Use of Ontologies in Mapping of Information Security Requirements
Simona Ramanauskaitė
Eglė Radvilė
Dmitrij Olifer
Eglė Radvilė
Dmitrij Olifer
Abstract
A large amount of different security documents, standards, guidelines and best practices requires to ensure mapping between different security requirements. As the result of mapping, security requirements of different standards can coincide or require to be amended or harmonised. This is the reason why it is so difficult to map more than two different security documents. Ontologies can be used to solve this issue. The article offers a review of different security documents and ontology types as well as investigates possible use of ontologies for mapping of security standards.
Article in Lithuanian
Article in:
Lithuanian
Article published:
2013-05-24
Keyword(s): ontology; information security standard; information security requirements; mapping; graph
DOI: 10.3846/mla.2013.15
Science – Future of Lithuania / Mokslas – Lietuvos Ateitis ISSN 2029-2341, eISSN 2029-2252
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 License.