A knowledge based process proposal for mobile security

被引:0
|
作者
Beji, Sofien [1 ]
El Kadhi, Nabil [1 ]
机构
[1] Ahlia Univ, ECCE Dept, RIADI ENSI Tunisia, Manama, Bahrain
来源
2009 SECOND INTERNATIONAL CONFERENCE ON DEVELOPMENTS IN ESYSTEMS ENGINEERING (DESE 2009) | 2009年
关键词
D O I
10.1109/DeSE.2009.42
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Mobile applications are an emerging area in software development. Having a wide and heterogeneous users community as a target implies a special focus on technical requirements. In this paper, we are concerned with the handling of a relevant non functional requirement which is security. During the building process, the software developer should be assisted for security assessment. We present in this paper, a security ontology based support for mobile software developer. The ontology is structured in sub-ontologies, each one deals with a set of concepts. Relevant security concepts and semantic relationships with additional non functional requirements are handled and presented in our conceptualization. The ontology is implemented with OWL-DL.
引用
收藏
页码:166 / 172
页数:7
相关论文
共 50 条
  • [1] Security ontology proposal for mobile applications
    Beji, Sofien
    El Kadhi, Nabil
    MDM: 2009 10TH INTERNATIONAL CONFERENCE ON MOBILE DATA MANAGEMENT, 2009, : 580 - 587
  • [2] A Proposal to Improve the Security of Mobile Banking Applications
    Elkhodr, Mahmoud
    Shahrestani, Seyed
    Kourouche, Khaled
    2012 TENTH INTERNATIONAL CONFERENCE ON ICT AND KNOWLEDGE ENGINEERING, 2012, : 260 - 265
  • [3] A security and usability proposal for mobile electronic commerce
    Soriano, M
    Ponce, D
    IEEE COMMUNICATIONS MAGAZINE, 2002, 40 (08) : 62 - 67
  • [4] Mobile access to process knowledge: An agent-based approach
    Wienhofen, LWM
    EMERGING SOLUTIONS FOR FUTURE MANUFACTURING SYSTEMS, 2005, 159 : 139 - 146
  • [5] The concepts, the poor relation of the (critical) security studies ? Proposal for an archaeology of security knowledge
    Bonditti, Philippe
    ETUDES INTERNATIONALES, 2015, 46 (2-3): : 167 - 188
  • [6] Formal analysis of security protocol based on process calculus and knowledge derivation
    Department of Computer Science and Technology, Huzhou Teachers College, Huzhou 313000, China
    不详
    Jisuanji Yanjiu yu Fazhan, 2006, 5 (953-958):
  • [7] Risk Assessment for Mobile Payment Security based on Analytic Hierarchy Process Method
    Shan Mei-jing
    PROCEEDINGS OF THE 2016 INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING (ICCSE 2016), 2016, 68 : 127 - 133
  • [8] DESIGN OF KNOWLEDGE-BASED SCHEDULING SOLUTION BASED ON EXPERT'S TECHNICAL KNOWLEDGE IN PRINTING PROCESS AND PROPOSAL OF ITS IMPROVEMENT
    Matsumoto, Shimpei
    Ueno, Nobuyuki
    Okuhara, Koji
    Ishii, Hiroaki
    INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2009, 5 (11B): : 4125 - 4143
  • [9] Enhancing Mobile Device Security with Process Mining
    Hluchy, Ladislav
    Habala, Ondrej
    2016 IEEE 14TH INTERNATIONAL SYMPOSIUM ON INTELLIGENT SYSTEMS AND INFORMATICS (SISY), 2016, : 181 - 184
  • [10] A PROPOSAL FOR A KNOWLEDGE MARKET BASED ON QUANTITY AND QUALITY OF KNOWLEDGE
    Mancilla-Amaya, Leonardo
    Szczerbicki, Edward
    Sanin, Cesar
    CYBERNETICS AND SYSTEMS, 2013, 44 (2-3) : 118 - 132