ABSTRACT
The paper introduces and advocates an ontological semantic approach to information security. Both the approach and its resources, the ontology and lexicons, are borrowed from the field of natural language processing and adjusted to the needs of the new domain. The approach pursues the ultimate dual goals of inclusion of natural language data sources as an integral part of the overall data sources in information security applications, and formal specification of the information security community know-how for the support of routine and time-efficient measures to prevent and counteract computer attacks. As the first order of the day, the approach is seen by the information security community as a powerful means to organize and unify the terminology and nomenclature of the field.
- Atallah, M., and Raskin, V. Natural language watermarking: Design, analysis, and a proof-of-concept implementation. In: Moskowitz, I.S. (ed.). Pre-proceedings of the 4th Information Hiding Workshop. Pittsburgh University Center, Pittsburgh, PA, 2001, 193-208. See also http://chacs.nrl.navy.mil/IHW2001/accepted.html or http://omni.cc.purdue.edu/~vraskin/IHW.AtaRasEtAl.pdf). Google ScholarDigital Library
- Kabay, M. and Bosworth, S. (eds.). Computer Security Handbook, 4th ed. John Wiley and Sons, New York, NY, 2002. Google ScholarDigital Library
- Pfitzmann, A., and Köhntopp, M. Anonymity, unobservability, and pseudonymy---A proposal for terminology, Position paper for a symposium on anonymity at IHW-01, 2001. http://www.koehntopp.de/marit/pub/anon/ihw/Anon_Terminology_IHW.pdf. Google ScholarDigital Library
- Raskin, V., Atallah, M., McDonough, C., and Nirenburg, S. Natural language processing for information assurance and security: An overview and implementations. In: Proceedings of NSPW-2000. ACM Press, New York, NY, 2001, 51-65. Google ScholarDigital Library
- Templeton, S., and Levitt, K. A requires/provides model for computer attacks, Ibid, 31-38. Google ScholarDigital Library
Index Terms
- Ontology in information security: a useful theoretical foundation and methodological tool
Recommendations
Security Standards and Measures for Massive IoT in the 5G Era
AbstractWith the development of 5G technology, Internet of Things (IoT) is proliferating and deeply integrated with our daily lives and industry productions. IoT applications in the 5G era generate massive connections, and this would bring about many ...
DTLS based security and two-way authentication for the Internet of Things
In this paper, we introduce the first fully implemented two-way authentication security scheme for the Internet of Things (IoT) based on existing Internet standards, specifically the Datagram Transport Layer Security (DTLS) protocol. By relying on an ...
The Human Element of Information Security
Information security has long hinged on trusted insiders' ability to make good decisions. However, modifying human behavior through training is difficult; some battle-worn security executives might even dismiss it as impossible. Although foundational ...
Comments