skip to main content
10.1145/1621087.1621100acmotherconferencesArticle/Chapter ViewAbstractPublication Pageseatis-orgConference Proceedingsconference-collections
research-article

CoreSec: an ontology of security aplied to the business process of management

Published:10 September 2008Publication History

ABSTRACT

The different environments of human performance need transparent ways to plan and manage related problems for security. There is a significant increase in the complexity project and plan security, it needs that means of manipulation of the information has been adopted. In this paper we present the CoreSec an CoreOntology for the Security domain. Our proposal considers that the security will be more efficient if this will be based on a formal information model of the domain, as an ontology. The architecture presented here intends to be the most generic possible, facilitating the development of security solutions.

References

  1. Anderson, R., Hunstad, A., Hallberg, J. Evolution of the Security of Components in Distributed Information Systems. Swedish Defence Reaserch Agency. Scientific report, 2003. 63p.Google ScholarGoogle Scholar
  2. Beal, Adriana, "Segurança da Informação: Princípios e Melhores Práticas para a Proteção dos Ativos de Informação nas Organizações". São Paulo: Atlas, 2005.Google ScholarGoogle Scholar
  3. Boran, Sean. IT Security CookBook. 1996--2003.Google ScholarGoogle Scholar
  4. Chang, E., et al (2005) "Information engineering of a software engineering ontology" in Proceedings of the 3 rd IEEE International Conference on Industrial Informatics (INDIN). Perth, Australia. 2005. pp 366--371.Google ScholarGoogle Scholar
  5. Donner, M. Toward a Security Ontology. IEEE Security&Privacy Magazine, v. 1, n. 3, p. 6--7, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Fernández, M. A.; Gómez-Pérez, A.; Juristo, N. Methontology: From ontological art towards ontological engineering. In Proceedings of the AAAI Spring Symposium Series, 1997, p. 33--40.Google ScholarGoogle Scholar
  7. Freitas, F. Ontologias e a web semântica. In: Renata Vieira; Fernando Osório. (Org.). Anais do XXIII Congresso da Sociedade Brasileira de Computação. Campinas: SBC, 2003. v. 8, p. 1--52.Google ScholarGoogle Scholar
  8. Guarino, N. Formal Ontologies and Information Systems. In: FIRST INTERNATIONAL CONFERENCE (FOIS), 1, 1998, Trento, Itália. Anais... Trento: IOS Press, 1998.Google ScholarGoogle Scholar
  9. Guizzardi. G. "Uma abordagem metodológica de desenvolvimento para e com reuso, baseada em ontologias formais de domínio." Dissertação de Mestrado. Universidade Federal do Espírito Santo. 2000.Google ScholarGoogle Scholar
  10. JENA 2 Ontology API. Disponível em: http://jena.sourceforge.net/ontology/ 2003.Google ScholarGoogle Scholar
  11. Gruber, Thomas R. Towards Principles for the Design of Ontologies Used for Knowledge Sharing. International Journal of Human and Computer Studies, 43(5/6): 907--928. 1995. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. IEEE Standard for developing software life cycle processes. IEEE Computing Society, 1996.Google ScholarGoogle Scholar
  13. ISO/IEC 15.408. Information technology - Security techniques - Evaluation criteria for IT security. 1999, 222p.Google ScholarGoogle Scholar
  14. ISO/IEC 17799 (2001) "Information technology - Code of pratice for information security management". 2001, 56p.Google ScholarGoogle Scholar
  15. Jenz, Dieter E. Ontology-Based Business Process Management, the vision statement. Strategic White Paper, Draft http://www.bptrends.com/ (2003), Germany.Google ScholarGoogle Scholar
  16. Martimiano, L. A. F. Sobre a estruturação de informação de segurança computacional: o uso de ontologia. 163 p. Tese (Doutorado em Ciências de Computação e Matemática Computacional) -- Instituto de Ciências Matemáticas e de Computação -- ICMC, Universidade de São Paulo - USP, São Carlos, 2006.Google ScholarGoogle Scholar
  17. NIST. National Vulnerability Database. http://nvd.nist.gov/ (2007)Google ScholarGoogle Scholar
  18. Noy, N. F.; McGuiness, D. L. Ontology development 101: A Guide to Creating Your First Ontology. Knowledge Systems Laboratory -- Stanford University, TR KSL-01-05, 2001.Google ScholarGoogle Scholar
  19. OWL. Web ontology language overview - w3c;. {Online}. Disponível: http://www.w3.org/TR/owl-features/ Acessado em: Out. 2006.Google ScholarGoogle Scholar
  20. PMI - Project Management Institute. (2004) A Guide to the Project Management Body of Knowledge. -- ANSI/PMI 99-01 2004. Project Management Institute. Four Campus Boulevard. Newtown Square. USA.Google ScholarGoogle Scholar
  21. Protégé. Protégé ontology editor. {Online}. Disponível: http://protege.stanford.edu/doc/users.html Acessado em: Out. 2006.Google ScholarGoogle Scholar
  22. Raskin, V.; Hempelmann, C. F.; Triezenberg, K. E.; Nirenburg, S. Ontology in information security: A useful theoretical Foundation and methodology tool. In: Proceedings of the Workshop of the New Security Paradigms, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Shumacher, M. Toward a Security Core Ontology. In: Security Engineering with Patterns -- Origins, Theoretical Model and New Aplications, Springs Verlag, p. 87--96, lectures Notes in Computer Science (LNCS 2754), 2003.Google ScholarGoogle ScholarCross RefCross Ref
  24. T. Berners-Lee, O. Lassila, and J. Hendler. The semantic web. Scientific American, 5:34--43, 2001.Google ScholarGoogle ScholarCross RefCross Ref
  25. Uschold, M, Grüninger, M. Ontologies: Principles, Methods and Applications. Knowledge Engineering Review. Vol. 11, N° 02. June. 1996.Google ScholarGoogle Scholar
  26. Valente, A., Breuker, J. Towards Principled Core Ontologies. In B. R. Gaines and M. Mussen, editors, Proceedings of the KAW-96, Banff, Canada, 1996.Google ScholarGoogle Scholar
  1. CoreSec: an ontology of security aplied to the business process of management

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      EATIS '08: Proceedings of the 2008 Euro American Conference on Telematics and Information Systems
      September 2008
      287 pages
      ISBN:9781595939883
      DOI:10.1145/1621087

      Copyright © 2008 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 10 September 2008

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

      Acceptance Rates

      Overall Acceptance Rate17of64submissions,27%

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader