Applications of ontologies in requirements engineering: a systematic review of the literature

D Dermeval, J Vilela, II Bittencourt, J Castro… - Requirements …, 2016 - Springer
There is an increase use of ontology-driven approaches to support requirements
engineering (RE) activities, such as elicitation, analysis, specification, validation and …

Towards an ontology for privacy requirements via a systematic literature review

M Gharib, P Giorgini, J Mylopoulos - Conceptual Modeling: 36th …, 2017 - Springer
Privacy has been frequently identified as a main concern for systems that deal with personal
information. However, much of existing work on privacy requirements deals with them as a …

Cybersecurity vulnerability management: A conceptual ontology and cyber intelligence alert system

R Syed - Information & Management, 2020 - Elsevier
Effective vulnerability management requires the integration of vulnerability information
available on multiple sources, including social media. The information could be used to …

An ontology-based security risk management model for information systems

OT Arogundade, A Abayomi-Alli, S Misra - Arabian Journal for Science and …, 2020 - Springer
Security risk management is a knowledge-intensive procedure that requires monitoring and
capturing relevant information that can assist in making the right decision by managers. In …

Ontology of metrics for cyber security assessment

E Doynikova, A Fedorchenko, I Kotenko - Proceedings of the 14th …, 2019 - dl.acm.org
Development of metrics that are valuable for assessing security and decision making is an
important element of efficient counteraction to cyber threats. The paper proposes an …

An ontology-based learning approach for automatically classifying security requirements

T Li, Z Chen - Journal of Systems and Software, 2020 - Elsevier
Although academia has recognized the importance of explicitly specifying security
requirements in early stages of system developments for years, in reality, many projects mix …

A STAMP-based ontology approach to support safety and security analyses

DP Pereira, C Hirata, S Nadjm-Tehrani - Journal of Information Security and …, 2019 - Elsevier
Considerations of safety and security in the early stage of system life cycle are essential to
collect and prioritize operation needs, determine feasibility of the desired system, and …

Model-based security engineering of distributed information systems using UMLsec

B Best, J Jurjens, B Nuseibeh - 29th International Conference …, 2007 - ieeexplore.ieee.org
Given the explosive growth of digitally stored information in modern enterprises, distributed
information systems together with search engines are increasingly used in companies. By …

How good is a security policy against real breaches? A HIPAA case study

Ö Kafali, J Jones, M Petruso, L Williams… - 2017 IEEE/ACM 39th …, 2017 - ieeexplore.ieee.org
Policy design is an important part of software development. As security breaches increase in
variety, designing a security policy that addresses all potential breaches becomes a …

A semantic model for security evaluation of information systems

E Doynikova, A Fedorchenko… - Journal of Cyber …, 2020 - journals.riverpublishers.com
Modern information systems are characterized by huge security related data streams. For
cyber security management in such systems, novel models and techniques for efficient …