A Survey of Security Assessment Ontologies

作者: Mario Jino , Ferrucio de Franco Rosa , Ferrucio de Franco Rosa

DOI: 10.1007/978-3-319-56535-4_17

关键词: Subject (documents)Field (computer science)Domain (software engineering)Security assessmentWork (electrical)Computer scienceLiterature surveyWorld Wide WebData scienceKey (cryptography)Preliminary analysis

摘要: A literature survey on ontologies concerning the Security Assessment domain has been carried out to uncover initiatives that aim at formalizing concepts from field of research. preliminary analysis and a discussion selected works are presented. Our main contribution is an updated review, describing key characteristics, results, research issues, application domains papers. We have also detected gaps in could be subject further studies field. This work meant useful for security researchers who wish adopt formal approach their methods.

参考文章(35)
Amina Souag, Camille Salinesi, Isabelle Comyn-Wattiau, None, Ontologies for Security Requirements: A Literature Survey and Classification conference on advanced information systems engineering. pp. 61- 69 ,(2012) , 10.1007/978-3-642-31069-0_5
Amina Souag, Camille Salinesi, Raúl Mazo, Isabelle Comyn-Wattiau, None, A Security Ontology for Security Requirements Elicitation engineering secure software and systems. pp. 157- 177 ,(2015) , 10.1007/978-3-319-15618-7_13
Lea Viljanen, Towards an Ontology of Trust Trust, Privacy, and Security in Digital Business. pp. 175- 184 ,(2005) , 10.1007/11537878_18
Stefan Fenz, Thomas Pruckner, Arman Manutscheri, Ontological Mapping of Information Security Best-Practice Guidelines business information systems. pp. 49- 60 ,(2009) , 10.1007/978-3-642-01190-0_5
Ulrich Koinig, Simon Tjoa, Jungwoo Ryoo, Contrology - An Ontology-Based Cloud Assurance Approach workshops on enabling technologies: infrastracture for collaborative enterprises. pp. 105- 107 ,(2015) , 10.1109/WETICE.2015.43
Fabio Massacci, John Mylopoulos, Federica Paci, Thein Thun Tun, Yijun Yu, An Extended Ontology for Security Requirements conference on advanced information systems engineering. pp. 622- 636 ,(2011) , 10.1007/978-3-642-22056-2_64
Ioana Ciuciu, Brecht Claerhout, Louis Schilders, Robert Meersman, Ontology-based matching of security attributes for personal data access in e-health international conference on move to meaningful internet systems. pp. 605- 616 ,(2011) , 10.1007/978-3-642-25106-1_13
Ratsameetip Wita, Nattanatch Jiamnapanon, Yunyong Teng-amnuay, An Ontology for Vulnerability Lifecycle international symposium on intelligent information technology and security informatics. pp. 553- 557 ,(2010) , 10.1109/IITSI.2010.141
P. Salini, S. Kanmani, Ontology-based representation of reusable security requirements for developing secure web applications International Journal of Internet Technology and Secured Transactions. ,vol. 5, pp. 63- 83 ,(2013) , 10.1504/IJITST.2013.058295
Henk Birkholz, Ingo Sieverdingbeck, Karsten Sohr, Carsten Bormann, IO: An Interconnected Asset Ontology in Support of Risk Management Processes availability, reliability and security. pp. 534- 541 ,(2012) , 10.1109/ARES.2012.73