Search results for: SECURITY ONTOLOGY - Bridge of Knowledge

Search

Search results for: SECURITY ONTOLOGY

Search results for: SECURITY ONTOLOGY

  • Security ontology construction and integration

    Publication

    - Year 2011

    There are many different levels on which we can examine security. Each one is different from others, all of them are dependent on the context. Hence the need to bear additional knowledge enabling efficient utilization of the knowledge by the computers. Such information can be provided by ontologies. The paper presentsgathered requirements needed to be taken into account when creating an ontology. The method of ontology creation...

  • Extendable Safety and Security Ontology

    Security plays an increasingly important role in our everyday life, and research and users of computer systems point out that the need arises for a common, formalised model capable of integrating different solutions. In this paper we show that an ontology can be designed and created in a way that will make it suitable for interoperability and integration. A security and safety ontology and the methodology for creating a common...

    Full text available to download

  • Krzysztof Goczyła prof. dr hab. inż.

    Krzysztof Goczyła, full professor of Gdańsk University of Technology, computer scientist, a specialist in software engineering, knowledge engineering and databases. He graduated from the Faculty of Electronics Technical University of Gdansk in 1976 with a degree in electronic engineering, specializing in automation. Since then he has been working at Gdańsk University of Technology. In 1982 he obtained a doctorate in computer science...

  • Ontology clustering by directions algorithm to expand ontology queries

    Publication

    - Year 2009

    This paper concerns formulating ontology queries. It describes existing languages in which ontologies can be queried. It focuses on languages which are intended to be easily understood by users who are willing to retrieve information from ontologies. Such a language can be, for example, a type of controlled natural language (CNL). In this paper a novel algorithm called Ontology Clustering by Directions is presented. The algorithm...

  • Ontology Visualization

    Ontologie bardzo często są reprezentowane w postaci grafu, którego wierzchołkami są obiekty występujące w prezentowanej ontologii a krawędziami relacje i powiązania pomiędzy tymi obiektami. Grafy reprezentujące ontologie mogą być złożone już dla średniego rozmiaru ontologii. Stąd niezbędna jest pełna i czytelna reprezentacja elementów takiego grafu. Dostępne rozwiązania zazwyczaj nie oferują reprezentacji pełnego zbioru elementów...

    Full text available to download

  • Increasing the Efficiency of Ontology Alignment by Tracking Changes in Ontology Evolution

    Publication

    - LECTURE NOTES IN COMPUTER SCIENCE - Year 2014

    In this paper we present a development of our ontology alignment framework based on varying semantics of attributes. Emphasising the analysis of explicitly given descriptions of how attributes change meanings they entail while being included within different concepts have been proved useful. Moreover, we claim that it is consistent with the intuitive way how people see the real world and how they find similarities and correspondences...

    Full text to download in external service

  • Ontology-Aided Software Engineering

    Publication

    - Year 2012

    This thesis is located between the fields of research on Artificial Intelligence (AI), Knowledge Representation and Reasoning (KRR), Computer-Aided Software Engineering (CASE) and Model Driven Engineering (MDE). The modern offspring of KRR - Description Logic (DL) [Baad03] is considered here as a formalization of the software engineering Methods & Tools. The bridge between the world of formal specification (governed by the mathematics)...

    Full text to download in external service

  • IT Business Standards as an Ontology Domain

    The aim of this paper is to report a selection of Semantic Web aspects pertaining to ontology development activities in the domain of the IT business standard (TOGAF 9) such as formulating competency questions, conceptualization of the domain, resolution of the source knowledge deficiency and applying common design patterns in the OWL formalization. Authors also try to determine target groups that may benefit from such ontology...

  • Application of Ontology In the ITIL Domain

    Publication

    Business standards tend to be less formal in description then strict technical norms. Authors of this chapter suggest applying ontological description (powered by the capabilities of the OWL language) to express Information Technology Infrastructure Library (ITIL). One of the goals of this initial study is to determine the usefulness of such semantic model in organizations that adopted or plan to adopt ITIL.

  • Contextual ontology for tonality assessment

    Publication

    classification tasks. The discussion focuses on two important research hypotheses: (1) whether it is possible to construct such an ontology from a corpus of textual document, and (2) whether it is possible and beneficial to use inferencing from this ontology to support the process of sentiment classification. To support the first hypothesis we present a method of extraction of hierarchy of contexts from a set of textual documents...

    Full text available to download

  • EVALUATION OF THE ENERGY SECURITY AS A COMPONENT OF NATIONAL SECURITY OF THE COUNTRY

    Publication
    • H. Dźwigoł
    • M. Dźwigoł–Barosz
    • Z. Zhyvko
    • R. Miśkiewicz
    • H. Pushak
    • R. Miskiewicz

    - Journal of Security and Sustainability Issues - Year 2019

    Full text to download in external service

  • Ontology as a Tool for the IT Management Standards Support

    In this paper the authors discuss the initial idea of using ontologies to model requirements of the standards that support IT management processes. The Open Group Architecture Framework (TOGAF) is set as an example. A need for transition from the generic model do the organization-specific one is indicated. The described example serves as a ground for considering the usefulness of such modeling approach in the wider spectrum of...

  • Hybrid approach to ontology specification and development

    Publication

    In this chapter a first draft of a hybrid ontology development approach is presented. The context of this method encompasses the multi-agent system equipped with knowledge bases and inferring engine. The process of ontology engineering appears as a complex issue, as it addresses different point-views of both, a client and a modeler with a requirements/system analyst. Regarding this, an approach based on the knowledge preprocessing...

  • Algebra of ontology modules for semantic agents

    Publication

    W środowisku Sieci Semantycznej problem precyzyjnego manipulowania jednostkami wiedzy nabiera szczególnego znaczenia. W tej publikacji dyskutujemy możliwość zaadaptowania do tego celu elastycznego aparatu algebry relacyjnej. Na bazie dysksji szkicujemy pewną szczególną analogię pomiędzy bazami danych a bazami wiedzy i używamy tej analogii do wprowadzenia algebry modułów semantycznych.

  • Ontology oriented threat detection system

    Publication

    - Year 2009

    W niniejszym artykule przedstawiony jest projekt opartego o ntologię systemu wykrywania zagrożeń w różnego typu monitorowanych środowiskach (OOTDS). Zakłada się, że umieszczone w środowisku czujniki na bieżąco dostarczają systemowi zdarzeń odzwierciedlających zmiany zachodzące w środowisku. Korzystając z sieci asynchronicznych bloków rosnącej złożoności OOTDS dokonuje analizy otrzymanych zdarzeń. Bloki wstępnego przetwarzania konwertują...

  • Towards Use of OntoClean for Ontology Contextualization

    Publication

    Ontologies are formal systems of concepts used to describe numerous domains of interest. Ontologies are usually very expressive, but it comes at a price of computationally expensive reasoning over them. In our previous work we discussed the possible performance benefits that can be obtained by decomposing an ontology into contexts. While the benefits are appealing, we discovered that, in our case, the main obstacle against using...

    Full text available to download

  • On UMTS security.

    Publication

    - Year 2004

    W artykule zaprezentowano przegląd hipotetycznych ataków na sieci i systemy telekomunikacji ruchomej, w tym systemy UMTS. Uwzględniono: podsłuch, nieautoryzowany dostęp, celowe zakłócanie oraz ataki typu DoS. Zaprezentowano mechanizmy podnoszące bezpieczeństwo pracy UMTS, w szczególności wprowadzające identyfikację i ''rozwinięte'' uwierzytelnianie a także kompleksową autoryzację dostępu.

  • Internal Security

    Journals

    ISSN: 2080-5268

  • Electroporation in Modern Oncology

    Publication

    - Year 2016

    Full text to download in external service

  • Developing an Ontology from Set of Experience KnowledgeStructure

    Publication

    - Year 2006

    When referring to knowledge forms,collecting for all decision eventsin a knowledge-explicit way becomes a significant ask for any company. Set of experience knowledge structure can assis in accomplishing this purpose.However,after collecting,distributing and sharing that knowledge as adecisional DNA is even a more important advance.Distributing and sharing companies' decisional DNA through an efficient development of Ontologies...

  • Influence and selection of basic concepts on ontology design

    Publication

    - Year 2010

    Ontologies as entities representing individual point of view on surrounding world introduce heterogeneity to knowledge representation. Common set of core concepts can introduce similarity big enough for further interoperability between ontologies. In this paper an experiment is presented proving that despite differences in detail ontologies stay similar in regard of core concepts. During the experiments NOIA methodology enhanced...

  • Ontology Engineering Aspects in the Intelligent Systems Development

    The ontology engineering encompasses both, artificial intelligence methods and software engineering discipline. The paper tries to address a selection of aspects pertaining to development activities such as choice of the environmental framework, functionality description, specification methods and roles definition. Authors refer to the ontology development projects they were involved in.

  • OSC - domain oriented ontology creation system

    Publication

    Ontologies are, as part of semantic web, a basic component to enrich content available in the Internet with a meaning understandable for computers. In this publication an architecture and functionality of a domain oriented web portal for collaborative creation and storage of ontologies is presented. The system is being created by Gdańsk University of Technology Electronics, Telecommunications and Informatics faculty's Department...

  • Cartometric: semantic ontology evaluation with cartographic methods

    Publication

    - Year 2008

    W ostatnich latach, głównie dzięki rozwojowi inicjatywy Sieci Semantycznej (ang. Semantic Web), staliśmy się świadkami powstawania coraz większej liczby gwałtownie ewoluujących ontologii. W takiej sytuacji zarówno użytkownicy Sieci, jak i komputerowe agenty potrzebują metody oceny właściwości ontologii, w szczególności takiej, która uwzględni jej cechy semantyczne, czyli kształt przestrzeni dozwolonych modeli. Niniejsza praca prezentuje...

  • Ontology management in the multi-agent system for the it evaluation

    Publication

    The team of researchers at the Gdańsk University of Technology is currently developing a model of the multi-agent system (MAS_IT) that would aid the IT managers to find the most appropriate technology to the goals assumed. The knowledge is to be provided by experts and stored in the facts and rules bases. The responsibility of the verification process-on the input and query stages-is given to the ontology, making it to some extend...

  • Application of the Regional Security Complex Theory for Security Analysis in the Persian Gulf

    Full text to download in external service

  • Security and knowledge management

    Publication

    Omówiono zagadnienia związane z problemami bezpieczeństwa w obszarach technologicznego wspomagania zarządzania wiedzą.

  • Graph security testing

    Set S ⊂ V is called secure set iff ∀ X ⊂ S | N [ X ] ∩ S | ≥ | N ( X ) \ S | [3]. That means that every subset of a secure set has at least as many friends (neighbour vertices in S) as enemies (neighbour vertices outside S) and will be defended in case of attack. Problem of determining if given set is secure is co −NP -complete, there is no efficient algorithm solving it [3]. Property testers are algorithms that distinguish inputs...

    Full text to download in external service

  • Security of Web Services

    Publication

    - Year 2006

    Artykuł przedstawia zagadnienia związane tematycznie z Web Services. W szczególności dotyczy problemów związanych z zapewniwniem poufności i integralności danych. Zdefiniowano model bezpieczeństwa Web Services integrujący trzy główne technologie: SOAP, UDDI, WSDL.

  • Zastosowania ontologii: Zastosowanie ontologii w mikroekonomii

    Publication

    - Year 2008

    Zarysowano problematykę zastosowania dziedzinowo zorientowanych ontologii dla konkretnej rzeczywistej grupy zagadnień. Przedstawiono znaczenie ontologii jako formy reprezentacji wiedzy oraz podkreślono jej przewagę nad innymi sposabami przechowywania informacji w aspekcie dynamicznym. zarysowano merytoryczną problematyke zagadnień ekonomicznych w zakresie analizy wskaźnikowej dla firm rynkowych. Dokonano dziedzinowego przedstawienia...

  • Future of medicine: personalized oncology

    Publication

    Understanding genetic and epigenetic mechanisms of tumorigenesis allows identifying many vital mutations affected the formation of various malignancies. This led to the discovery of a new therapeutic approach, based on molecular mechanisms in the world of medicine, which is called personalized medicine (PM). This review aims to outline the state of the art of the personalized medicine in treatment, taking into account anti-cancer...

    Full text to download in external service

  • Threats to Armenia’s Security in the National Strategy and Practice with Special Emphasis on External Security,

    The national security strategy adopted in 2007 provided a detailed definition of security and identified its threats. The key threat to the Armenian state was considered to be the Nagorno-Karabakh conflict. The document indicated the Collective Security Treaty Organisation main guarantor of security, with Russia being Armenia’s main partner in bilateral relations. The second position in the strategy was assigned to cooperation...

    Full text available to download

  • Ontology of the Design Pattern Language for Smart Cities Systems

    Publication

    The paper presents the definition of the design pattern language of Smart Cities in the form of an ontology. Since the implementation of a Smart City system is difficult, expensive and closely linked with the problems concerning a given city, the knowledge acquired during a single implementation is extremely valuable. The language we defined supports the management of such knowledge as it allows for the expression of a solution...

    Full text to download in external service

  • Communications, Multimedia, Ontology, Photonics and Internet Engineering 2012

    Publication

    Full text to download in external service

  • Fluent Editor and Controlled Natural Language in Ontology Development

    Full text to download in external service

  • Ontology of economy as the basis of Peter Koslowsk's ''Ethical economy''

    Publication

    - Year 2007

    Artykuł daje prezentacje i komentarz rozdziału o ontologicznych przesłankach teorii ekonomicznych z pracy Petera Koslowskiego ''Zasady etycznej ekonomii (''Princiles''of Ethical Economy, Kluwer Academic Publishers, 2001).

  • Enhancing the set of experience knowledge structure as a reflexive ontology

    Publication

    - Year 2007

    Przedstawiono mechanizm wspomagania reprezentacji wiedzy wyrażonej w postaci zbioru doświadczeń przy pomocy ontologii.

  • A model of an Ontology Oriented Threat Detection System (OOTDS)

    Publication

    - Year 2008

    Artykuł omawia projekt zorientowanego na ontologię systemu wykrywania zagrożeń (OOTDS) dla środowiska opisywalnego przez ontologię Bayesowską pierwszego rzędu wyrażoną w języku PR-OWL. Zakłada się, że środowisko monitorowane jest przez zbiór czujników dostarczających nieustannie systemowi OOTDS zdarzenia odzwierciedlające zmiany środowiska, wyrażone w specyficzny dla czujników sposób. Dedykowane moduły obsługi zdarzeń konwertują...

  • A Distributed Description of Facts in a Distributed Semantic Web Ontology

    Publication

    - Year 2008

    Inicjatywa Sieci Semantycznej (ang. Semantic Web) zakłada tworzenie w Internecie ontologii zawierających semantyczny opis dużych dziedzin wiedzy. Okazało się jednak, że przekroczenie pewnej wielkości ontologii powoduje szereg negatywnych zjawisk. Aby tym zjawiskom zapobiec, wiele prac koncentruje się na dzieleniu baz wiedzy. Celem tego opracowania jest zaprezentowanie problemów związanych z modularyzacją oraz przedstawienie kilku...

  • Lexicon Based Algorithm for Domain Ontology Merging and Alignment

    Publication

    More and more systems contain some kind of knowledge describing their field of operation. Such knowledge in many cases is stored as an ontology. A need arises for ability to quickly match those ontologies to enable interoperability of such systems. The paper presents a lexicon based algorithm for merging and aligning of OWL ontologies. The proposed similarity levels are being presented and the proposed algorithm is being described....

    Full text to download in external service

  • The Use of an Ontotrigger for Designing the Ontology of a Model Maturity Capsule

    The aim of this work is to give the definition and present the possibility of applying (introduced and defined here) ontotriggers to design the ontology of a maturity capsule used in the assessment of IT projects. The complexity of designing ontology processes raises the question of whether there is a need for designing ontologies in a situation where it is possible to map them. The work is divided into four main parts. The first...

    Full text available to download

  • Metody opisu ontologii: Ocena jakości ontologii dziedzinowych

    Publication

    - Year 2008

    Ontologia, jak każdy inny produkt myśli ludzkiej, powinien podlegać ocenie jakości. Stwierdzenie to nabiera szczególnego znaczenia wówczas, gdy ontologia staje się podstawą dla innych działań. Ocena ontologii może być przeprowadzona zasadniczo na dwa sposoby - w sposób subiektywny, w oparciu o rozumowanie, oraz w sposób obiektywny. Jeśli podstawą oceny ontologii jest rozumowanie, wiedza i doświadczenie ludzi, to ocena taka jest...

  • Areas of research in maritime security

    Publication

    - Year 2006

    W referacie przedstawiono analizę ważniejszych aspektów dotyczących ochrony żeglugi (maritime security) oraz zaproponowano nowe kierunki rozwoju.

  • Algorithms for testing security in graphs

    In this paper we propose new algorithmic methods giving with the high probability the correct answer to the decision problem of security in graphs. For a given graph G and a subset S of a vertex set of G we have to decide whether S is secure, i.e. every subset X of S fulfils the condition: |N[X] \cap S| >= |N[X] \ S|, where N[X] is a closed neighbourhood of X in graph G. We constructed a polynomial time property pseudotester based...

    Full text available to download

  • Plant Biotechnology in Food Security

    Publication

    - Year 2020

    Full text to download in external service

  • Security and Anonymity in Agent Systems

    Publication

    - Year 2012

    Many agent systems have been developed and suggested for commercial application. However, in spite of the significant potential offered by the agent paradigm, the lack of such important properties as security, anonymity and untracebility especially in open dynamical environment, such as the Internet, has blocked the active implementation of agent technologies. Protecting agent systems poses a more demanding challenge comparing...

    Full text to download in external service

  • Security Mechanisms in the Comcute System

    Publication

    - Year 2012

    The aim of this paper is pointing out the basic security problems and mechanisms in the Comcute system - maintenance system of large computing power in the face of critical crisis. Moreover security mechanism and tools useful to apply in laboratory model as well as target version of the Comcute system are presented.

  • The EU's Cyber Security Strategy

    Publication
    • M. Bharti

    - Year 2023

    Full text to download in external service

  • On some aspects of maritime security

    Publication

    - Year 2005

    Zostały przedstawione wybrane zagadnienia dotyczące ochrony żeglugi, w tym opisano Międzynarodowy Kodeks Ochrony Statków i Urządzeń Portowych - ISPS, Statkowy System Alarmowania (SSAS) oraz system AIS i System Identyfikacji i Śledzenia Dalekiego Zasięgu (LRIT). Przedstawiono również znaczenie nowoczesnej telekomunikacji dla potrze sprawnej ochrony żeglugi na morzach i oceanach

  • Quantum security and theory of decoherence

    Publication

    We sketch a relation between two crucial, yet independent, fields in quantum information research, viz. quantum decoherence and quantum cryptography. We investigate here how the standard cryptographic assumption of shielded laboratory, stating that data generated by a secure quantum device remain private unless explicitly published, is disturbed by the einselection mechanism of quantum Darwinism explaining the measurement process...

    Full text available to download