Information Technology Reference
In-Depth Information
[23] ISO/IEC 15408-1, 2, 3:1999 Information technology - Security techniques - Evaluation
criteria for IT security - Part 1: Introduction and general model, Part 2: Security functio-
nal requirements, Part 3: Security assurance requirements.
[24] Nmap scanner, available at http://www.insecure.org/nmap (Mar. 2005).
[25] Netstumbler 802.11 network scanner, available at http://www.stumbler.net (Mar. 2005).
[26] Protégé Ontology Development Environment, at http://protege.stanford.edu/ (Mar. 2005)
[27] Andrea Westerinen, Julie Schott “Implementation of the CIM Policy Model Using
PONDER”, 5th IEEE International Workshop on Policies for Distributed Systems and
Networks (POLICY 2004), 7-9 June 2004, Yorktown Heights, NY, USA. IEEE Com-
puter Society 2004, ISBN 0-7695-2141-X
[28] L. Lymberopoulos, E. C. Lupu, M. S. Sloman “Ponder Policy Implementation and Vali-
dation in a CIM and Differentiated Services Framework”. Presented at NOMS 2004,
Seoul, April 2004.
[29] Oscar Diaz Alcantara, Morris Sloman, "QoS policy specification - A mapping from Pon-
der to the IETF", Department of Computing, Imperial College, 180 Queen's Gate, Lon-
don SW7 2BZ,
[30] Hewlett-Packard, A Primer on Policy-based Network Management, September 14, 1999.
[31] ANSI INCITS 359-2004, “Information Technology - Role Based Access Control”, 2004.
[32] Hegering H.-G., Abeck S., Neumair B., Integrated Management of Network Systems:
Concepts, Architectures and Their Operational Application, 1999: Kaufmann Publ.
[33] Donner M., “Toward a Security Ontology”, In IEEE Security and Privacy, Vol. 1, No. 3,
pp. 6-7, May 2003.
[34] Denker G., Access Control and Data Integrity for DAML+OIL and DAML-S, SRI In-
ternational, USA, 2002.
[35] Denker G., Security Mark-up and Rules, SRI International, CAIn: Dagstuhl Seminar on
Rule Markup Techniques, 2002.
[36] OASIS Security Service TC. Security Assertion Markup Language (SAML),
http://www.oasis-open.org/committees/security/ (Mar. 2005)
[37] Bozsak E., Ehrig M., Handschub S., Hotho J., “KAON - Towards a Large Scale Seman-
tic Web”, in: Bauknecht, K., et al. (Eds.): Proc. of the 3rd International Conference on e-
Commerce and Web Technologies, EC-WEB-2002, 2002, pp. 304-313.
[38] Kagal L., et al., “A policy language for a pervasive computing environment”. In 4th IEEE
International Workshop on Policies for Distributed Systems and Networks, 2003.
[39] Raskin V., et al., “Ontology in Information Security: A Useful Theoretical Foundation
and Methodological Tool”. In V. Raskin, et al. (Eds.), Proc. of the New Security Para-
digms Workshop, ACM, USA, 2001.
[40] Uszok A., et al., “KAoS: A Policy and Domain Services Framework for Grid Computing
and Semantic Web Services”, Proc. of the Second International Conference on Trust
Management, 2004.
[41] Tonti G., et al., “Semantic Web Languages for Policy Representation and Reasoning: A
Comparison of KAoS, Rei and Ponder”, Proc. of the 2 nd International Semantic Web
Conference, 2003.
[42] Gandon F. L., Sadeh M. N., “Semantic web technologies to reconcile privacy and context
awareness”. Web Semantics Journal, 1 (3), 2004.
[43] Chen H., et al., “SOUPA: Standard ontology for ubiquitous and pervasive applications”,
Proc. of the First International Conference on Mobile and Ubiquitous Systems: Network-
ing and Services, 2004.
[44] XACML Specification (2003), eXtensible Access Control Markup Language, v. 1.1,
available at http://www.oasis-open.org (Mar. 2005).
 
Search WWH ::




Custom Search