A systematic review and comparison of security ontologies

C Blanco, J Lasheras… - 2008 Third …, 2008 - ieeexplore.ieee.org
The use of ontologies for representing knowledge provides us with organization,
communication and reusability. Information security is a serious requirement which must be …

Ontologies for security requirements: A literature survey and classification

A Souag, C Salinesi, I Comyn-Wattiau - … Gdańsk, Poland, June 25-26, 2012 …, 2012 - Springer
Despite existing methodologies in the field, most requirements engineers are poorly trained
to define security requirements. This is due to a considerable lack of security knowledge …

[HTML][HTML] Hybrid ontology for safety, security, and dependability risk assessments and Security Threat Analysis (STA) method for industrial control systems

J Alanen, J Linnosmaa, T Malm… - Reliability Engineering & …, 2022 - Elsevier
This paper introduces a model-based methodology for hybrid reliability, availability,
maintainability, safety, and security (RAMSS) risk assessment management, which extends …

Formalizing information security knowledge

S Fenz, A Ekelhart - Proceedings of the 4th international Symposium on …, 2009 - dl.acm.org
Unified and formal knowledge models of the information security domain are fundamental
requirements for supporting and enhancing existing risk management approaches. This …

A security ontology for security requirements elicitation

A Souag, C Salinesi, R Mazo… - … Secure Software and …, 2015 - Springer
Security is an important issue that needs to be taken into account at all stages of information
system development, including early requirements elicitation. Early analysis of security …

Basis for an integrated security ontology according to a systematic review of existing proposals

C Blanco, J Lasheras, E Fernández-Medina… - Computer Standards & …, 2011 - Elsevier
The use of ontologies to represent knowledge provides us with organization, communication
and reusability. The concepts and relations managed by any scientific community need to be …

Ontology-based information security compliance determination and control selection on the example of ISO 27002

S Fenz, T Neubauer - Information & Computer Security, 2018 - emerald.com
Purpose The purpose of this paper is to provide a method to formalize information security
control descriptions and a decision support system increasing the automation level and …

Security ontology for adaptive mapping of security standards

S Ramanauskaitė, D Olifer, N Goranin, A Čenys - 2013 - etalpykla.vilniustech.lt
Adoption of security standards has the capability of improving the security level in an
organization as well as to provide additional benefits and possibilities to the organization …

Mapping information security standard ISO 27002 to an ontological structure

S Fenz, S Plieschnegger, H Hobel - Information & Computer Security, 2016 - emerald.com
Purpose The purpose of this paper is to increase the degree of automation within
information security compliance projects by introducing a formal representation of the ISO …

Towards a reconceptualisation of cyber risk: an empirical and ontological study

A Oltramari, A Kott - Journal of Information Warfare, 2018 - JSTOR
The prominence and use of the concept of cyber risk has been rising in recent years. This
paper presents empirical investigations focused on two important and distinct groups within …