Security ontology proposal for mobile applications

被引:10
作者
Beji, Sofien
El Kadhi, Nabil
机构
来源
MDM: 2009 10TH INTERNATIONAL CONFERENCE ON MOBILE DATA MANAGEMENT | 2009年
关键词
D O I
10.1109/MDM.2009.100
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Mobility is an emerging area that comes up with several technologies and stakeholders. Dealing with the security requirement for mobile applications means acquiring all the knowledge and the available technologies for the design and deployment of a reliable and usable countermeasure. Not only the field lacks of standards but also requires several quality constraints. To assist developers to face such a challenge, we propose a knowledge base solution through the conceptualization of a security ontology. The ontology was implemented in OWL-DL semantic language with Protege 4 tool. The ontology schema and instantiation are commented, target use is mentioned through its integration in a whole approach for security in the mobile world.
引用
收藏
页码:580 / 587
页数:8
相关论文
共 31 条
[11]   A framework for protecting a SIP-based infrastructure against malformed message attacks [J].
Geneiatakis, Dimitris ;
Kambourakis, Georgios ;
Lambrinoudakis, Costas ;
Dagiuklas, Tasos ;
Gritzalis, Stefanos .
COMPUTER NETWORKS, 2007, 51 (10) :2580-2593
[12]  
*GSM ASS, 2007, MARK RES
[13]  
Herzog Almut, 2007, INT J INFORM SECURIT, V1
[14]  
Kim A, 2005, LECT NOTES COMPUT SC, V3761, P1483
[15]  
LAUESEN S, 1988, P REFSQ 98, P98
[16]  
MULLINER C, 2006, 23 3 CHAOS COMM C BE
[17]   REPRESENTING AND USING NONFUNCTIONAL REQUIREMENTS - A PROCESS-ORIENTED APPROACH [J].
MYLOPOULOS, J ;
CHUNG, L ;
NIXON, B .
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 1992, 18 (06) :483-497
[18]  
RACIC R, 2006, SECURECOMM 2006 2 IN
[19]  
RASKIN V, P 2001 WORKSH NEW SE, P53
[20]  
RONGYU H, 2008, COMPUTER STANDAR JUN