Security-by-ontology: A knowledge-centric approach

5Citations
Citations of this article
23Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

We present a security ontology (SO), which can be used as a basis of security management of an arbitrary information system. This SO provides capabilities, such as modeling of risk assessment knowledge, abstraction of security requirements, reusable security knowledge interoperability, aggregation and reasoning. The SO is based on the exploitation of security-related knowledge, derived from diverse sources. We demonstrate that the establishment of such a framework is feasible and, furthermore, that a SO can support critical security activities of an expert, e.g. security requirements identification, as well as selection of certain countermeasures. We also present and discuss an implementation of a specific SO. The implementation is accompanied by results regarding how a SO can be built and populated with security information. © 2006 International Federation for Information Processing.

Cite

CITATION STYLE

APA

Tsoumas, B., Papagiannakopoulos, P., Dritsas, S., & Gritzalis, D. (2006). Security-by-ontology: A knowledge-centric approach. IFIP International Federation for Information Processing, 201, 99–110. https://doi.org/10.1007/0-387-33406-8_9

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free