Basis for an integrated security ontology according to a systematic review of existing proposals

C Blanco, J Lasheras, E Fernández-Medina… - Computer Standards & …, 2011 - Elsevier
The use of ontologies to represent knowledge provides us with organization, communication
and reusability. The concepts and relations managed by any scientific community need to be …

A survey of security assessment ontologies

F de Franco Rosa, M Jino - Recent Advances in Information Systems and …, 2017 - Springer
A literature survey on ontologies concerning the Security Assessment domain has been
carried out to uncover initiatives that aim at formalizing concepts from the “Security …

Conceptual characterization of cybersecurity ontologies

BF Martins, L Serrano, JF Reyes, JI Panach… - … Working Conference on …, 2020 - Springer
Cybersecurity is known as the practice of protecting systems from digital attacks.
Organizations are seeking efficient solutions for the management and protection of their …

Towards an ontology of security assessment: a core model proposal

F de Franco Rosa, M Jino, R Bonacin - Information Technology-New …, 2018 - Springer
Abstract SecAOnto (Security Assessment Ontology) aims at formalizing the knowledge on
“Security Assessment”. A conceptual formalization of this area is needed, given that there is …

An ontology of information security

A Herzog, N Shahmehri, C Duma - International Journal of …, 2007 - igi-global.com
We present a publicly available, OWL-based ontology of information security which models
assets, threats, vulnerabilities, countermeasures and their relations. The ontology can be …

Ontologies for information security management and governance

E dos Santos Moreira… - … & Computer Security, 2008 - emerald.com
Purpose–This paper aims to show the difficulties involved in dealing with the quantity,
diversity and the lack of semantics security information. It seeks to propose the use of …

An ontology based approach to information security

T Pereira, H Santos - Metadata and Semantic Research: Third International …, 2009 - Springer
The semantically structure of knowledge, based on ontology approaches have been
increasingly adopted by several expertise from diverse domains. Recently ontologies have …

A systematic review and comparison of security ontologies

C Blanco, J Lasheras… - 2008 Third …, 2008 - ieeexplore.ieee.org
The use of ontologies for representing knowledge provides us with organization,
communication and reusability. Information security is a serious requirement which must be …

Ontological mapping of information security best-practice guidelines

S Fenz, T Pruckner, A Manutscheri - … , BIS 2009, Poznań, Poland, April 27 …, 2009 - Springer
Due to a rapid growth in the use of electronic data processing and networking, an
information security management system with a holistic and widespread view becomes …

A framework for conceptual characterization of ontologies and its application in the cybersecurity domain

BF Martins, LJ Serrano Gil, JF Reyes Román… - Software and Systems …, 2022 - Springer
Organizations are actively seeking efficient solutions for the management and protection of
their assets. However, Cybersecurity is a vast and complex domain, especially for large …