ScienceOpen:
research and publishing network
For Publishers
Discovery
Metadata
Peer review
Hosting
Publishing
For Researchers
Join
Publish
Review
Collect
My ScienceOpen
Sign in
Register
Dashboard
Blog
About
Search
Advanced search
My ScienceOpen
Sign in
Register
Dashboard
Search
Search
Advanced search
For Publishers
Discovery
Metadata
Peer review
Hosting
Publishing
For Researchers
Join
Publish
Review
Collect
Blog
About
25
views
0
references
Top references
cited by
11
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
2,188
similar
All similar
Record
: found
Abstract
: not found
Article
: not found
An Ontology of Information Security
Author(s):
Almut Herzog
1
,
Nahid Shahmehri
1
,
Claudiu Duma
1
Publication date
(Print):
October 2007
Journal:
International Journal of Information Security and Privacy
Publisher:
IGI Global
Read this article at
ScienceOpen
Publisher
Review
Review article
Invite someone to review
Bookmark
Cite as...
There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Management Information Systems
Author and article information
Journal
Title:
International Journal of Information Security and Privacy
Publisher:
IGI Global
ISSN (Print):
1930-1650
ISSN (Electronic):
1930-1669
Publication date Created:
October 2007
Publication date (Print):
October 2007
Volume
: 1
Issue
: 4
Pages
: 1-23
Affiliations
[
1
]
Linkopings Universitet, Sweden
Article
DOI:
10.4018/jisp.2007100101
SO-VID:
b8c50504-30a9-4d61-a3ca-f7371f4d52e0
Copyright ©
© 2007
History
Data availability:
Comments
Comment on this article
Sign in to comment
scite_
Similar content
2,188
Clustering rare diseases within an ontology-enriched knowledge graph.
Authors:
Jaleal Sanjak
,
Jessica Binder
,
Arjun Singh Yadaw
…
Novel comparison of evaluation metrics for gene ontology classifiers reveals drastic performance differences
Authors:
Ilya Plyusnin
,
Liisa Holm
,
Petri Toronen
Towards a negative ontology of leadership
Authors:
Simon Kelly
See all similar
Cited by
10
Maximum Damage Battery Depletion Attack in Mobile Sensor Networks
Authors:
Saswati Sarkar
,
M. H. R. Khouzani
A Security Ontology for Security Requirements Elicitation
Authors:
Amina Souag
,
Camille Salinesi
,
Raúl Mazo
…
Application research on information security of aerobics information digital system based on Internet of things technology
Authors:
Caixia Chen
,
Xingfeng Zhu
See all cited by