Conferences in Research and Practice in Information Technology
  

Online Version - Last Updated - 20 Jan 2012

 

 
Home
 

 
Procedures and Resources for Authors

 
Information and Resources for Volume Editors
 

 
Orders and Subscriptions
 

 
Published Articles

 
Upcoming Volumes
 

 
Contact Us
 

 
Useful External Links
 

 
CRPIT Site Search
 
    

Dealing with the Formal Analysis of Information Security Policies through Ontologies : A Case Study

da Silva, G.M.H., Rademaker, A., de Vasconcelos, D.R., Amaral, F.N., Bazilio, C., Costa, V. and Haeusler, E.H.

    We present the structure of an ontology for Information Security (IS), applied to the extraction of knowledge from Natural Language texts (IS standards, security policies and security control descriptions). This ontology is composed of the vocabulary for the IS Domain, and a particular kind of ontology description, logical forms to determine the structure of the DL formulas associated with the texts. We also discuss the relationship between the structure of the formulas and the efficiency of the reasoner.
Cite as: da Silva, G.M.H., Rademaker, A., de Vasconcelos, D.R., Amaral, F.N., Bazilio, C., Costa, V. and Haeusler, E.H. (2007). Dealing with the Formal Analysis of Information Security Policies through Ontologies : A Case Study. In Proc. Third Australasian Ontology Workshop (AOW 2007), Gold Coast, Australia. CRPIT, 85. Meyer, T. and Nayak, A. C., Eds. ACS. 55-60.
pdf (from crpit.com) pdf (local if available) BibTeX EndNote GS
 

 

ACS Logo© Copyright Australian Computer Society Inc. 2001-2014.
Comments should be sent to the webmaster at crpit@scem.uws.edu.au.
This page last updated 16 Nov 2007