Towards information security ontology in business networks

被引:0
|
作者
Aaltonen, Jukka [1 ]
Krone, Oliver [1 ]
Mustonen, Pekka [1 ]
机构
[1] Department of Research Methodology, University of Lapkand, Finland
关键词
Complex networks - Cryptography - Knowledge management - Network security - Requirements engineering;
D O I
10.3233/978-1-58603-957-8-366
中图分类号
学科分类号
摘要
The existing business information and asset protection models are mainly based on organizational aspects of security management. Having the focal company as the unit of analysis makes it difficult to represent the complex network-wide phenomena, for example inter-organizational knowledge exchange and dynamic nature of security requirements. Here, a future research perspective is outlined, that makes ground to enable the design of ontologies applicable in the domain of knowledge exchange and information security in business networks. The topics that should be addressed include conceptual review of existing security models, analysis of business resource classification approaches, extending service oriented roles-linkage relationship models with network-wide security requirements, and the research perspectives in knowledge integration and requirements engineering. © 2009 The authors and IOS Press.
引用
收藏
页码:366 / 372
相关论文
共 50 条
  • [41] Ontology-based Information Content Security Analysis
    Yan, Pan
    Zhao, Yanping
    Sanxing, Cao
    FIFTH INTERNATIONAL CONFERENCE ON FUZZY SYSTEMS AND KNOWLEDGE DISCOVERY, VOL 5, PROCEEDINGS, 2008, : 479 - +
  • [42] An OWL Multi-Dimensional Information Security Ontology
    Meriah, Ines
    Rabai, Latifa Ben Arfa
    Khedri, Ridha
    PROCEEDINGS OF THE 18TH INTERNATIONAL CONFERENCE ON EVALUATION OF NOVEL APPROACHES TO SOFTWARE ENGINEERING, ENASE 2023, 2023, : 372 - 380
  • [43] A Collaborative Ontology Development Tool for Information Security Managers
    Mace, John C.
    Parkin, Simon
    van Moorsel, Aad
    ACM SYMPOSIUM ON COMPUTER HUMAN INTERACTION FOR MANAGEMENT OF INFORMATION TECHNOLOGY (CHIMIT 2010), 2010,
  • [44] An Ontology-Driven Approach Applied to Information Security
    Vorobiev, Artem
    Bekmamedova, Nargiza
    JOURNAL OF RESEARCH AND PRACTICE IN INFORMATION TECHNOLOGY, 2010, 42 (01): : 61 - 76
  • [45] Methodology and Ontology of Expert System for Information Security Audit
    Atymtayeva, Lyazzat B.
    Bortsova, Gerda K.
    Inoue, Atsushi
    Kozhakhmet, Kanat T.
    6TH INTERNATIONAL CONFERENCE ON SOFT COMPUTING AND INTELLIGENT SYSTEMS, AND THE 13TH INTERNATIONAL SYMPOSIUM ON ADVANCED INTELLIGENT SYSTEMS, 2012, : 238 - 243
  • [46] Towards Evaluating an Ontology-Based Data Matching Strategy for Retrieval and Recommendation of Security Annotations for Business Process Models
    Ciuciu, Ioana
    Tang, Yan
    Meersman, Robert
    DATA-DRIVEN PROCESS DISCOVERY AND ANALYSIS, SIMPDA 2011, 2012, 116 : 103 - 119
  • [47] Security of Information and Communication Networks
    Stanton, Jeffrey M.
    JOURNAL OF THE AMERICAN SOCIETY FOR INFORMATION SCIENCE AND TECHNOLOGY, 2010, 61 (05): : 1074 - 1074
  • [48] Wireless networks and information security
    Kasimov, S. S.
    Bugibaev, E. N.
    Arzikulov, S. D.
    2007 THIRD IEEE/IFIP INTERNATIONAL CONFERENCE IN CENTRAL ASIA ON INTERNET, 2007, : 122 - 125
  • [49] Security in Space Information Networks
    Jiang, Chunxiao
    Wang, Xuexia
    Wang, Jian
    Chen, Hsiao-Hwa
    Ren, Yong
    IEEE COMMUNICATIONS MAGAZINE, 2015, 53 (08) : 82 - 88
  • [50] Focus on security in information networks
    DeSantis, A
    Persiano, G
    EUROPEAN TRANSACTIONS ON TELECOMMUNICATIONS, 1997, 8 (05): : 443 - 443