Abstract
Security plays an increasingly important role in our everyday life, and research and users of computer systems point out that the need arises for a common, formalised model capable of integrating different solutions. In this paper we show that an ontology can be designed and created in a way that will make it suitable for interoperability and integration. A security and safety ontology and the methodology for creating a common model allowing future expandability and reuse are considered. such interoperable ontologies can be easily integrated with current and future solutions and provide principles for increasing system interoperability.
Authors (2)
Cite as
Full text
- Publication version
- Accepted or Published Version
- License
- open in new tab
Keywords
Details
- Category:
- Articles
- Type:
- artykuły w czasopismach recenzowanych i innych wydawnictwach ciągłych
- Published in:
-
Studies & Proceedings of Polish Association for Knowledge Management
pages 16 - 29,
ISSN: 1732-324X - Publication year:
- 2012
- Bibliographic description:
- Boiński T., Krawczyk H.: Extendable Safety and Security Ontology// Studies & Proceedings of Polish Association for Knowledge Management. -., nr. 60 (2012), s.16-29
- Bibliography: test
-
- Anderson R. Security engineering, Wydawnictwo Naukowo Techniczne, 2005.
- Avizienis, A., Laprie, J.C., Randell, B., and Landwehr, C. Basic concepts and taxonomy of dependable and secure computing. Dependable and Secure Computing, IEEE Transactions on, 1(1):11-33, 2004. open in new tab
- Boiński, T. Procedures for merging and alignment of domain ontologies, PhD Thesis [in Polish]. Faculty of Electronics, Telecommunications and Informatics, Gdansk University of Technology, 2012.
- Boiński, T., Orłowski, P., Szymański, J., and Krawczyk, H. Security ontology construction and integration. In Proceedings of KEOD2011 of the 3nd International Joint Conference on Knowledge Discovery, Knowledge Engineering and Knowledge Management, pp. 369-374. INSTICC, 2011. open in new tab
- De Nicola, A., Missikoff, M., and Navigli, R. A software engineering approach to ontology building. Information Systems, 34(2): 258-275, 2009. open in new tab
- Donner, M. Toward a security ontology. IEEE Security & Privacy, pp. 6-7, 2003. open in new tab
- ENISA. Risk management: implementation principles and inventories for risk management/risk assessment methods and tools. Technical report, 2006. open in new tab
- Enisa. Enisa: a European Union Agency -Glossary of Risk Management. 2010.
- Fenz, S., Pruckner, T., and Manutscheri, A. Ontological mapping of information security best-practice guidelines. In Business Information Systems, pp. 49-60. Springer, 2009. open in new tab
- Firesmith, D.G. A Taxonomy of safety-related requirements. In International Workshop on High Assurance Systems (RHAS'05), 2005. open in new tab
- Firesmith, D.G. A taxonomy of security-related requirements. In International Workshop on High Assurance Systems (RHAS'05). Citeseer, 2005. open in new tab
- Guttman, B. and Roback, E.A. An introduction to computer security: the NIST handbook. DIANE Publishing, 1995. open in new tab
- Herzog, A., Shahmehri, N., and Duma, C. An ontology of information security. 2009. open in new tab
- International Atomic Energy Agency (2007). IAEA Safety Glossary Terminology Used in Nuclear Safety and Radiation Protection [Online]. Available at: http://www- pub.iaea.org/MTCD/publications/PDF/Pub1290_web.pdf. open in new tab
- ISO/IEC (2004). Information technology -Security techniques -Management of information and communications technology security -Part 1: Concepts and models for information and communications technology security management [Online]. Available at: http://www.iso.org/iso/iso_catalogue/catalogue_tc/catalogue_detail.htm?csnumber=39066. open in new tab
- Jian, N., Hu, W., Cheng, G., and Qu, Q. Falcon-AO: Aligning ontologies with Falcon. In Integrating Ontologies Workshop Proceedings, p. 85. Citeseer, 2005.
- Kim, A., Luo, J., and Kang, M. Security ontology for annotating resources. On the Move to Meaningful Internet Systems 2005: CoopIS, DOA, and ODBASE, pp. 1483-1499, 2005. open in new tab
- Knublauch, H. Protégé-owl api programmer's guide. 2009.
- Knublauch, H., Fergerson, R.W., Noy, N.F., and Musen, M.A. The Protégé OWL plugin: An open development environment for semantic web applications. The Semantic Web- ISWC 2004, pp. 229-243, 2004. open in new tab
- Krawczyk, H. Ontology engineering and its applications. Department of Computer System Architecture, ETI Faculty, Gdańsk University of Technology, 2007. open in new tab
- Noy, N.F., McGuinness, D.L., et al. Ontology development 101: A guide to creating your first ontology, 2001. open in new tab
- ontologydesignpatterns.org (2011). Ontology Design Patterns [Online]. Available at: http://ontologydesignpatterns.org/wiki/Main_Page. open in new tab
- Schober, D., et al. Towards naming conventions for use in controlled vocabulary and ontology engineering. Proceedings of BioOntologies SIG, ISMB07, pp. 29-32, 2007. open in new tab
- Schuemacher, M. Security engineering with patterns: origins, theoretical model, and new applications. Springer-Verlag, 2003. open in new tab
- Sommerville, I. Software Engineering. 8th. Harlow, UK: Addison-Wesley, 2006.
- Suárez-Figueroa, M., Gómez-Pérez, A., and Villazón-Terrazas, B. How to write and use the Ontology Requirements Specification Document. On the Move to Meaningful Internet Systems: OTM 2009, pp. 966-982, 2009. open in new tab
- Suárez-Figueroa, M.C. et al. (2009), D5. 4.2: Revision and extension of the neon methodology for building contextualized ontology networks. [Online]. Available at: http://www.neon-project. org
- Sure, Y., Staab, S. and Studer, R. Handbook on Ontologies. 2009. open in new tab
- Tartir, S. Ontology-driven question answering and ontology quality evaluation. 2009. open in new tab
- W3C, Heflin, J. (2004), OWL Web Ontology Language Use Cases and Requirements [Online]. Available at: http://www.w3.org/TR/webont-req/. open in new tab
- UNIWERSALNA ONTOLOGIA BEZPIECZEŃSTWA STRESZCZENIE Bezpieczeństwo odgrywa coraz bardziej istotną rolę w naszym codziennym ży- ciu. Użytkownicy systemów komputerowych wskazują więc na potrzebę utworzenia jednego, wspólnego i sformalizowanego modelu integrujących wiele opisów i defini- open in new tab
- Verified by:
- Gdańsk University of Technology
seen 72 times
Recommended for you
Security ontology construction and integration
- T. M. Boiński,
- P. Orłowski,
- J. Szymański
- + 1 authors
Ontology-based text convolution neural network (TextCNN) for prediction of construction accidents
- S. Donghui,
- L. Zhigang,
- J. Zurada
- + 3 authors