[PDF][PDF] The Graphical Display of A Domain Model of Information Systems Security (INFOSEC) Through Semantic Networks: A Description of the INFOSEC Semantic …

TT Smith, KV Dolan - 17th NATIONAL COMPUTER SECURITY …, 1994 - Citeseer
Ifinformation is truly our most precious corporate resource, then the efficient and effective
retrieval of that information is vital to our success. Equally important is the ability to reuse …

[PDF][PDF] A semantic model for cyber security

B Barnett, A Crapo - Grid-Interop Proceedings: Implementing …, 2011 - gridwiseac.org
Smart Grid security is challenging as experts in both IT Security and ICS [Industrial Control
Systems] systems are few. Expertise in multiple domains is needed, and tools that can be …

Security requirements analysis based on security and domain ontologies

A Souag, C Salinesi, I Wattiau - REFSQ, 2013 - paris1.hal.science
Security is the discipline concerned with protecting systems from a wide range of threats
(malice, error or mischief) that break the system by exploiting a vulnerability, ie a property of …

[HTML][HTML] Addressing INFOSEC Analysis Problems Using Rule-Based Technology

RB Neely, JW Freeman - National Information Systems Security' …, 1996 - books.google.com
Obtaining the necessary understanding of the security properties and vulnerabilities of
systems, which are becoming ever complex, requires significant analytic effort. A security …

A semantic approach to modelling of cybersecurity domain

AE Aviad, K Węcel, W Abramowicz - Journal of Information Warfare, 2016 - JSTOR
This paper addresses the issue of mastering the complex body of knowledge that is relevant
for cybersecurity. The wide spectrum of threats and wide variety of resources are …

An ontology-based approach to information systems security management

B Tsoumas, S Dritsas, D Gritzalis - … Network Security, MMM-ACNS 2005, St …, 2005 - Springer
Complexity of modern information systems (IS), impose novel security requirements. On the
other hand, the ontology paradigm aims to support knowledge sharing and reuse in an …

[PDF][PDF] Security architecture-based system design

EA Schneider - Proceedings of the 1999 workshop on New Security …, 1999 - dl.acm.org
We present a new view of information security based on concepts from the Defense Goal
Security Architecture. This view looks at security according to the desire to protect and to …

Network access control configuration management using semantic web techniques

WM Fitzgerald, SN Foley… - Journal of Research and …, 2009 - search.informit.org
Network Access Control requirements are typically implemented in practice as a series of
heterogeneous security-mechanism-centric policies that span system services and …

Description and Reasoning of Security Policy in Information System Based on Security Domain

C Tang, Y Xie - 2010 2nd International Symposium on …, 2010 - ieeexplore.ieee.org
Security policy is the core of information system security management. In order to solve the
problem of the security policy unified specification description, the classification and …

[PDF][PDF] Ontological GUI and EVES

S Kromodimoeljo - Citeseer
1 Background In a previous contract (EVES Enhancements, contract number W2213-2-
0289/01-SV), we demonstrated how EVES could be used for Ontological modeling of …