[PDF][PDF] Ontological GUI and EVES

S Kromodimoeljo - Citeseer
1 Background In a previous contract (EVES Enhancements, contract number W2213-2-
0289/01-SV), we demonstrated how EVES could be used for Ontological modeling of …

Isn't the time ripe for a standard ontology on security of information and networks?

A Elçi - Proceedings of the 7th International Conference on …, 2014 - dl.acm.org
In this talk I'll bring forward what is lacking in the interfaces of ontology and security. I shall
especially take up haves and have-nots regarding the interplay of two fields, then, drive to …

Generating a standardized upper ontology for security of information and networks

A Elçi - … Intelligence, Cyber Security and Computational Models …, 2016 - Springer
A usable functional interface between ontology and security integrating related information
is needed for security engineering as well as creating secure systems. That in turn …

An ontology-based approach to information systems security management

B Tsoumas, S Dritsas, D Gritzalis - … Network Security, MMM-ACNS 2005, St …, 2005 - Springer
Complexity of modern information systems (IS), impose novel security requirements. On the
other hand, the ontology paradigm aims to support knowledge sharing and reuse in an …

[HTML][HTML] Seconto: Ontological Representation of Security Directives

G Castiglione, G Bella, DF Santamaria - Computers & Security, 2025 - Elsevier
The current digital landscape demands robust security requirements and, for doing so, the
institutions enact complex security directives to protect the citizens and the infrastructures …

Extendable Safety and Security Ontology

TM Boiński, H Krawczyk - … & Proceedings of Polish Association for …, 2012 - mostwiedzy.pl
Security plays an increasingly important role in our everyday life, and research and users of
computer systems point out that the need arises for a common, formalised model capable of …

Security-by-Ontology: A knowledge-centric approach

B Tsoumas, P Papagiannakopoulos, S Dritsas… - … of the IFIP TC-11 21st …, 2006 - Springer
We present a security ontology (SO), which can be used as a basis of security management
of an arbitrary information system. This SO provides capabilities, such as modeling of risk …

Employing Ontologies for the Development of Security Critical Applications: The secure e-poll paradigm

S Dritsas, L Gymnopoulos, M Karyda… - … of Expanding Internet: E …, 2005 - Springer
Incorporating security in the application development process is a fundamental requirement
for building secure applications, especially with regard to security sensitive domains, such …

Ontology in information security: a useful theoretical foundation and methodological tool

V Raskin, CF Hempelmann, KE Triezenberg… - Proceedings of the …, 2001 - dl.acm.org
The paper introduces and advocates an ontological semantic approach to information
security. Both the approach and its resources, the ontology and lexicons, are borrowed from …

[PDF][PDF] The Graphical Display of A Domain Model of Information Systems Security (INFOSEC) Through Semantic Networks: A Description of the INFOSEC Semantic …

TT Smith, KV Dolan - 17th NATIONAL COMPUTER SECURITY …, 1994 - Citeseer
Ifinformation is truly our most precious corporate resource, then the efficient and effective
retrieval of that information is vital to our success. Equally important is the ability to reuse …