Abstract
This paper presents a system design using the design and linking semantic technology of ontologies by mapping the structure base and finding identical meanings of each text. The Wu and Palmer method and WordNet database were used for this purpose. The accuracy of the results of the concept are measured by using Recall, Precision, and F-Measure. Then, the proposed designed can be used to developed tools to qualify the security system for communications security domain under the standards of information security management for ISO 27001:2013. However, the cost of certification to organisations to meet international standards is considerable. Our intention was to demonstrate the ontology-based concept for organisations to be able to reduce their certification costs by waiving the requirement for an external consultant to evaluate their standards and policies.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
An Introduction to ISO 27001 (ISO27001). http://www.27000.org/iso-27001.htm. Accessed October 2016
Kanno, Y.: Information Security Measures Benchmark (ISM-Benchmark). IT Security Center, Information-Technology Promotion Agency, Japan (2009)
Sharma, N.K., Dash, P.K.: Effectiveness of ISO 27001, as an information security management system: an analytical study of financial aspects. Far East J. Psychol. Bus. 9(3), 42–55 (2012)
Uschold, M., Gruninger, M.: Ontologies principles methods and applications. Knowl. Eng. Rev. 11(2), 93–155 (1996)
World Wide Web Consortium: OWL Web Ontology Language (2004). http://www.w3.org/TR/owl-features/
Miller, G.A., Beckwith, R., Fellbaum, C., Gross, D., Miller, K.: Introduction to WordNet: an on-line lexical database. Int. J. Lexicogr. 3, 235–244 (1990)
Pérez, J., Arenas, M., Gutierrez, C.: Semantics and complexity of SPARQL. Universidad de Talca, Chile (2009)
Lovrić, Z.: Model of simplified implementation of PCI DSS by using ISO 27001 standard. In: Central European Conference on Information and Intelligent Systems, 19–21 September 2012
Shrivastava, A.K.: ISO27001 compliance via artificial neural network. In: 13th IEEE International Symposium on Pacific Rim Dependable Computing (2007)
Fenz, S., Weippl, E.: Ontology based IT-security planning. In: Secure Business, Austria (2006)
Fenz, S., Goluch, G., Ekelhart, A., Riedl, B., Weippl, E.: Information security fortification by ontological mapping of the ISO/IEC 27001 standard. In: 13th IEEE International Symposium on Pacific Rim Dependable Computing (2007)
Fenz, S.: Ontology-based generation of IT-security metrics. In: SAC 2010, Sierre, Switzerland, 22–26 March 2010
Liu, X., Cao, L., Dai, W.: Overview of ontology mapping and approach. In: 2011 4th IEEE International Conference on Broadband Network and Multimedia Technology (IC-BNMT), pp. 592–595, 28–30 October 2011
Wu, Z., Palmer, M.: Verb semantic and lexical selection. In: Proceeding of 32nd Annual Meeting of the Association for Computational Linguistics (ACL), Las Cruces, US, pp. 133–138 (1994)
Corley, C., Mihalcea, R.: Measuring the semantic similarity of texts. Department of Computer Science, University of North Texas (2005)
Fernando, S., Stevenson, M.: A semantic similarity approach to paraphrase detection. Department of Computer Science, University of Sheffield, Sheffield, UK (2008)
Acknowledgement
Many thanks to Mr. Roy Morien and Mr. Kevin Roebl of the Naresuan University Language Center for his editing assistance and advice on English expression in this document.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Sirisom, P., Payakpate, J., Wongthai, W. (2017). A System Design for the Measurement and Evaluation of the Communications Security Domain in ISO 27001:2013 Using an Ontology. In: Kim, K., Joukov, N. (eds) Information Science and Applications 2017. ICISA 2017. Lecture Notes in Electrical Engineering, vol 424. Springer, Singapore. https://doi.org/10.1007/978-981-10-4154-9_30
Download citation
DOI: https://doi.org/10.1007/978-981-10-4154-9_30
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-4153-2
Online ISBN: 978-981-10-4154-9
eBook Packages: EngineeringEngineering (R0)