Isn't the time ripe for a standard ontology on security of information and networks?

A Elçi - Proceedings of the 7th International Conference on …, 2014 - dl.acm.org
In this talk I'll bring forward what is lacking in the interfaces of ontology and security. I shall
especially take up haves and have-nots regarding the interplay of two fields, then, drive to …

An ontology of information security

A Herzog, N Shahmehri, C Duma - International Journal of …, 2007 - igi-global.com
We present a publicly available, OWL-based ontology of information security which models
assets, threats, vulnerabilities, countermeasures and their relations. The ontology can be …

How FAIR are security core ontologies? A systematic mapping study

Í Oliveira, M Fumagalli, T Prince Sales… - … Conference on Research …, 2021 - Springer
Recently, ontology-based approaches to security, in particular to information security, have
been recognized as a relevant challenge and as an area of research interest of its own. As …

Ontology in information security: a useful theoretical foundation and methodological tool

V Raskin, CF Hempelmann, KE Triezenberg… - Proceedings of the …, 2001 - dl.acm.org
The paper introduces and advocates an ontological semantic approach to information
security. Both the approach and its resources, the ontology and lexicons, are borrowed from …

Security Ontologies: A Systematic Literature Review

M Adach, K Hänninen, K Lundqvist - International Conference on …, 2022 - Springer
Security ontologies have been developed to facilitate the organization and management of
security knowledge. A comparison and evaluation of how these ontologies relate to one …

An ontology-based approach to information systems security management

B Tsoumas, S Dritsas, D Gritzalis - … Network Security, MMM-ACNS 2005, St …, 2005 - Springer
Complexity of modern information systems (IS), impose novel security requirements. On the
other hand, the ontology paradigm aims to support knowledge sharing and reuse in an …

Towards an ontology of security assessment: a core model proposal

F de Franco Rosa, M Jino, R Bonacin - Information Technology-New …, 2018 - Springer
Abstract SecAOnto (Security Assessment Ontology) aims at formalizing the knowledge on
“Security Assessment”. A conceptual formalization of this area is needed, given that there is …

Security-by-Ontology: A knowledge-centric approach

B Tsoumas, P Papagiannakopoulos, S Dritsas… - … of the IFIP TC-11 21st …, 2006 - Springer
We present a security ontology (SO), which can be used as a basis of security management
of an arbitrary information system. This SO provides capabilities, such as modeling of risk …

What are information security ontologies useful for?

MA Sicilia, E García-Barriocanal… - Metadata and Semantics …, 2015 - Springer
The engineering of ontologies in the information security domain have received some
degree of attention in past years. Concretely, the use of ontologies has been proposed as a …

[PDF][PDF] An Overview of Security Ontologies

H Gomes, A Zúquete, GP Dias - Proc. of the 9th Conferência da …, 2009 - core.ac.uk
This paper presents an overview of ontologies in Information Systems Security. Information
Systems Security is a broad and dynamic area that clearly benefits from the formalizations of …