Skip to main content

C. Ontology Development

  • Chapter
Security Engineering with Patterns

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2754))

  • 452 Accesses

Abstract

In this appendix we provide additional material regarding the development of the security core ontology in Chapter 6. In particular, we present the competence question which were used to define the task of the ontology. Hereby, we show how we implemented some of these questions within our security pattern search engine (see also Chapter 9). Furthermore, we briefly present the results of the two feedback rounds which once more justify the overall approach of designing an ontology collaboratively with a small group of participants.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2003 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Schumacher, M. (2003). C. Ontology Development. In: Security Engineering with Patterns. Lecture Notes in Computer Science, vol 2754. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-45180-8_13

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-45180-8_13

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-40731-7

  • Online ISBN: 978-3-540-45180-8

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics