skip to main content
10.1145/508171.508180acmconferencesArticle/Chapter ViewAbstractPublication PagesnspwConference Proceedingsconference-collections
Article

Ontology in information security: a useful theoretical foundation and methodological tool

Published:10 September 2001Publication History

ABSTRACT

The paper introduces and advocates an ontological semantic approach to information security. Both the approach and its resources, the ontology and lexicons, are borrowed from the field of natural language processing and adjusted to the needs of the new domain. The approach pursues the ultimate dual goals of inclusion of natural language data sources as an integral part of the overall data sources in information security applications, and formal specification of the information security community know-how for the support of routine and time-efficient measures to prevent and counteract computer attacks. As the first order of the day, the approach is seen by the information security community as a powerful means to organize and unify the terminology and nomenclature of the field.

References

  1. Atallah, M., and Raskin, V. Natural language watermarking: Design, analysis, and a proof-of-concept implementation. In: Moskowitz, I.S. (ed.). Pre-proceedings of the 4th Information Hiding Workshop. Pittsburgh University Center, Pittsburgh, PA, 2001, 193-208. See also http://chacs.nrl.navy.mil/IHW2001/accepted.html or http://omni.cc.purdue.edu/~vraskin/IHW.AtaRasEtAl.pdf). Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Kabay, M. and Bosworth, S. (eds.). Computer Security Handbook, 4th ed. John Wiley and Sons, New York, NY, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Pfitzmann, A., and Köhntopp, M. Anonymity, unobservability, and pseudonymy---A proposal for terminology, Position paper for a symposium on anonymity at IHW-01, 2001. http://www.koehntopp.de/marit/pub/anon/ihw/Anon_Terminology_IHW.pdf. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Raskin, V., Atallah, M., McDonough, C., and Nirenburg, S. Natural language processing for information assurance and security: An overview and implementations. In: Proceedings of NSPW-2000. ACM Press, New York, NY, 2001, 51-65. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Templeton, S., and Levitt, K. A requires/provides model for computer attacks, Ibid, 31-38. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Ontology in information security: a useful theoretical foundation and methodological tool

                Recommendations

                Comments

                Login options

                Check if you have access through your login credentials or your institution to get full access on this article.

                Sign in
                • Published in

                  cover image ACM Conferences
                  NSPW '01: Proceedings of the 2001 workshop on New security paradigms
                  September 2001
                  157 pages
                  ISBN:1581134576
                  DOI:10.1145/508171

                  Copyright © 2001 ACM

                  Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

                  Publisher

                  Association for Computing Machinery

                  New York, NY, United States

                  Publication History

                  • Published: 10 September 2001

                  Permissions

                  Request permissions about this article.

                  Request Permissions

                  Check for updates

                  Qualifiers

                  • Article

                  Acceptance Rates

                  Overall Acceptance Rate62of170submissions,36%

                PDF Format

                View or Download as a PDF file.

                PDF

                eReader

                View online with eReader.

                eReader