Formalizing information security knowledge

作者: Stefan Fenz , Andreas Ekelhart

DOI: 10.1145/1533057.1533084

关键词:

摘要: Unified and formal knowledge models of the information security domain are fundamental requirements for supporting enhancing existing risk management approaches. This paper describes a ontology which provides an ontological structure knowledge. Besides best-practice guidelines such as German IT Grundschutz Manual also concrete considered organization is incorporated. An evaluation conducted by expert team has shown that this model can be used to support broad range

参考文章(36)
Someswar Kesh, Pauline Ratnasingam, A knowledge architecture for IT security Communications of The ACM. ,vol. 50, pp. 103- 108 ,(2007) , 10.1145/1272516.1272521
M. Bishop, What is computer security ieee symposium on security and privacy. ,vol. 1, pp. 67- 69 ,(2003) , 10.1109/MSECP.2003.1176998
Almut Herzog, Nahid Shahmehri, Claudiu Duma, An Ontology of Information Security International Journal of Information Security and Privacy. ,vol. 1, pp. 1- 23 ,(2007) , 10.4018/JISP.2007100101
Denise Johnson McManus, Charles A. Snyder, Synergy between data warehousing and knowledge management: three industries reviewed International Journal of Information Technology and Management. ,vol. 2, pp. 85- 99 ,(2003) , 10.1504/IJITM.2003.002450
Changduk Jung, Ingoo Han, Bomil Suh, Risk analysis for electronic commerce using case-based reasoning International Journal of Intelligent Systems in Accounting, Finance & Management. ,vol. 8, pp. 61- 73 ,(1999) , 10.1002/(SICI)1099-1174(199903)8:1<61::AID-ISAF156>3.0.CO;2-6
Chintan Patel, Kaustubh Supekar, Yugyung Lee, E. K. Park, OntoKhoj: a semantic web portal for ontology searching, ranking and classification web information and data management. pp. 58- 61 ,(2003) , 10.1145/956699.956712
Maryam Alavi, Dorothy E. Leidner, Review: Knowledge management and knowledge management systems: conceptual foundations and research issues Management Information Systems Quarterly. ,vol. 25, pp. 107- 136 ,(2001) , 10.2307/3250961
Pertti Järvinen, Research Questions Guiding Selection of an Appropriate Research Method european conference on information systems. pp. 124- 131 ,(2000)
Detmar W. Straub, Richard J. Welke, Coping with systems risk: security planning models for management decision making Management Information Systems Quarterly. ,vol. 22, pp. 441- 469 ,(1998) , 10.2307/249551
Anya Kim, Jim Luo, Myong Kang, Security Ontology for Annotating Resources Lecture Notes in Computer Science. pp. 1483- 1499 ,(2005) , 10.1007/11575801_34