Towards an ontology of security assessment: a core model proposal

F de Franco Rosa, M Jino, R Bonacin - Information Technology-New …, 2018 - Springer
Abstract SecAOnto (Security Assessment Ontology) aims at formalizing the knowledge on
“Security Assessment”. A conceptual formalization of this area is needed, given that there is …

A survey of security assessment ontologies

F de Franco Rosa, M Jino - Recent Advances in Information Systems and …, 2017 - Springer
A literature survey on ontologies concerning the Security Assessment domain has been
carried out to uncover initiatives that aim at formalizing concepts from the “Security …

Basis for an integrated security ontology according to a systematic review of existing proposals

C Blanco, J Lasheras, E Fernández-Medina… - Computer Standards & …, 2011 - Elsevier
The use of ontologies to represent knowledge provides us with organization, communication
and reusability. The concepts and relations managed by any scientific community need to be …

The security assessment domain: a survey of taxonomies and ontologies

FF Rosa, R Bonacin, M Jino - arXiv preprint arXiv:1706.09772, 2017 - arxiv.org
The use of ontologies and taxonomies contributes by providing means to define concepts,
minimize the ambiguity, improve the interoperability and manage knowledge of the security …

Ontologies for information security management and governance

E dos Santos Moreira… - … & Computer Security, 2008 - emerald.com
Purpose–This paper aims to show the difficulties involved in dealing with the quantity,
diversity and the lack of semantics security information. It seeks to propose the use of …

An ontology of information security

A Herzog, N Shahmehri, C Duma - International Journal of …, 2007 - igi-global.com
We present a publicly available, OWL-based ontology of information security which models
assets, threats, vulnerabilities, countermeasures and their relations. The ontology can be …

A framework for conceptual characterization of ontologies and its application in the cybersecurity domain

BF Martins, LJ Serrano Gil, JF Reyes Román… - Software and Systems …, 2022 - Springer
Organizations are actively seeking efficient solutions for the management and protection of
their assets. However, Cybersecurity is a vast and complex domain, especially for large …

[PDF][PDF] The design, instantiation, and usage of information security measuring ontology

A Evesti, R Savola, E Ovaska, J Kuusijärvi - MOPAS 2011, The Second …, 2011 - Citeseer
Measuring security is a complex task and requires a great deal of knowledge. Managing this
knowledge and presenting it in a universal way is challenging. This paper describes the …

The information systems' security level assessment model based on an ontology and evidential reasoning approach

K Solic, H Ocevcic, M Golub - Computers & security, 2015 - Elsevier
In the area of information technology an amount of security issues persists through time.
Ongoing activities on security solutions aim to integrate existing security guidelines, best …

How FAIR are security core ontologies? A systematic mapping study

Í Oliveira, M Fumagalli, T Prince Sales… - … Conference on Research …, 2021 - Springer
Recently, ontology-based approaches to security, in particular to information security, have
been recognized as a relevant challenge and as an area of research interest of its own. As …