2007
DOI: 10.4018/jisp.2007100101
|View full text |Cite
|
Sign up to set email alerts
|

An Ontology of Information Security

Abstract: We present a publicly available, OWL-based ontology of information security which models assets, threats, vulnerabilities, countermeasures and their relations. The ontology can be used as a general vocabulary, roadmap, and extensible dictionary of the domain of information security. With its help, users can agree on a common language and definition of terms and relationships. In addition to browsing for information, the ontology is also useful for reasoning about relationships between its entities, for example… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
95
0
7

Year Published

2009
2009
2022
2022

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 154 publications
(102 citation statements)
references
References 36 publications
0
95
0
7
Order By: Relevance
“…In [8] an information security ontology in OWL is presented by Herzog et al. This work is aimed at modeling the main concepts of the domain.…”
Section: Surveymentioning
confidence: 99%
See 3 more Smart Citations
“…In [8] an information security ontology in OWL is presented by Herzog et al. This work is aimed at modeling the main concepts of the domain.…”
Section: Surveymentioning
confidence: 99%
“…The authors propose an ontology aimed to cover a larger number of standards. The authors mapped papers Herzog et al [8] and Fenz, Pruckner, & Manutscheri [57] with the standards ISO 27001 [58], PCI DSS [59], ISSA 5173 [60] and NISTIR 7621 [61].…”
Section: Surveymentioning
confidence: 99%
See 2 more Smart Citations
“…In recent years, research in computer security has seen an increase in the use of ontologies. For example, ontologies have been applied to the areas of information security (common security vocabulary) [24], security management (threats, vulnerabilities and countermeasures) [17], access control [15], policy management [25] and trust management [33]. The decentralized Semantic Threat Graphs (ontology fragments) are implemented in OWL-DL, a language subset of OWL which is a W3C standard that includes Description Logic reasoning semantics [30].…”
Section: Introductionmentioning
confidence: 99%