Extendable Safety and Security Ontology - Publication - Bridge of Knowledge

Search

Extendable Safety and Security Ontology

Abstract

Security plays an increasingly important role in our everyday life, and research and users of computer systems point out that the need arises for a common, formalised model capable of integrating different solutions. In this paper we show that an ontology can be designed and created in a way that will make it suitable for interoperability and integration. A security and safety ontology and the methodology for creating a common model allowing future expandability and reuse are considered. such interoperable ontologies can be easily integrated with current and future solutions and provide principles for increasing system interoperability.

Cite as

Full text

download paper
downloaded 150 times
Publication version
Accepted or Published Version
License
Creative Commons: CC-BY-NC-ND open in new tab

Keywords

Details

Category:
Articles
Type:
artykuły w czasopismach recenzowanych i innych wydawnictwach ciągłych
Published in:
Studies & Proceedings of Polish Association for Knowledge Management pages 16 - 29,
ISSN: 1732-324X
Publication year:
2012
Bibliographic description:
Boiński T., Krawczyk H.: Extendable Safety and Security Ontology// Studies & Proceedings of Polish Association for Knowledge Management. -., nr. 60 (2012), s.16-29
Bibliography: test
  1. Anderson R. Security engineering, Wydawnictwo Naukowo Techniczne, 2005.
  2. Avizienis, A., Laprie, J.C., Randell, B., and Landwehr, C. Basic concepts and taxonomy of dependable and secure computing. Dependable and Secure Computing, IEEE Transactions on, 1(1):11-33, 2004. open in new tab
  3. Boiński, T. Procedures for merging and alignment of domain ontologies, PhD Thesis [in Polish]. Faculty of Electronics, Telecommunications and Informatics, Gdansk University of Technology, 2012.
  4. Boiński, T., Orłowski, P., Szymański, J., and Krawczyk, H. Security ontology construction and integration. In Proceedings of KEOD2011 of the 3nd International Joint Conference on Knowledge Discovery, Knowledge Engineering and Knowledge Management, pp. 369-374. INSTICC, 2011. open in new tab
  5. De Nicola, A., Missikoff, M., and Navigli, R. A software engineering approach to ontology building. Information Systems, 34(2): 258-275, 2009. open in new tab
  6. Donner, M. Toward a security ontology. IEEE Security & Privacy, pp. 6-7, 2003. open in new tab
  7. ENISA. Risk management: implementation principles and inventories for risk management/risk assessment methods and tools. Technical report, 2006. open in new tab
  8. Enisa. Enisa: a European Union Agency -Glossary of Risk Management. 2010.
  9. Fenz, S., Pruckner, T., and Manutscheri, A. Ontological mapping of information security best-practice guidelines. In Business Information Systems, pp. 49-60. Springer, 2009. open in new tab
  10. Firesmith, D.G. A Taxonomy of safety-related requirements. In International Workshop on High Assurance Systems (RHAS'05), 2005. open in new tab
  11. Firesmith, D.G. A taxonomy of security-related requirements. In International Workshop on High Assurance Systems (RHAS'05). Citeseer, 2005. open in new tab
  12. Guttman, B. and Roback, E.A. An introduction to computer security: the NIST handbook. DIANE Publishing, 1995. open in new tab
  13. Herzog, A., Shahmehri, N., and Duma, C. An ontology of information security. 2009. open in new tab
  14. International Atomic Energy Agency (2007). IAEA Safety Glossary Terminology Used in Nuclear Safety and Radiation Protection [Online]. Available at: http://www- pub.iaea.org/MTCD/publications/PDF/Pub1290_web.pdf. open in new tab
  15. ISO/IEC (2004). Information technology -Security techniques -Management of information and communications technology security -Part 1: Concepts and models for information and communications technology security management [Online]. Available at: http://www.iso.org/iso/iso_catalogue/catalogue_tc/catalogue_detail.htm?csnumber=39066. open in new tab
  16. Jian, N., Hu, W., Cheng, G., and Qu, Q. Falcon-AO: Aligning ontologies with Falcon. In Integrating Ontologies Workshop Proceedings, p. 85. Citeseer, 2005.
  17. Kim, A., Luo, J., and Kang, M. Security ontology for annotating resources. On the Move to Meaningful Internet Systems 2005: CoopIS, DOA, and ODBASE, pp. 1483-1499, 2005. open in new tab
  18. Knublauch, H. Protégé-owl api programmer's guide. 2009.
  19. Knublauch, H., Fergerson, R.W., Noy, N.F., and Musen, M.A. The Protégé OWL plugin: An open development environment for semantic web applications. The Semantic Web- ISWC 2004, pp. 229-243, 2004. open in new tab
  20. Krawczyk, H. Ontology engineering and its applications. Department of Computer System Architecture, ETI Faculty, Gdańsk University of Technology, 2007. open in new tab
  21. Noy, N.F., McGuinness, D.L., et al. Ontology development 101: A guide to creating your first ontology, 2001. open in new tab
  22. ontologydesignpatterns.org (2011). Ontology Design Patterns [Online]. Available at: http://ontologydesignpatterns.org/wiki/Main_Page. open in new tab
  23. Schober, D., et al. Towards naming conventions for use in controlled vocabulary and ontology engineering. Proceedings of BioOntologies SIG, ISMB07, pp. 29-32, 2007. open in new tab
  24. Schuemacher, M. Security engineering with patterns: origins, theoretical model, and new applications. Springer-Verlag, 2003. open in new tab
  25. Sommerville, I. Software Engineering. 8th. Harlow, UK: Addison-Wesley, 2006.
  26. Suárez-Figueroa, M., Gómez-Pérez, A., and Villazón-Terrazas, B. How to write and use the Ontology Requirements Specification Document. On the Move to Meaningful Internet Systems: OTM 2009, pp. 966-982, 2009. open in new tab
  27. Suárez-Figueroa, M.C. et al. (2009), D5. 4.2: Revision and extension of the neon methodology for building contextualized ontology networks. [Online]. Available at: http://www.neon-project. org
  28. Sure, Y., Staab, S. and Studer, R. Handbook on Ontologies. 2009. open in new tab
  29. Tartir, S. Ontology-driven question answering and ontology quality evaluation. 2009. open in new tab
  30. W3C, Heflin, J. (2004), OWL Web Ontology Language Use Cases and Requirements [Online]. Available at: http://www.w3.org/TR/webont-req/. open in new tab
  31. UNIWERSALNA ONTOLOGIA BEZPIECZEŃSTWA STRESZCZENIE Bezpieczeństwo odgrywa coraz bardziej istotną rolę w naszym codziennym ży- ciu. Użytkownicy systemów komputerowych wskazują więc na potrzebę utworzenia jednego, wspólnego i sformalizowanego modelu integrujących wiele opisów i defini- open in new tab
Verified by:
Gdańsk University of Technology

seen 72 times

Recommended for you

Meta Tags