Ontologies for security requirements: A literature survey and classification
Despite existing methodologies in the field, most requirements engineers are poorly trained
to define security requirements. This is due to a considerable lack of security knowledge …
to define security requirements. This is due to a considerable lack of security knowledge …
Towards an ontology for privacy requirements via a systematic literature review
Privacy has been frequently identified as a main concern for systems that deal with personal
information. However, much of existing work on privacy requirements deals with them as a …
information. However, much of existing work on privacy requirements deals with them as a …
[PDF][PDF] Building an Ontology of Cyber Security.
Situation awareness depends on a reliable perception of the environment and
comprehension of its semantic structures. In this respect, cyberspace presents a unique …
comprehension of its semantic structures. In this respect, cyberspace presents a unique …
A security ontology for security requirements elicitation
Security is an important issue that needs to be taken into account at all stages of information
system development, including early requirements elicitation. Early analysis of security …
system development, including early requirements elicitation. Early analysis of security …
COPri v. 2—A core ontology for privacy requirements
Nowadays, most enterprises collect, store, and manage personal information of customers to
deliver their services. In such a setting, privacy has emerged as a key concern since …
deliver their services. In such a setting, privacy has emerged as a key concern since …
An ontology-based learning approach for automatically classifying security requirements
T Li, Z Chen - Journal of Systems and Software, 2020 - Elsevier
Although academia has recognized the importance of explicitly specifying security
requirements in early stages of system developments for years, in reality, many projects mix …
requirements in early stages of system developments for years, in reality, many projects mix …
A STAMP-based ontology approach to support safety and security analyses
DP Pereira, C Hirata, S Nadjm-Tehrani - Journal of Information Security and …, 2019 - Elsevier
Considerations of safety and security in the early stage of system life cycle are essential to
collect and prioritize operation needs, determine feasibility of the desired system, and …
collect and prioritize operation needs, determine feasibility of the desired system, and …
An ontology of security from a risk treatment perspective
Abstract In Risk Management, security issues arise from complex relations among objects
and agents, their capabilities and vulnerabilities, the events they are involved in, and the …
and agents, their capabilities and vulnerabilities, the events they are involved in, and the …
An ontology for privacy requirements via a systematic literature review
Privacy has emerged as a key concern for business and social computing as security
breaches have compromised personal data for millions. Despite this, much of existing work …
breaches have compromised personal data for millions. Despite this, much of existing work …
Security ontology for adaptive mapping of security standards
Adoption of security standards has the capability of improving the security level in an
organization as well as to provide additional benefits and possibilities to the organization …
organization as well as to provide additional benefits and possibilities to the organization …