SECURITY ONTOLOGY CONSTRUCTION AND INTEGRATION

Tomasz Boiński, Piotr Orłowski, Julian Szymański, Henryk Krawczyk

2011

Abstract

There are many different levels on which we can examine security. Each one is different from others, all of them are dependent on the context. Hence the need to bear additional knowledge enabling efficient utilization of the knowledge by the computers. Such information can be provided by ontologies. The paper presents gathered requirements needed to be taken into account when creating an onthology. The method of ontology creation and the criteria for keywaords selection are presented. Ontology created in such way should provide means for interoperability with other systems.

References

  1. Anderson, R. (2005). Inz?ynieria zabezpieczeÁ.
  2. Avizienis, A., Laprie, J., Randell, B., and Landwehr, C. (2004). Basic concepts and taxonomy of dependable and secure computing. Dependable and Secure Computing, IEEE Transactions on, 1(1):11-33.
  3. BoiÁski, T., Budnik, L., Jakowski, A., MroziÁski, J., and Mazurkiewicz, K. (2009). OCS - Domain Oriented Ontology Creation System. In SMI'09, 4th International Conference 'Congress of Young IT Scientists'. HARD Olsztyn.
  4. BoiÁski, T., Jaworska, A., Kleczkowski, R., Kunowski, P., and SzamaÁski, J. (2010a). Zespolowa budowa ontologii z wykorzystaniem systemu OCS oraz edytora Protégé. Zeszyty Naukowe Wydzialu ETI Politechniki GdaÁskiej, 19:101-105.
  5. BoiÁski, T., Orlowski, P., Szpryngier, P., and Krawczyk, H. (2010b). Influence and selection of basic concepts on ontology design. In KEOD2010, pages 364-369.
  6. Borgosz-Koczwara, M. and Herlender, K. (2008). BezpieczeÁstwo energetyczne a rozwój odnawialnych zródel energii. Energetyka, pages 194-197.
  7. De Nicola, A., Missikoff, M., and Navigli, R. (2009). A software engineering approach to ontology building. Information Systems, 34(2):258-275.
  8. Donner, M. (2003). Toward a security ontology. IEEE Security and Privacy, pages 6-7.
  9. Dubisz, S. (2008). Uniwersalny slownik je¸zyka polskiego. Wydawnictwo Naukowe PWN.
  10. ENISA (2006). Risk management: implementation principles and inventories for risk management/risk assessment methods and tools. Technical report.
  11. Enisa (2010). Enisa: a European Union Agency - Glossary of Risk Management. http://www.enisa.europa.eu/act/rm/cr/riskmanagement-inventory/glossary.
  12. Firesmith, D. (2005a). A Taxonomy of safety-related requirements. In International Workshop on High Assurance Systems (RHAS'05).
  13. Firesmith, D. (2005b). A taxonomy of security-related requirements. In International Workshop on High Assurance Systems (RHAS'05). Citeseer.
  14. Gennari, J. H., Musen, M. A., Fergerson, R. W., Grosso, W. E., Crubzy, M., Eriksson, H., Noy, N. F., and Tu, S. W. (2002). The evolution of Protege: An environment for knowledge-based systems development. Stanford Medical Institute, Stanford.
  15. Gruber, T. et al. (1993). A translation approach to portable ontology specifications. Knowledge acquisition, 5:199-199.
  16. Herzog, A., Shahmehri, N., and Duma, C. (2009). An ontology of information security. International Journal of Information Security.
  17. Horridge, M. and Bechhofer, S. (2009). The OWL API: a Java API for working with OWL 2 ontologies. In Proc. of the 5th Int. Workshop on OWL: Experiences and Directions (OWLED 2009), CEUR Workshop Proceedings, pages 23-24.
  18. Jian, N., Hu, W., Cheng, G., and Qu, Y. (2005). FalconAO: Aligning ontologies with Falcon. In Integrating Ontologies Workshop Proceedings. Citeseer.
  19. Kim, A., Luo, J., and Kang, M. (2005). Security ontology for annotating resources. On the Move to Meaningful Internet Systems 2005: CoopIS, DOA, and ODBASE, pages 1483-1499.
  20. Kissel, R. (2006). Glossary of key information security terms. Glossary, National Institute of Standards and Technology, US Department of Commerce.
  21. Knublauch, H., Fergerson, R., Noy, N., and Musen, M. (2004). The Protégé OWL plugin: An open development environment for semantic web applications. The Semantic Web-ISWC 2004, pages 229-243.
  22. Krawczyk, H. (2007). Ontology engineering and its applications. Department of Computer System Architecture, ETI Faculty, GdaÁsk University of Technology.
  23. Nowakowski, Z. and Szafran, H. (2009). BezpieczeÁstwo w XXI wieku : strategie bezpieczeÁstwa narodowego Polski i wybranych paÁstw. Wydawnictwo Politechniki Rzeszowskiej.
  24. Noy, N., McGuinness, D., et al. (2001). Ontology development 101: A guide to creating your first ontology.
  25. Noy, N. F., Fergerson, R. W., and Musen, M. A. (2000). The knowledge model of Protege-2000: Combining interoperability and flexibility. In Lecture Notes in Computer Science. Springer-Verlag.
  26. ODP Portal (2011). Ontology Design Patterns. http://ontologydesignpatterns.org/wiki/Main Page.
  27. Schober, D., Kusnierczyk, W., Lewis, S., Lomax, J., et al. (2007). Towards naming conventions for use in controlled vocabulary and ontology engineering. Proceedings of BioOntologies SIG, ISMB07, pages 29- 32.
  28. Sommerville, I. (2006). Software Engineering. 8th. Harlow, UK: Addison-Wesley.
  29. Suárez-Figueroa, M. et al. (2009a). D5. 4.2: Revision and extension of the neon methodology for building contextualized ontology networks. NeOn project. http://www. neon-project. org.
  30. Suárez-Figueroa, M., Gómez-Pérez, A., and VillazónTerrazas, B. (2009b). How to write and use the Ontology Requirements Specification Document. On the Move to Meaningful Internet Systems: OTM 2009, pages 966-982.
  31. Sure, Y., Staab, S., and Studer, R. (2009). Handbook on Ontologies. Springer.
  32. Tartir, S. (2009). Ontology-driven Question Answering and Ontology Quality Evaluation. PhD thesis, University of Georgia.
  33. Z?ukrowska, K. and Gra¸cik, M. (2006). BezpieczeÁstwo mie¸dzynarodowe: teoria i praktyka. Szkola Glówna Handlowa w Warszawie.
Download


Paper Citation


in Harvard Style

Boiński T., Orłowski P., Szymański J. and Krawczyk H. (2011). SECURITY ONTOLOGY CONSTRUCTION AND INTEGRATION . In Proceedings of the International Conference on Knowledge Engineering and Ontology Development - Volume 1: KEOD, (IC3K 2011) ISBN 978-989-8425-80-5, pages 369-374. DOI: 10.5220/0003636003690374


in Bibtex Style

@conference{keod11,
author={Tomasz Boiński and Piotr Orłowski and Julian Szymański and Henryk Krawczyk},
title={SECURITY ONTOLOGY CONSTRUCTION AND INTEGRATION},
booktitle={Proceedings of the International Conference on Knowledge Engineering and Ontology Development - Volume 1: KEOD, (IC3K 2011)},
year={2011},
pages={369-374},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0003636003690374},
isbn={978-989-8425-80-5},
}


in EndNote Style

TY - CONF
JO - Proceedings of the International Conference on Knowledge Engineering and Ontology Development - Volume 1: KEOD, (IC3K 2011)
TI - SECURITY ONTOLOGY CONSTRUCTION AND INTEGRATION
SN - 978-989-8425-80-5
AU - Boiński T.
AU - Orłowski P.
AU - Szymański J.
AU - Krawczyk H.
PY - 2011
SP - 369
EP - 374
DO - 10.5220/0003636003690374