Ontologies for Security Requirements: A Literature Survey and Classification

被引:0
作者
Souag, Amina [1 ]
Salinesi, Camille [1 ]
Comyn-Wattiau, Isabelle [2 ]
机构
[1] Univ Paris 01, CRI, F-75231 Paris 05, France
[2] CEDRIC CNAM, ESSEC Business Sch, Paris, France
来源
ADVANCED INFORMATION SYSTEMS ENGINEERING WORKSHOPS, CAISE 2012 | 2012年 / 112卷
关键词
Security; Ontologies; Requirements; Analysis; Classification;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Despite existing methodologies in the field, most requirements engineers are poorly trained to define security requirements. This is due to a considerable lack of security knowledge. Some security ontologies have been proposed, but a gap still exists between the two fields of security requirement engineering and ontologies. This paper is a survey, it proposes an analysis and a typology of existing security ontologies and their use for requirements definition.
引用
收藏
页码:61 / 69
页数:9
相关论文
共 29 条
  • [1] Abou Assali A., 2008, ICTTA 2008 DAM SYR A
  • [2] [Anonymous], 2004, 1 EUR SEM WEB S HER
  • [3] Avizienis A., 2004, IEEE T DEPENDABLE SE
  • [4] Barnes S.J., 2005, COMMUNICATIONS ACM
  • [5] A systematic review and comparison of security ontologies
    Blanco, Carlos
    Lasheras, Joaquin
    Valencia-Garcia, Rafael
    Fernandez-Medina, Eduardo
    Toval, Ambrosio
    Piattini, Mario
    [J]. ARES 2008: PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON AVAILABILITY, SECURITY AND RELIABILITY, 2008, : 813 - +
  • [6] Denker G., 2005, Information Security Technical Report, V10, P51, DOI 10.1016/j.istr.2004.11.002
  • [7] Denker G, 2003, LECT NOTES COMPUT SC, V2870, P335
  • [8] Dobson G., 2006, REQUIREMENTS ENG
  • [9] Donner M., 2003, IEEE SECURITY PRIVAC
  • [10] Ekelhart A., 2007, HICSS 2007