An Ontology-Based Approach to Information Systems Security Management

作者: Bill Tsoumas , Stelios Dritsas , Dimitris Gritzalis

DOI: 10.1007/11560326_12

关键词:

摘要: Complexity of modern information systems (IS), impose novel security requirements. On the other hand, ontology paradigm aims to support knowledge sharing and reuse in an explicit mutually agreed manner. Therefore, this paper we set foundations for establishing a knowledge-based, ontology-centric framework with respect management arbitrary IS. We demonstrate that linking between high-level policy statements deployable controls is possible implementation achievable. This may critical expert activities requirements identification selection certain countermeasures. In addition, present structured approach identify its parts. Our being represented neutral manner, based on well-known standards, extending widely used modeling approaches.

参考文章(29)
Kalina Bontcheva, Hamish Cunningham, Valentin Tablan, Diana Maynard, A framework and graphical development environment for robust NLP tools and applications. meeting of the association for computational linguistics. pp. 168- 175 ,(2002)
Gianluca Tonti, Jeffrey M. Bradshaw, Renia Jeffers, Rebecca Montanari, Niranjan Suri, Andrzej Uszok, Semantic web languages for policy representation and reasoning: a comparison of KAoS, Rei, and Ponder international semantic web conference. pp. 419- 437 ,(2003) , 10.1007/978-3-540-39718-2_27
Andrzej Uszok, Jeffrey M Bradshaw, Renia Jeffers, None, KAoS: A Policy and Domain Services Framework for Grid Computing and Semantic Web Services Lecture Notes in Computer Science. pp. 16- 26 ,(2004) , 10.1007/978-3-540-24747-0_2
진승헌, 조영섭, OASIS SAML(Security Assertion Markup Language) v2.0 고찰 및 활용 한국멀티미디어학회지. ,vol. 10, pp. 59- 70 ,(2006)
Deborah L. McGuinness, Natalya F. Noy, Ontology Development 101: A Guide to Creating Your First Ontology ,(2002)
Marc Donner, Toward a Security Ontology ieee symposium on security and privacy. ,vol. 1, pp. 6- 7 ,(2003) , 10.1109/MSP.2003.10004
L. Lymberopoulos, E. Lupu, M. Sloman, PONDER policy implementation and validation in a CIM and differentiated services framework network operations and management symposium. ,vol. 1, pp. 31- 44 ,(2004) , 10.1109/NOMS.2004.1317639