Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/508171.508180acmconferencesArticle/Chapter ViewAbstractPublication PagesnspwConference Proceedingsconference-collections
Article

Ontology in information security: a useful theoretical foundation and methodological tool

Published: 10 September 2001 Publication History

Abstract

The paper introduces and advocates an ontological semantic approach to information security. Both the approach and its resources, the ontology and lexicons, are borrowed from the field of natural language processing and adjusted to the needs of the new domain. The approach pursues the ultimate dual goals of inclusion of natural language data sources as an integral part of the overall data sources in information security applications, and formal specification of the information security community know-how for the support of routine and time-efficient measures to prevent and counteract computer attacks. As the first order of the day, the approach is seen by the information security community as a powerful means to organize and unify the terminology and nomenclature of the field.

References

[1]
Atallah, M., and Raskin, V. Natural language watermarking: Design, analysis, and a proof-of-concept implementation. In: Moskowitz, I.S. (ed.). Pre-proceedings of the 4th Information Hiding Workshop. Pittsburgh University Center, Pittsburgh, PA, 2001, 193-208. See also http://chacs.nrl.navy.mil/IHW2001/accepted.html or http://omni.cc.purdue.edu/~vraskin/IHW.AtaRasEtAl.pdf).
[2]
Kabay, M. and Bosworth, S. (eds.). Computer Security Handbook, 4th ed. John Wiley and Sons, New York, NY, 2002.
[3]
Pfitzmann, A., and Köhntopp, M. Anonymity, unobservability, and pseudonymy---A proposal for terminology, Position paper for a symposium on anonymity at IHW-01, 2001. http://www.koehntopp.de/marit/pub/anon/ihw/Anon_Terminology_IHW.pdf.
[4]
Raskin, V., Atallah, M., McDonough, C., and Nirenburg, S. Natural language processing for information assurance and security: An overview and implementations. In: Proceedings of NSPW-2000. ACM Press, New York, NY, 2001, 51-65.
[5]
Templeton, S., and Levitt, K. A requires/provides model for computer attacks, Ibid, 31-38.

Cited By

View all
  • (2024)Intelligent Checking Method for Construction Schemes via Fusion of Knowledge Graph and Large Language ModelsBuildings10.3390/buildings1408250214:8(2502)Online publication date: 13-Aug-2024
  • (2024)Ontology-Based Layered Rule-Based Network Intrusion Detection System for Cybercrimes DetectionKnowledge and Information Systems10.1007/s10115-024-02068-966:6(3355-3392)Online publication date: 20-Feb-2024
  • (2023)SAEOn: An Ontological Metamodel for Quantitative Security Assurance EvaluationComputer Security. ESORICS 2022 International Workshops10.1007/978-3-031-25460-4_35(605-624)Online publication date: 18-Feb-2023
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
NSPW '01: Proceedings of the 2001 workshop on New security paradigms
September 2001
157 pages
ISBN:1581134576
DOI:10.1145/508171
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 10 September 2001

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. documentation
  2. human factors
  3. languages
  4. security
  5. standardization
  6. theory

Qualifiers

  • Article

Conference

NSPW01
Sponsor:
NSPW01: New Security Paradigms Workshop 2001
September 10 - 13, 2001
New Mexico, Cloudcroft

Acceptance Rates

Overall Acceptance Rate 98 of 265 submissions, 37%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)24
  • Downloads (Last 6 weeks)0
Reflects downloads up to 03 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2024)Intelligent Checking Method for Construction Schemes via Fusion of Knowledge Graph and Large Language ModelsBuildings10.3390/buildings1408250214:8(2502)Online publication date: 13-Aug-2024
  • (2024)Ontology-Based Layered Rule-Based Network Intrusion Detection System for Cybercrimes DetectionKnowledge and Information Systems10.1007/s10115-024-02068-966:6(3355-3392)Online publication date: 20-Feb-2024
  • (2023)SAEOn: An Ontological Metamodel for Quantitative Security Assurance EvaluationComputer Security. ESORICS 2022 International Workshops10.1007/978-3-031-25460-4_35(605-624)Online publication date: 18-Feb-2023
  • (2022)Ontology-Based Metrics Computation for System Security Assurance EvaluationJournal of Applied Security Research10.1080/19361610.2022.215719019:2(230-275)Online publication date: 19-Dec-2022
  • (2022)Automatic Information Extraction from Construction Quality Inspection Regulations: A Knowledge Pattern–Based Ontological MethodJournal of Construction Engineering and Management10.1061/(ASCE)CO.1943-7862.0002240148:3Online publication date: Mar-2022
  • (2020)Multi-agents Intrusion Detection System Using Ontology for ManetsAdvances in Smart Technologies Applications and Case Studies10.1007/978-3-030-53187-4_21(175-182)Online publication date: 4-Aug-2020
  • (2019)An Ontology for Security Patterns2019 38th International Conference of the Chilean Computer Science Society (SCCC)10.1109/SCCC49216.2019.8966393(1-8)Online publication date: Nov-2019
  • (2019)The SEPSES Knowledge Graph: An Integrated Resource for CybersecurityThe Semantic Web – ISWC 201910.1007/978-3-030-30796-7_13(198-214)Online publication date: 26-Oct-2019
  • (2019)Tacit Knowledge in Software EvolutionManaged Software Evolution10.1007/978-3-030-13499-0_5(77-105)Online publication date: 27-Jun-2019
  • (2018)Exploring Cyber Security Vulnerabilities in the Age of IoTCyber Security and Threats10.4018/978-1-5225-5634-3.ch078(1609-1623)Online publication date: 2018
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media