-based access control with ontologies," in First International conference on availability, reliability and security (ARES'06), 2006, pp. 8 pp.-472.
- T. Finin, A. Joshi, L. Kagal, J. Niu, R. Sandhu, W. Winsborough, and B. Thuraisingham, "R OWL BAC: representing role based access control in OWL," in Proceedings of the 13th ACM symposium on Access control models and technologies, 2008, pp. 73-82.
- A. Avizienis, J.-C. Laprie, B. Randell, and C. Landwehr. "Basic concepts and taxonomy of dependable and secure computing." Dependable and Secure Computing, IEEE Transactions on 1.1 (2004): 11-33. https://doi.org/10.1109/TDSC.2004.2
- A. Ekelhart, S. Fenz, M. D. Klemen and E. R. Weippl. Security ontology: Simulating threats to corporate assets. Springer Berlin Heidelberg, 2006.
- A. Ekelhart, S. Fenz, M. Klemen, and E. Weippl, "Security ontologies: Improving quantitative risk analysis," Proc. Annu. Hawaii Int. Conf. Syst. Sci., 2007.
- G. Goluch, A. Ekelhart, S. Fenz, S. Jakoubi, S. Tjoa, and T. Muck, "Integration of an ontological information security concept in risk aware business process management." Hawaii International Conference on System Sciences, Proceedings of the 41st Annual. IEEE, 2008.
- S. Fenz, and E. Weippl. Ontology based IT-security planning. IEEE, 2006.
- J. Undercoffer, A. Joshi, and J. Pinkston, "Modeling Computer Attacks : An Ontology for Intrusion Detection," pp. 113-135, 2003.
- A. Garcia-Crespo, J. M. Gomez-Berbís, R. Colomo-Palacios, and G. Alor-Herna ́ndez, "SecurOntology: A semantic web access control framework." Computer Standards & Interfaces 33.1 (2011): 42-49. https://doi.org/10.1016/j.csi.2009.10.003
- V. Raskin, C. F. Hempelmann, K. E. Triezenberg, and S. Nirenburg, "Ontology in information security: a useful theoretical foundation and methodological tool," in Proceedings of the 2001 workshop on New security paradigms, 2001, pp. 53-59.
- A. Evesti, R. Savola, E. Ovaska, and J. KuusijArvi, "The design, instantiation, and usage of information security measuring ontology," in MOPAS 2011, The Second International Conference on Models and Ontology-based Design of Protocols, Architectures and Services, 2011, pp. 1-9.
- D. Feledi and S. Fenz, "Challenges of web-based information security knowledge sharing," in 2012 Seventh international conference on availability, reliability and security, 2011, pp. 514-521.
- P. Salini and S. Kanmani, "A knowledge-oriented approach to security requirements engineering for e-voting system," International Journal of Computer Applications, vol. 49, 2012.
- A. Gyrard, C. Bonnet, and K. Boudaoud, "The stac (security toolbox: attacks & countermeasures) ontology," in Proceedings of the 22nd International Conference on World Wide Web, 2013, pp. 165-166.
- I. Kotenko, O. Polubelova, I. Saenko, and E. Doynikova, "The ontology of metrics for security evaluation and decision support in SIEM systems," in 2013 International Conference on Availability, Reliability and Security, 2013, pp. 638-645.
- P. Salini and S. Kanmani, "Ontology-based representation of reusable security requirements for developing secure web applications," International Journal of Internet Technology and Secured Transactions, vol. 5, pp. 63-83, 2013. https://doi.org/10.1504/IJITST.2013.058295
- W. Kang and Y. Liang, "A security ontology with MDA for software development," in 2013 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2013, pp. 67-74.
- U. Koinig, S. Tjoa, and J. Ryoo, "Contrology-an ontology-based cloud assurance approach," in 2015 IEEE 24th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2015, pp. 105-107.
- C. Blanco, J. Lasheras, E. Fernandez-Medina, R. Valencia-Garcia, and A. Toval, "Basis for an integrated security ontology according to a systematic review of existing proposals," Computer Standards & Interfaces, vol. 33, pp. 372-388, 2011. https://doi.org/10.1016/j.csi.2010.12.002
- A. Souag, C. Salinesi, and I. Comyn-Wattiau, "Ontologies for security requirements: A literature survey and classification," in International conference on advanced information systems engineering, 2012, pp. 61-69.
- S. Alam, M. M. R. Chowdhury, and J. Noll, "Interoperability of security-enabled internet of things," Wireless Personal Communications, vol. 61, pp. 567-586, 2011. https://doi.org/10.1007/s11277-011-0384-6
- A. Ekelhart, S. Fenz, and T. Neubauer, "Aurum: A framework for information security risk management," in 2009 42nd Hawaii International Conference on System Sciences, 2009, pp. 1-10.