Using an ontology as a model for the implementation of the National Cybersecurity Policy Framework for South Africa

作者: JC Jansen van Vuuren , JJ Zaaiman , L Leenen

DOI:

关键词:

摘要: … Although implementation of this policy has been initiated in a few isolated instances, a holistic approach is lacking. Due to the cybersecurity environment not being clearly bounded and …

参考文章(9)
Ora Lassila, Tim Berners-lee, James A. Hendler, The Semantic Web" in Scientific American ,(2001)
J Phahlamohlaka, JC Jansen van Vuuren, JJ Zaaiman, L Leenen, Development of a South African Cybersecurity Policy Implementation Framework Academic Conferences and Publishing International. ,(2013)
J. Bradshaw, M. Carvalho, D. Diller, M. Johnson, S. Kulkarni, J. Lott, M. Sierhuis, R. Van Hoof, A. Uszok, R. Jeffers, N. Suri, P. Hayes, M. Burstein, A. Acquisti, B. Benyo, M. Breedy, Representation and reasoning for DAML-based policy and domain services in KAoS and nomads adaptive agents and multi-agents systems. pp. 835- 842 ,(2003) , 10.1145/860575.860709
Nora Cuppens-Boulahia, Frederic Cuppens, Fabien Autrel, Herve Debar, An ontology-based approach to react to network attacks conference on risks and security of internet and systems. ,vol. 3, pp. 280- 305 ,(2008) , 10.1504/IJICS.2009.031041
Thomas R. Gruber, A translation approach to portable ontology specifications Knowledge Acquisition. ,vol. 5, pp. 199- 220 ,(1993) , 10.1006/KNAC.1993.1008
L. Kagal, T. Finin, Anupam Joshi, A policy language for a pervasive computing environment ieee international workshop on policies for distributed systems and networks. pp. 63- 74 ,(2003) , 10.1109/POLICY.2003.1206958
Marthie Grobler, Joey Jansen van Vuuren, Louise Leenen, Implementation of a Cyber Security Policy in South Africa: Reflection on Progress and the Way Forward ICT Critical Infrastructures and Society. pp. 215- 225 ,(2012) , 10.1007/978-3-642-33332-3_20