An Ontology for Security Patterns

被引:7
|
作者
Pereira Vale, Anelis [1 ]
Fernandez, Eduardo B. [2 ]
机构
[1] Univ Tecn Federico Santa Maria, Dept Informat, Valparaiso, Chile
[2] Florida Atlantic Univ, Dept Comp Sci & Engn, Boca Raton, FL 33431 USA
关键词
ontologies; security patterns; semantics; secure software development; REQUIREMENTS;
D O I
10.1109/sccc49216.2019.8966393
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Security is a fundamental requirement that we must keep in mind when developing a system. We approach the secure construction of software through the use of security patterns, as a way to mitigate their threats. We propose an ontological approach to security patterns, with the aim of adding semantics to the elements that surround security patterns. We have added ontological descriptions to pattern descriptions to make their use more precise, to allow the development of appropriate tools to present to the developer the relevant patterns in each stage and to be able to build better pattern catalogs. A final objective would be the construction of a complete catalog where each pattern includes ontological descriptions. Our contributions are (i) a representation of security patterns in the form of ontology; (ii) examples through queries on the use of the ontology and (iii) a discussion of the possible uses of this ontology for secure software development.
引用
收藏
页数:8
相关论文
共 50 条
  • [1] Ontology Based Patterns for Software Security Engineering
    Moradian, Esmiralda
    Hakansson, Anne
    Andersson, Jan-Olof
    [J]. ADVANCES IN KNOWLEDGE-BASED AND INTELLIGENT INFORMATION AND ENGINEERING SYSTEMS, 2012, 243 : 406 - 419
  • [2] Behavior Ontology: A Framework to Detect Attack Patterns for Security
    Woo, Sujeong
    On, Jinho
    Lee, Moonkun
    [J]. 2013 IEEE 27TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS WORKSHOPS (WAINA), 2013, : 738 - 743
  • [3] Format and Usage Model of Security Patterns in Ontology-Driven Threat Modelling
    Brazhuk, Andrei
    Olizarovich, Evgeny
    [J]. ARTIFICIAL INTELLIGENCE, 2020, 12412 : 382 - 392
  • [4] Format and usage model of security patterns in ontology-driven threat modelling
    Brazhuk, Andrei
    Olizarovich, Evgeny
    [J]. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2020, 12412 LNAI : 382 - 392
  • [5] A Security Ontology for Security Requirements Elicitation
    Souag, Amina
    Salinesi, Camille
    Mazo, Raul
    Comyn-Wattiau, Isabelle
    [J]. ENGINEERING SECURE SOFTWARE AND SYSTEMS (ESSOS 2015), 2015, 8978 : 157 - 175
  • [6] Ontology in Information Security
    Arbanas, Krunoslav
    Cubrilo, Mirko
    [J]. JOURNAL OF INFORMATION AND ORGANIZATIONAL SCIENCES, 2015, 39 (02) : 107 - 136
  • [7] An Ontology of Information Security
    Herzog, Almut
    Shahmehri, Nahid
    Duma, Claudiu
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2007, 1 (04) : 1 - 23
  • [8] Ontology Engineering by Combining Ontology Patterns
    Ruy, Fabiano B.
    Reginato, Cassio C.
    Santos, Victor A.
    Falbo, Ricardo A.
    Guizzardi, Giancarlo
    [J]. CONCEPTUAL MODELING, ER 2015, 2015, 9381 : 173 - 186
  • [9] Security Ontology for Adaptive Mapping of Security Standards
    Ramanauskaite, S.
    Olifer, D.
    Goranin, N.
    Cenys, A.
    [J]. INTERNATIONAL JOURNAL OF COMPUTERS COMMUNICATIONS & CONTROL, 2013, 8 (06) : 878 - 890
  • [10] Combined Security Ontology based on the Unified Foundational Ontology
    Adach, Malina
    Hanninen, Kaj
    Lundqvist, Kristina
    [J]. 16TH IEEE INTERNATIONAL CONFERENCE ON SEMANTIC COMPUTING (ICSC 2022), 2022, : 187 - 194