A high-level scheme for an ontology-based compliance framework in software development

Ftemeh Zarrabi Jorshari, Rahman H. Tawil

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    7 Citations (SciVal)
    Original languageEnglish
    Title of host publicationProceedings - 2015 IEEE 17th International Conference on High Performance Computing and Communications, 2015 IEEE 7th International Symposium on Cyberspace Safety and Security and 2015 IEEE 12th International Conference on Embedded Software and Systems, HPCC-CSS-ICESS 2015
    PublisherInstitute of Electrical and Electronics Engineers Inc.
    Pages1479-1487
    Number of pages9
    ISBN (Electronic)9781479989362
    DOIs
    Publication statusPublished (VoR) - 23 Nov 2015
    Event17th IEEE International Conference on High Performance Computing and Communications, IEEE 7th International Symposium on Cyberspace Safety and Security and IEEE 12th International Conference on Embedded Software and Systems, HPCC-ICESS-CSS 2015 - New York, United States
    Duration: 24 Aug 201526 Aug 2015

    Publication series

    NameProceedings - 2015 IEEE 17th International Conference on High Performance Computing and Communications, 2015 IEEE 7th International Symposium on Cyberspace Safety and Security and 2015 IEEE 12th International Conference on Embedded Software and Systems, HPCC-CSS-ICESS 2015

    Conference

    Conference17th IEEE International Conference on High Performance Computing and Communications, IEEE 7th International Symposium on Cyberspace Safety and Security and IEEE 12th International Conference on Embedded Software and Systems, HPCC-ICESS-CSS 2015
    Country/TerritoryUnited States
    CityNew York
    Period24/08/1526/08/15

    Keywords

    • Compliance
    • Data protection
    • Ontology
    • Privacy
    • Requirement Engineeering
    • Risk
    • Security
    • Standard

    Fingerprint

    Dive into the research topics of 'A high-level scheme for an ontology-based compliance framework in software development'. Together they form a unique fingerprint.

    Cite this