Skip to main content

Generating a Standardized Upper Ontology for Security of Information and Networks

  • Conference paper
  • First Online:
Computational Intelligence, Cyber Security and Computational Models

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 412))

  • 1336 Accesses

Abstract

A usable functional interface between ontology and security integrating related information is needed for security engineering as well as creating secure systems. That in turn necessitates ontologizing security of information and networks to start with and then standardization. Having involved in the fields of semantic technology and information assurance, I have strived to facilitate establishing an interface between them and for this reason SIN Conference Series I created included all interest areas of semantics, metadata and ontology aspects. In a keynote talk and its proceedings paper in SIN 2014, I took up this subject and drove to the point that generic ontology for security of information and networks is timely, and it should better be standardized. In the present paper I investigate through examples where available to drive the point that the standard upper ontology for security may be developed through community sourcing and then standardized through competent agencies.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 219.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 279.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. International Conference on Security of Information and Networks. www.sinconf.org. Accessed 29 Sept 2015

  2. Elci, A.: (Keynote Talk) Isn’t the time ripe for a standard ontology on security of information and networks? In: Poet, R., Elci, A., Gaur, M.S., Orgun, M.A., Makarevich, O. (eds.) Proceedings of SIN 2014, the Seventh International Conference on Security of Information and Networks, pp. 1–3 (SIN 2014), 9–11 Sept 2014. Glasgow, UK. Published by ACM, ISBN 978-1-4503-3033-6. doi:10.1145/2659651.2664291 (2014)

  3. World Wide Web Consortium. Security Activity. www.w3.org/Security/. Accessed 29 Sept 2015

  4. W3C Web Cryptography Working Group. Web Cryptography API. www.w3.org/TR/WebCryptoAPI/. Accessed 29 Sept 2015

  5. W3C XML Security Working Group. www.w3.org/2008/xmlsec/. Accessed 29 Sept 2015

  6. Jürjens, J.: UMLsec: Extending UML for secure systems development. In: Jezequel, J.-M., Hussmann, H., Cook, S. (eds.) UML 2002—The Unified Modeling Language, pp. 412–425. Dresden, Springer-Verlag. And, for a brief summary of the proposal. https://en.wikipedia.org/wiki/UMLsec (2002)

  7. Daconta, M.C., Obrst, L.J., Smith, K.T.: The Semantic Web: A Guide to the Future of XML, Web Services, and Knowledge Management. John Wiley & Sons. ISBN:0471432571 (2003)

    Google Scholar 

  8. Fatemi, M.R., Elci, A., Bayram, Z.: A proposal to ontology security standards. In: Proceedings of the 2008 International Conference on Semantic Web and Web Services (SWWS’08), of the 2008 World Congress in Computer Science, Computer Engineering, and Applied Computing (WORLDCOMP’08), pp. 183–186. Las Vegas, USA, July 14–17

    Google Scholar 

  9. Sicilia, M.-A., García-Barriocanal, E., Bermejo-Higuera, J., Sánchez-Alonso, S.: What are Information Security Ontologies Useful for? In: Garoufallou, E,. Hartley, E., Richard, J., Gaitanou, P. (eds.) Metadata and Semantics Research, vol. 544, pp. 51–61. Communications in Computer and Information Science, doi:10.1007/978-3-319-24129-6_5. Springer International Publishing. ISBN: 978-3-319-24128-9 (2015)

    Google Scholar 

  10. Open Semantic Framework. A Basic Guide to Ontologies. http://wiki.opensemanticframework.org/index.php/A_Basic_Guide_to_Ontologies. Accessed 29 Sept 2015

  11. http://www.merriam-webster.com/dictionary/crowdsourcing. Accessed 29 Sept 2015

  12. https://en.wikipedia.org/wiki/Crowdsourcing. Accessed 29 Sept 2015

  13. Tudorache, T.: Collaborative protege. Available: http://protegewiki.stanford.edu/wiki/CollaborativeProtege. Accessed 29 Sep 2015 (2011)

  14. http://www.iso.org/iso/home/standards.htm

  15. Ontolog Community. Ontology-based standards. http://ontolog.cim3.net/cgi-bin/wiki.pl?ConferenceCall_2013_11_07. Accessed 29 Sept 2015

  16. http://www.w3.org/standards/. Accessed 29 Sept 2015

  17. IEEE SA—1872-2015—IEEE Standard Ontologies for Robotics and Automation. http://standards.ieee.org/findstds/standard/1872-2015.html. Accessed 29 Sept 2015

  18. IEEE Standard for Learning Technology. http://standards.ieee.org/findstds/standard/1484.13.1-2012.html. Accessed 29 Sept 2015

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Atilla Elçi .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer Science+Business Media Singapore

About this paper

Cite this paper

Elçi, A. (2016). Generating a Standardized Upper Ontology for Security of Information and Networks. In: Senthilkumar, M., Ramasamy, V., Sheen, S., Veeramani, C., Bonato, A., Batten, L. (eds) Computational Intelligence, Cyber Security and Computational Models. Advances in Intelligent Systems and Computing, vol 412. Springer, Singapore. https://doi.org/10.1007/978-981-10-0251-9_4

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-0251-9_4

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-0250-2

  • Online ISBN: 978-981-10-0251-9

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics