dc.contributor.author | Ramanauskaitė, Simona | |
dc.contributor.author | Olifer, Dmitrij | |
dc.contributor.author | Goranin, Nikolaj | |
dc.contributor.author | Čenys, Antanas | |
dc.date.accessioned | 2023-09-18T19:54:59Z | |
dc.date.available | 2023-09-18T19:54:59Z | |
dc.date.issued | 2013 | |
dc.identifier.issn | 1841-9836 | |
dc.identifier.other | (BIS)VGT02-000027076 | |
dc.identifier.uri | https://etalpykla.vilniustech.lt/handle/123456789/144863 | |
dc.description.abstract | Adoption of security standards has the capability of improving the security level in an organization as well as to provide additional benefits and possibilities to the organization. However mapping of used standards has to be done when more than one security standard is employed in order to prevent redundant activities, not optimal resource management and unnecessary outlays. Employment of security ontology to map different standards can reduce the mapping complexity however the choice of security ontology is of high importance and there are no analyses on security ontology suitability for adaptive standards mapping. In this paper we analyze existing security ontologies by comparing their general properties, OntoMetric factors and ability to cover different security standards. As none of the analysed security ontologies were able to cover more than 1/3 of security standards, we proposed a new security ontology, which increased coverage of security standards compared to the existing ontologies and has a better branching and depth properties for ontology visualization purposes. During this research we mapped 4 security standards (ISO 27001, PCI DSS, ISSA 5173 and NISTIR 7621) to the new security ontology, therefore this ontology and mapping data can be used for adaptive mapping of any set of these security standards to optimize us age of multiple security standards in an organization. | eng |
dc.format.extent | p. 813-825 | |
dc.format.medium | tekstas / txt | |
dc.language.iso | eng | |
dc.relation.isreferencedby | Scopus | |
dc.relation.isreferencedby | Science Citation Index Expanded (Web of Science) | |
dc.source.uri | http://univagora.ro/jour/index.php/ijccc/issue/archive | |
dc.source.uri | http://univagora.ro/jour/index.php/ijccc/article/view/764 | |
dc.title | Security ontology for adaptive mapping of security standards | |
dc.type | Straipsnis Web of Science DB / Article in Web of Science DB | |
dcterms.accessRights | IDS Number: 252ZF | |
dcterms.references | 28 | |
dc.type.pubtype | S1 - Straipsnis Web of Science DB / Web of Science DB article | |
dc.contributor.institution | Vilniaus Gedimino technikos universitetas | |
dc.contributor.faculty | Fundamentinių mokslų fakultetas / Faculty of Fundamental Sciences | |
dc.contributor.department | Informacinių sistemų katedra / Department of Information Systems | |
dc.subject.researchfield | T 007 - Informatikos inžinerija / Informatics engineering | |
dc.subject.en | Security ontology | |
dc.subject.en | Security standards | |
dc.subject.en | Adaptive mapping | |
dcterms.sourcetitle | International Journal of Computers, Communications & Control (IJCCC) | |
dc.description.issue | iss.6 | |
dc.description.volume | Vol. 8 | |
dc.publisher.name | Agora University Editing House | |
dc.publisher.city | Agora | |
dc.identifier.doi | 000327050700010 | |
dc.identifier.elaba | 4040358 | |