2007 40th Annual Hawaii International Conference on System Sciences (HICSS'07) 2007
DOI: 10.1109/hicss.2007.478
|View full text |Cite
|
Sign up to set email alerts
|

Security Ontologies: Improving Quantitative Risk Analysis

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
53
0
1

Year Published

2007
2007
2018
2018

Publication Types

Select...
5
3

Relationship

2
6

Authors

Journals

citations
Cited by 66 publications
(54 citation statements)
references
References 3 publications
0
53
0
1
Order By: Relevance
“…First, we remind the reader that ontologies have previously been used to help augment use cases with semantic information in software development, computer security, and elearning [2,5,15]. Since these previous work showed that ontologies can help improve finding information, we introduce our first hypothesis: Hypothesis 1.…”
Section: Hypotheses Developmentmentioning
confidence: 99%
See 2 more Smart Citations
“…First, we remind the reader that ontologies have previously been used to help augment use cases with semantic information in software development, computer security, and elearning [2,5,15]. Since these previous work showed that ontologies can help improve finding information, we introduce our first hypothesis: Hypothesis 1.…”
Section: Hypotheses Developmentmentioning
confidence: 99%
“…Ontologies have also been used to help augment use cases with semantic information in software development [2], computer security [5], and elearning [15]. These ontologies have been creating using various methods such as activity theory [11], simply extending existing ontologies [2,15], and extending taxonomies [5].…”
Section: Ontologies In Ismentioning
confidence: 99%
See 1 more Smart Citation
“…However, it is based on some impractical assumptions. Ekelhart [9] uses security ontology to improve quantitative risk analysis and promote the common understanding of the involved risk factors. However, it is not sufficient to identify how these risk factors can contribute to the entire risk assessment process.…”
Section: Related Workmentioning
confidence: 99%
“…Our prototype named AURUM 1 is based on previous work (cf. [20]- [23] for the concept of the security ontology and [24]- [26] for interactive decision support). Beside introducing this new risk management approach, we provide a comparison of AURUM with CRISAM 2 and the GSTool 3 and itemize for each step how our approach performs in terms of usability, time exposure for conducting the entire risk management process, completeness of the threat/vulnerability identification and the control recommendations, and the granularity of control implementation suggestions.…”
Section: Introductionmentioning
confidence: 99%