Security Ontology for Adaptive Mapping of Security Standards

被引:24
|
作者
Ramanauskaite, S. [1 ]
Olifer, D. [1 ]
Goranin, N. [1 ]
Cenys, A. [1 ]
机构
[1] Vilnius Gediminas Tech Univ, LT-10223 Vilnius, Lithuania
关键词
security ontology; security standards; adaptive mapping;
D O I
10.15837/ijccc.2013.6.764
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Adoption of security standards has the capability of improving the security level in an organization as well as to provide additional benefits and possibilities to the organization. However mapping of used standards has to be done when more than one security standard is employed in order to prevent redundant activities, not optimal resource management and unnecessary outlays. Employment of security ontology to map different standards can reduce the mapping complexity however the choice of security ontology is of high importance and there are no analyses on security ontology suitability for adaptive standards mapping. In this paper we analyze existing security ontologies by comparing their general properties, Onto Metric factors and ability to cover different security standards. As none of the analysed security ontologies were able to cover more than 1/3 of security standards, we proposed a new security ontology, which increased coverage of security standards compared to the existing ontologies and has a better branching and depth properties for ontology visualization purposes. During this research we mapped 4 security standards (ISO 27001, PCI DSS, ISSA 5173 and NISTIR 7621) to the new security ontology, therefore this ontology and mapping data can be used for adaptive mapping of any set of these security standards to optimize usage of multiple security standards in an organization.
引用
收藏
页码:878 / 890
页数:13
相关论文
共 50 条
  • [1] Evaluation Metrics for Ontology-Based Security Standards Mapping
    Olifer, Dmitrij
    [J]. 2015 OPEN CONFERENCE OF ELECTRICAL, ELECTRONIC AND INFORMATION SCIENCES (ESTREAM), 2015,
  • [2] Security Management Standards: A Mapping
    Haufe, Knut
    Colomo-Palacios, Ricardo
    Dzombeta, Srdan
    Brandis, Knud
    Stantchev, Vladimir
    [J]. INTERNATIONAL CONFERENCE ON ENTERPRISE INFORMATION SYSTEMS/INTERNATIONAL CONFERENCE ON PROJECT MANAGEMENT/INTERNATIONAL CONFERENCE ON HEALTH AND SOCIAL CARE INFORMATION SYSTEMS AND TECHNOLOGIES, CENTERIS/PROJMAN / HCIST 2016, 2016, 100 : 755 - 761
  • [3] Towards an ontology mapping approach for security management
    Wong, Alfred Ka Yiu
    Paranesh, Nandan
    Ray, Pradeep
    [J]. INTERNATIONAL JOURNAL ON ARTIFICIAL INTELLIGENCE TOOLS, 2006, 15 (06) : 1071 - 1090
  • [4] A Security Ontology for Security Requirements Elicitation
    Souag, Amina
    Salinesi, Camille
    Mazo, Raul
    Comyn-Wattiau, Isabelle
    [J]. ENGINEERING SECURE SOFTWARE AND SYSTEMS (ESSOS 2015), 2015, 8978 : 157 - 175
  • [5] Mapping information security curricula to professional accreditation standards
    Armstrong, Colin J.
    Armstrong, Helen L.
    [J]. 2007 IEEE INFORMATION ASSURANCE WORKSHOP, 2007, : 30 - +
  • [6] Classification and Mapping of Adaptive Security for Mobile Computing
    Sajjad, Maryam
    Ahmad, Aakash
    Malik, Asad Waqar
    Altamimi, Ahmed B.
    Alseadoon, Ibrahim
    [J]. IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING, 2020, 8 (03) : 814 - 832
  • [7] STANDARDS AND SECURITY
    JOHNSON, RE
    [J]. INFOSYSTEMS, 1984, 31 (05): : 56 - 56
  • [8] Ontology in Information Security
    Arbanas, Krunoslav
    Cubrilo, Mirko
    [J]. JOURNAL OF INFORMATION AND ORGANIZATIONAL SCIENCES, 2015, 39 (02) : 107 - 136
  • [9] An Ontology of Information Security
    Herzog, Almut
    Shahmehri, Nahid
    Duma, Claudiu
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2007, 1 (04) : 1 - 23
  • [10] An Ontology for Security Patterns
    Pereira Vale, Anelis
    Fernandez, Eduardo B.
    [J]. 2019 38TH INTERNATIONAL CONFERENCE OF THE CHILEAN COMPUTER SCIENCE SOCIETY (SCCC), 2019,