Software applications become highly distributed and complex, involving independent collaborating components working towards achieving system goals. At the same time, security attacks against these applications have also grown being more sophisticated and are quite difficult to detect and withstand, especially distributed attacks. In this paper, we argue that one way to identify and mitigate such attacks is through the trust-based collaboration of application components. However, to achieve collaborative defense in distributed environments, a common vocabulary is needed for the components to collaborate with each other in identifying security incidents. Thus, we employ an ontological approach to define security ontologies as a common vocabul...
In order to achieve a systematic treatment of security protocols, organizations release a number of...
Software security has been the focus of the security community and practitioners over the past decad...
The past several years we have witnessed that information has become the most precious asset, while ...
Software applications become highly distributed and complex, involving independent collaborating com...
Software applications become highly distributed and complex, involving independent collaborating com...
Software systems have become highly distributed and complex involving independent components working...
Software systems have become highly distributed and complex involving independent components working...
Software systems become increasingly distributed, involving many independent and collaborating compo...
Software systems become increasingly distributed, involving many independent and collaborating compo...
As the use of the internet for commercial purposes continues to grow, so do the number of security t...
This paper proposes an ontology-based approach to analyzing and assessing the security posture for s...
The past several years we have witnessed that information has become the most precious asset, while ...
Security concerns for physical, software and virtual worlds have captured the attention of researche...
This paper addresses the issue of accommodating security requirements in application development. It...
The past several years we have witnessed that information has become the most precious asset, while ...
In order to achieve a systematic treatment of security protocols, organizations release a number of...
Software security has been the focus of the security community and practitioners over the past decad...
The past several years we have witnessed that information has become the most precious asset, while ...
Software applications become highly distributed and complex, involving independent collaborating com...
Software applications become highly distributed and complex, involving independent collaborating com...
Software systems have become highly distributed and complex involving independent components working...
Software systems have become highly distributed and complex involving independent components working...
Software systems become increasingly distributed, involving many independent and collaborating compo...
Software systems become increasingly distributed, involving many independent and collaborating compo...
As the use of the internet for commercial purposes continues to grow, so do the number of security t...
This paper proposes an ontology-based approach to analyzing and assessing the security posture for s...
The past several years we have witnessed that information has become the most precious asset, while ...
Security concerns for physical, software and virtual worlds have captured the attention of researche...
This paper addresses the issue of accommodating security requirements in application development. It...
The past several years we have witnessed that information has become the most precious asset, while ...
In order to achieve a systematic treatment of security protocols, organizations release a number of...
Software security has been the focus of the security community and practitioners over the past decad...
The past several years we have witnessed that information has become the most precious asset, while ...