Matches in LOV for { ?s <http://www.w3.org/2000/01/rdf-schema#comment> ?o. }
- contributor comment "Refers to a single or a group of individuals that contributed to a resource".
- created comment "States the creation, or first modification time for a resource".
- creator comment "Refers to the single or group of individuals that created the resource".
- description comment "A non-technical textual annotation for a resource".
- endorsedBy comment "Signifies social endorsment of a resource by a specific agent. Endorsement includes social actions like favouriting, liking, voting for, starring a resource.".
- hasDataGraph comment "Links a resource to the graph which contains its metadata. Its typical usage would be to link the file resource to the graph containing its extracted file metadata. This allows for easy maintenance later on. Inverse property of nao:isDataGraphFor.".
- hasSubResource comment "Defines a relationship between a resource and one or more sub resources. Descriptions of sub-resources are only interpretable when the super-resource exists. Deleting a super-resource should then also delete all sub-resources, and transferring a super-resource (for example, sending it to another user) must also include the sub-resource.".
- hasSuperResource comment "Defines a relationship between a resource and one or more super resources".
- hasSymbol comment "Annotation for a resource in the form of a visual representation. Typically the symbol is a double-typed image file or a nao:FreeDesktopIcon.".
- hasTag comment "Defines an existing tag for a resource".
- hasTopic comment "Defines a relationship between two resources, where the object is a topic of the subject".
- identifier comment "Defines a generic identifier for a resource".
- isDataGraphFor comment "Links a named graph to the resource for which it contains metadata. Its typical usage would be to link the graph containing extracted file metadata to the file resource. This allows for easy maintenance later on. Inverse property of nao:hasDataGraph.".
- isRelated comment "Defines an annotation for a resource in the form of a relationship between the subject resource and another resource".
- isTagFor comment "States which resources a tag is associated with".
- isTopicOf comment "Defines a relationship between two resources, where the subject is a topic of the object".
- lastModified comment "States the last modification time for a resource".
- modified comment "States the modification time for a resource".
- prefLabel comment "A preferred label for a resource".
- rating comment "Annotation for a resource in the form of an unrestricted rating".
- scoreParameter comment "A marker property to mark selected properties which are input to a mathematical algorithm to generate scores for resources. Properties are marked by being defined as subproperties of this property".
- trustLevel comment "A generalised trust level assigned to an agent, based on a combination of direct and network trust values it possesses. Allowed values range from 0 (no trust) to 1 (very high trust).".
- Data comment "An abstract class representing all named graph roles".
- DefiningProperty comment "A defining property's value is part of what defines a resource, changing it means\n means chaning the identity of the resource. The set of values of all defining\n properties of a resource make up its identify.\n Whenever comparing resources or sharing them the value of this property should\n be taken into account. By default all properties with a literal range are to be\n treated as defining properties unless they are marked as nrl:NonDefiningProperty.".
- DocumentGraph comment "A marker class to identify named graphs that exist within a physical document".
- ExternalViewSpecification comment "Represents an external view specification, this usually being a program which automatically generates the required view for an input graph".
- FunctionalProperty comment "A marker class to identify functional properties".
- Graph comment "Represents a named graph".
- GraphMetadata comment "Represents a special named graph that contains metadata for another graph".
- GraphView comment "Identifies a graph which is itself a view of another named graph".
- InstanceBase comment "Represents a named graph containing instance data".
- InverseFunctionalProperty comment "A marker class to identify inverse functional properties".
- Ontology comment "Represents a named graph having the role of an Ontology".
- RuleViewSpecification comment "Represents a view specification that is composed of a set of rules which generate the required view from the input graph upon firing".
- Schema comment "Represents a named graph containing schematic data".
- Semantics comment "Represents some declarative semantics".
- SymmetricProperty comment "A marker class to identify symmetric properties".
- ViewSpecification comment "Represents a specification of the means to achieve a transformation of an input graph into the required graph view".
- graphMetadataFor comment "Links a metadata graph to the graph that is being described. A unique value is compulsory".
- subGraphOf comment "Specifies a containment relationship between two graphs, meaning that the subject graph is included in the object graph".
- superGraphOf comment "Specifies a subsumption relationship between two graphs, meaning that the object graph is included in the subject graph".
- AccessControlList comment "List of permissions attached to an object.".
- Actor comment "Actors participating in the realisation and implementation of security services".
- Asset comment "The set of assets that should be protected".
- AsymmetricEncryption comment "Type of encryption in which an encryption key (the public key) is used to encrypt a message, and another encryption key (the private key) is used to decrypt the message.".
- CertificationAuthority comment "The certification authority provides certificates to bind a set of informations (name, serial number, ...) to a public key.".
- CodingStandards comment "Deploy development regimes such as coding standards and documentation methodologies to lead to best practises".
- Confidentiality comment "The confidentiality service".
- ConfigurationData comment "Several configuration data are stored in the device or sent by the mobile operator.".
- Constraints comment "Technical, quality constraints and others".
- Cost comment "Time, skills, additional equipments are considered as cost constraints".
- DataRecords comment "Some applications use records files to store data.".
- Device comment "Mobile terminal equiped with processing capabilities offering connection to wireless networks.".
- DigitalRightsManagement comment "A general framework for downloading Rights to Devices and sharing Rights in a domain. DRM is invented by the Open Mobile Alliance whose members are mobile phone manufacturers, mobile system manufacturers, operators , and sofware editors.".
- DigitalSignature comment "A digital signature is represented in a computer as a string of binary\ndigits. A digital signature is computed using a set of rules and a set of parameters such that the identity of the signatory and integrity of the data can be verified. An algorithm provides the capability to generate and verify signatures. Signature generation makes use of a private key to generate a digital signature. Signature verification makes use of a public key which corresponds to, but is not the same as, the private key. (http://csrc.nist.gov/publications/fips/fips186-2/fips186-2-change1.pdf)".
- Efficiency comment "Best use of the available resources.".
- Encryption comment "Discipline which embodies principles, means, and methods for the transformation of data in order to hide its information content, prevent its undetected modification and/or prevent its unauthorised use. (CCITT)".
- FunctionGroups comment "A set of sensitive functions under a named group that can get authorization.".
- Input comment "Keypad or any input tool".
- KeyManagement comment "The process and procedure for safely storing and distributing accurate cryptographic keys; the overall process of generating and distributing cryptographic key to authorized recipients in a secure manner.".
- LocalDataBase comment "Special database management systems for embedded applications.".
- LockingScreen comment "In some situations it is useful to lock the screen display until a task is terminated. This is technique is used to avoid the screen modification until a answer is received.".
- MACAlgorithm comment "Message authentication code that include a key for authentication".
- Mechanism comment "Security mechanisms used for security services".
- MessageDigest comment "A function that takes a string (or message) of any length as input and produces a fixed-length string as output,it is used for authentication and message integrity.".
- NetAccessFunctionGroup comment "Contains permissions related to network data connections.".
- O.T.P comment "Password used for once and generated from time, counter and/or key. May be a displayed from a hardware device.".
- OrganizationsAndStandards comment "Organizations and associations providing standards in the mobile field arena.".
- PKI comment "Public-key infrastructure (PKI) consists of protocols, services, and standards supporting applications of public-key cryptography. PKI sometimes refers simply to a trust hierarchy based on public-key certificates, and in other contexts embraces encryption and digital signature services provided to end-user applications as well. RSA (http://www.rsa.com/rsalabs/node.asp?id=2268)".
- PRNGAlgorithm comment "Pseudo Random Number Generation algorithm".
- Platform comment "The software device platform layer".
- Portability comment "ability of Application running on several devices or/and platforms.".
- RC4 comment "A free algorithm provided by RSA security, implemented since 1970.".
- SD comment "Multi Media Card".
- SIM comment "Subscriber Identity Module; A smart card for GSM networks access.".
- SmartCard comment "A smart card is any limited-sized card with embedded integrated circuits. The smart card may integrate or not processing capabilities.".
- SmartCardMemory comment "Memory available on smart card like SIM, USIM or others;".
- Software comment "All the applications and data provided with or installed on the device.".
- SymmetricEncryption comment "Also known as conventional, secret-key, and single-key algorithms; the encryption and decryption key are either the same or can be calculated from one another. Block ciphers and stream ciphers are both used for symmetric encryption.".
- TLS comment "Transport Layer Security is an IETF standard that is intended to replace the SSL protocol. (IETF Working Group)".
- TrustedThirdParty comment "security authority or its agent, trusted by other entities with respect to security-related activities. In the context of ISO/IEC 9798, a trusted third party is trusted by a claimant and/or a verifier for the purposes of authentication. ISO/IEC 9798".
- Usability comment "A good response time of the application.".
- VPN comment "Virtula private network. FIPS 140-2".
- ValueTypes comment "Additional and required types for the ontology".
- hasThreatType comment "A Threat type may be a passive or an active threat.".
- Services comment "Security services ontology".
- Interception comment "The attacker intercepts information without modifing or deleting them. This is a passive attack. This affects the privacy of the subscriber and the network operator.".
- NetworkInfrastructureAttack comment "These attacks belong to the mobile network operator. Most of them require physical air interface equipments like fake base station or modified antenna.".
- PhysicalVulnerability comment "Features related to the physical aspect of the device and its properties.".
- Replay comment "In this case the attacker may insert spurious objects into the system. The attacker may insert fake signaling messages, the effects could result in the attacker masquerading as an authority.".
- VulnerabilityInConfig comment "Some default configurations of services may be exploited by hackers.".
- VulnerabilityInUse comment "Vulnerabilities during the use of the application or service.".
- VulnerableServiceAutoStart comment "Some services like Bluetooth for example starts automatically which may lead to intrusion and access controls attacks.".
- traffic comment "An ontology to describe the management of the traffic".
- ConnectivityType.owl comment "Defines types of connectivity used in communication and bearer services accessible in certain connectivity.".
- BearerAddressType comment "Defines type of address supported in network and associated with bearer. Specific addresses are modelled as instances e.g. GSM_MSISDN describe type of address used in GSM network.".
- BearerType comment "Defines transmission technology used to transfer voice or data in network.".
- BluetoothConnectivity comment "Defines Bluetooth connectivity.".
- CSD comment "Circuit Switched Data (CSD) is the original form of data transmission developed for the time division multiple access (TDMA)-based mobile phone systems like Global System for Mobile Communications (GSM).".
- CellularConnectivityType comment "Cellular connectivity, e.g., GSM".