Ontologies for security requirements: A literature survey and classification

51Citations
Citations of this article
103Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

Despite existing methodologies in the field, most requirements engineers are poorly trained to define security requirements. This is due to a considerable lack of security knowledge. Some security ontologies have been proposed, but a gap still exists between the two fields of security requirement engineering and ontologies. This paper is a survey, it proposes an analysis and a typology of existing security ontologies and their use for requirements definition. © 2012 Springer-Verlag.

Cite

CITATION STYLE

APA

Souag, A., Salinesi, C., & Comyn-Wattiau, I. (2012). Ontologies for security requirements: A literature survey and classification. In Lecture Notes in Business Information Processing (Vol. 112 LNBIP, pp. 61–69). Springer Verlag. https://doi.org/10.1007/978-3-642-31069-0_5

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free