An ontology of information security

A Herzog, N Shahmehri, C Duma - International Journal of …, 2007 - igi-global.com
We present a publicly available, OWL-based ontology of information security which models
assets, threats, vulnerabilities, countermeasures and their relations. The ontology can be …

Basis for an integrated security ontology according to a systematic review of existing proposals

C Blanco, J Lasheras, E Fernández-Medina… - Computer Standards & …, 2011 - Elsevier
The use of ontologies to represent knowledge provides us with organization, communication
and reusability. The concepts and relations managed by any scientific community need to be …

Ontology in information security: a useful theoretical foundation and methodological tool

V Raskin, CF Hempelmann, KE Triezenberg… - Proceedings of the …, 2001 - dl.acm.org
The paper introduces and advocates an ontological semantic approach to information
security. Both the approach and its resources, the ontology and lexicons, are borrowed from …

An ontology-driven approach applied to information security

A Vorobiev, N Bekmamedova - Journal of Research and …, 2010 - search.informit.org
Software systems have become highly distributed and complex involving independent
components working together towards achieving systems' goals. Meanwhile, security attacks …

Formalizing information security knowledge

S Fenz, A Ekelhart - Proceedings of the 4th international Symposium on …, 2009 - dl.acm.org
Unified and formal knowledge models of the information security domain are fundamental
requirements for supporting and enhancing existing risk management approaches. This …

[引用][C] A conceptual framework for information security management

T Finne - Computers & Security, 1998 - Elsevier
A Conceptual Framework for Information Security Management Page 1 Computers & Security,
17 (1998) 303-307 A Conceptual Framework for Information Security Management Thomas …

An ontology-based security risk management model for information systems

OT Arogundade, A Abayomi-Alli, S Misra - Arabian Journal for Science and …, 2020 - Springer
Security risk management is a knowledge-intensive procedure that requires monitoring and
capturing relevant information that can assist in making the right decision by managers. In …

Toward web-based information security knowledge sharing

D Feledi, S Fenz, L Lechner - Information security technical report, 2013 - Elsevier
Today IT security professionals are working hard to keep a high security standard for their
information systems. In doing so, they often face similar problems, for which they have to …

[PDF][PDF] UCO: A unified cybersecurity ontology

Z Syed, A Padia, T Finin, L Mathews… - Workshops at the thirtieth …, 2016 - cdn.aaai.org
In this paper we describe the Unified Cybersecurity Ontology (UCO) that is intended to
support information integration and cyber situational awareness in cybersecurity systems …

A taxonomy for information security technologies

HS Venter, JHP Eloff - Computers & Security, 2003 - Elsevier
The Internet is a public network, which is open and used by all—also for communicating
private information.“But private information should be secured!”, I hear you say. Yes. But …