dc.contributor.author | Ramanauskaitė, Simona | |
dc.contributor.author | Goranin, Nikolaj | |
dc.contributor.author | Čenys, Antanas | |
dc.contributor.author | Olifer, Dmitrij | |
dc.date.accessioned | 2023-09-18T19:50:06Z | |
dc.date.available | 2023-09-18T19:50:06Z | |
dc.date.issued | 2013 | |
dc.identifier.other | (BIS)VGT02-000026750 | |
dc.identifier.uri | https://etalpykla.vilniustech.lt/handle/123456789/143936 | |
dc.description.abstract | There are many security standards which a company can use. Sometimes usage of security standards can be required by regulating institutions. While security standards can differ in purpose and covered area, more than one standard can be used at the same time which leads to overlap and potential conflicts in requirements of different standards. In such cases, deep analysis of used standards has to be done to ensure optimal usage of company’s resources implementing these security requirements. In this paper we analyze existing solutions for standard harmonization and security ontologies to design an adaptive mapping of security standards by using ontology to map standards and graph theory to visualize mapped standards. We present the architecture of prototype and use it to map ISO27001 standard and Grundschutz best practice. The experiment shows the proposed model can reduce the need of standard mapping documents. Proposed solution can be useful for detailing certain controls of security standards in wider domain; nevertheless, it depends on the description of security standards in the base ontology. The study was carried out within the framework of the National Project No.VP1-3.1-MM-08-K-01-012: "Virtualisation, visualization and e-services security technologies and research", supported by the EU Social Fund. | eng |
dc.format.extent | p. 74-83 | |
dc.format.medium | tekstas / txt | |
dc.language.iso | eng | |
dc.title | Ontology-based security standards mapping pptimization by the means of Graph theory | |
dc.type | Straipsnis recenzuotame konferencijos darbų leidinyje / Paper published in peer-reviewed conference publication | |
dcterms.references | 39 | |
dc.type.pubtype | P1d - Straipsnis recenzuotame konferencijos darbų leidinyje / Article published in peer-reviewed conference proceedings | |
dc.contributor.institution | Vilniaus Gedimino technikos universitetas | |
dc.contributor.faculty | Fundamentinių mokslų fakultetas / Faculty of Fundamental Sciences | |
dc.contributor.department | Informacinių sistemų katedra / Department of Information Systems | |
dc.subject.researchfield | T 007 - Informatikos inžinerija / Informatics engineering | |
dc.subject.en | Security standards | |
dc.subject.en | Security ontology | |
dc.subject.en | Standard mapping | |
dc.subject.en | Standard visualization | |
dcterms.sourcetitle | International congress on engineering and technology (ICET 2013), 25–27th June, Dubrovnik, Croatia, 2013 | |
dc.publisher.name | RISE Association | |
dc.publisher.city | Dubrovnik | |
dc.identifier.elaba | 4032086 | |