Vis enkel innførsel

dc.contributor.authorWen, Shao-Fang
dc.contributor.authorKatt, Basel
dc.date.accessioned2019-10-02T07:10:42Z
dc.date.available2019-10-02T07:10:42Z
dc.date.created2019-06-19T10:22:25Z
dc.date.issued2019
dc.identifier.citationInformation. 2019, 10 (6), .nb_NO
dc.identifier.issn2078-2489
dc.identifier.urihttp://hdl.handle.net/11250/2619701
dc.description.abstractKnowledge of software security is highly complex since it is quite context-specific and can be applied in diverse ways. To secure software development, software developers require not only knowledge about general security concepts but also about the context for which the software is being developed. With traditional security-centric knowledge formats, it is difficult for developers or knowledge users to retrieve their required security information based on the requirements of software products and development technologies. In order to effectively regulate the operation of security knowledge and be an essential part of practical software development practices, we argue that security knowledge must first incorporate features that specify what contextual characteristics are to be handled, and represent the security knowledge in a format that is understandable and acceptable to the individuals. This study introduces a novel ontology approach for modeling security knowledge with a context-based approach, by which security knowledge can be retrieved, taking the context of the software application at hand into consideration. In this paper, we present our security ontology with the design concepts and the corresponding evaluation process.nb_NO
dc.language.isoengnb_NO
dc.publisherMDPInb_NO
dc.relation.urihttps://www.mdpi.com/2078-2489/10/6/216
dc.rightsNavngivelse 4.0 Internasjonal*
dc.rights.urihttp://creativecommons.org/licenses/by/4.0/deed.no*
dc.titleManaging Software Security Knowledge in Context: An Ontology Based Approachnb_NO
dc.typeJournal articlenb_NO
dc.typePeer reviewednb_NO
dc.description.versionpublishedVersionnb_NO
dc.source.pagenumber12nb_NO
dc.source.volume10nb_NO
dc.source.journalInformationnb_NO
dc.source.issue6nb_NO
dc.identifier.doi10.3390/INFO10060216
dc.identifier.cristin1705977
dc.description.localcode© 2019 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).nb_NO
cristin.unitcode194,63,30,0
cristin.unitnameInstitutt for informasjonssikkerhet og kommunikasjonsteknologi
cristin.ispublishedtrue
cristin.fulltextoriginal
cristin.qualitycode1


Tilhørende fil(er)

Thumbnail

Denne innførselen finnes i følgende samling(er)

Vis enkel innførsel

Navngivelse 4.0 Internasjonal
Med mindre annet er angitt, så er denne innførselen lisensiert som Navngivelse 4.0 Internasjonal