PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Tytuł artykułu

Ontology notation and description of vulnerabilities in heterogeneous networks and critical infrastructures

Wybrane pełne teksty z tego czasopisma
Identyfikatory
Warianty tytułu
Języki publikacji
EN
Abstrakty
EN
In this paper a novel approach to describe heterogeneous networks vulnerabilities is presented. We propose an ontology-based approach which can be utilized to describe vulnerabilities in critical architectures, single and multiple domain as well as in heterogeneous networks. In the paper our ontology based on asset-vulnerabilities is presented. The created ontology will be used in security-resiliency framework developed in INTERSECTION Project as well as in the Critical Infrastructures and SCADA ontology in the INSPIRE Project.
Rocznik
Strony
35--44
Opis fizyczny
Bibliogr. 13 poz., rys.
Twórcy
autor
  • ITTI Ltd. Poznań
  • ITTI Ltd. Poznań
  • ITTI Ltd. Poznań
  • Institute of Telecommunications
autor
  • ITTI Ltd. Poznań
  • Institute of Telecommunications
autor
  • ITTI Ltd. Poznań
  • Adam Mickiewicz University, Poznań
  • ITTI Ltd. Poznań
  • Institute of Telecommunications
  • Adam Mickiewicz University, Poznań
Bibliografia
  • [1] OWL Web Ontology Language Semantics and Abstract Syntax, June 2006, http://www.w3.org/TR/owl-features/ .
  • [2] SWRL: A Semantic Web Rule Language Combning OWL and RuleML, W3C Member Submission, http://www.w3.org/Submission/SWRL/.
  • [3] A. Gomez, O.Corcho, Ontology languages for the Semantic Web, IEEE Intelligent Systems, Jan./Febr., 2002.
  • [4] FP6 NetQos Project – Deliverable 2.7.: Graphical User Interface and database repository.
  • [5] FP7 INTERSECTION (INfrastructure for heTErogeneous, Reislient, Secure, Complex, Tightly Inter-Operating Networks) Project – Description of Work.
  • [6] Ekelhart A., Fenz S., Klemen M., Weippl E., Security Ontologies: Improving Quantative Risk Analysis, Proc. of the 40th Hawaii International Conference on System Sciences, 2007.
  • [7] ISO/IEC 13335-1:2004, Information Technology – Security Techniques – Management of information and communications technology security – Part 1: Concepts and models for information and communications technology security management.
  • [8] Shared Information/Data Model – TeleManagement Forum, October 2002.
  • [9] http://protege.stanford.edu/
  • [10] Choraś Michał, Renk R., Flizikowski A., Hołubowicz W., Ontology-based description of networks vulnerabilities, Polish Journal of Environmental Science, 2008.
  • [11] FP7 INSPIRE (INcreasing Security and Protection through Infrastructure REsilience) Project – Description of Work.
  • [12] D’Antonio S., Romano L., Khelil A., Suri N., INcreasing Security and Protection through Infrastructure Resilience: the INSPIRE Project, Proc. of The 3rd International Workshop on Critical Information Infrastructures Security (CRITIS'08), October 2008.
  • [13] G.A. Campbell, Ontology for Call Control, Technical Report CSM-170, ISSN 1460-9673, June 2006.
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-18b8f06d-662b-4179-8317-1011c2197bb3
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.