ABSTRACT
The different environments of human performance need transparent ways to plan and manage related problems for security. There is a significant increase in the complexity project and plan security, it needs that means of manipulation of the information has been adopted. In this paper we present the CoreSec an CoreOntology for the Security domain. Our proposal considers that the security will be more efficient if this will be based on a formal information model of the domain, as an ontology. The architecture presented here intends to be the most generic possible, facilitating the development of security solutions.
- Anderson, R., Hunstad, A., Hallberg, J. Evolution of the Security of Components in Distributed Information Systems. Swedish Defence Reaserch Agency. Scientific report, 2003. 63p.Google Scholar
- Beal, Adriana, "Segurança da Informação: Princípios e Melhores Práticas para a Proteção dos Ativos de Informação nas Organizações". São Paulo: Atlas, 2005.Google Scholar
- Boran, Sean. IT Security CookBook. 1996--2003.Google Scholar
- Chang, E., et al (2005) "Information engineering of a software engineering ontology" in Proceedings of the 3 rd IEEE International Conference on Industrial Informatics (INDIN). Perth, Australia. 2005. pp 366--371.Google Scholar
- Donner, M. Toward a Security Ontology. IEEE Security&Privacy Magazine, v. 1, n. 3, p. 6--7, 2003. Google ScholarDigital Library
- Fernández, M. A.; Gómez-Pérez, A.; Juristo, N. Methontology: From ontological art towards ontological engineering. In Proceedings of the AAAI Spring Symposium Series, 1997, p. 33--40.Google Scholar
- Freitas, F. Ontologias e a web semântica. In: Renata Vieira; Fernando Osório. (Org.). Anais do XXIII Congresso da Sociedade Brasileira de Computação. Campinas: SBC, 2003. v. 8, p. 1--52.Google Scholar
- Guarino, N. Formal Ontologies and Information Systems. In: FIRST INTERNATIONAL CONFERENCE (FOIS), 1, 1998, Trento, Itália. Anais... Trento: IOS Press, 1998.Google Scholar
- Guizzardi. G. "Uma abordagem metodológica de desenvolvimento para e com reuso, baseada em ontologias formais de domínio." Dissertação de Mestrado. Universidade Federal do Espírito Santo. 2000.Google Scholar
- JENA 2 Ontology API. Disponível em: http://jena.sourceforge.net/ontology/ 2003.Google Scholar
- Gruber, Thomas R. Towards Principles for the Design of Ontologies Used for Knowledge Sharing. International Journal of Human and Computer Studies, 43(5/6): 907--928. 1995. Google ScholarDigital Library
- IEEE Standard for developing software life cycle processes. IEEE Computing Society, 1996.Google Scholar
- ISO/IEC 15.408. Information technology - Security techniques - Evaluation criteria for IT security. 1999, 222p.Google Scholar
- ISO/IEC 17799 (2001) "Information technology - Code of pratice for information security management". 2001, 56p.Google Scholar
- Jenz, Dieter E. Ontology-Based Business Process Management, the vision statement. Strategic White Paper, Draft http://www.bptrends.com/ (2003), Germany.Google Scholar
- Martimiano, L. A. F. Sobre a estruturação de informação de segurança computacional: o uso de ontologia. 163 p. Tese (Doutorado em Ciências de Computação e Matemática Computacional) -- Instituto de Ciências Matemáticas e de Computação -- ICMC, Universidade de São Paulo - USP, São Carlos, 2006.Google Scholar
- NIST. National Vulnerability Database. http://nvd.nist.gov/ (2007)Google Scholar
- Noy, N. F.; McGuiness, D. L. Ontology development 101: A Guide to Creating Your First Ontology. Knowledge Systems Laboratory -- Stanford University, TR KSL-01-05, 2001.Google Scholar
- OWL. Web ontology language overview - w3c;. {Online}. Disponível: http://www.w3.org/TR/owl-features/ Acessado em: Out. 2006.Google Scholar
- PMI - Project Management Institute. (2004) A Guide to the Project Management Body of Knowledge. -- ANSI/PMI 99-01 2004. Project Management Institute. Four Campus Boulevard. Newtown Square. USA.Google Scholar
- Protégé. Protégé ontology editor. {Online}. Disponível: http://protege.stanford.edu/doc/users.html Acessado em: Out. 2006.Google Scholar
- Raskin, V.; Hempelmann, C. F.; Triezenberg, K. E.; Nirenburg, S. Ontology in information security: A useful theoretical Foundation and methodology tool. In: Proceedings of the Workshop of the New Security Paradigms, 2001. Google ScholarDigital Library
- Shumacher, M. Toward a Security Core Ontology. In: Security Engineering with Patterns -- Origins, Theoretical Model and New Aplications, Springs Verlag, p. 87--96, lectures Notes in Computer Science (LNCS 2754), 2003.Google ScholarCross Ref
- T. Berners-Lee, O. Lassila, and J. Hendler. The semantic web. Scientific American, 5:34--43, 2001.Google ScholarCross Ref
- Uschold, M, Grüninger, M. Ontologies: Principles, Methods and Applications. Knowledge Engineering Review. Vol. 11, N° 02. June. 1996.Google Scholar
- Valente, A., Breuker, J. Towards Principled Core Ontologies. In B. R. Gaines and M. Mussen, editors, Proceedings of the KAW-96, Banff, Canada, 1996.Google Scholar
- CoreSec: an ontology of security aplied to the business process of management
Recommendations
Interoperability of Security-Enabled Internet of Things
The future Internet will embrace the intelligence of Web 3.0 and the omnipresence of every day connected objects. The later was envisioned as the Internet of Things. Security and interoperability concerns are hindering the service innovations using the ...
Semantic business process space for intelligent management of sales order business processes
A company's competitiveness relies heavily on its business processes and accurate knowledge to execute its business processes with agility and efficiency. Business Process Management (BPM) initially promised to provide the business world with suitable ...
Ontology-based semantic matching for business process management
A company's competitiveness relies heavily on its business processes, and thus the need to execute business processes with agility and efficiency is ever-increasing. However, examination of current practice of business process management reveals the ...
Comments