Science – Future of Lithuania / Mokslas – Lietuvos Ateitis, Vol 5, No 2 (2013)

Use of Ontologies in Mapping of Information Security Requirements

Simona Ramanauskaitė
Eglė Radvilė
Dmitrij Olifer


A large amount of different security documents, standards, guidelines and best practices requires to ensure mapping between different security requirements. As the result of mapping, security requirements of different standards can coincide or require to be amended or harmonised. This is the reason why it is so difficult to map more than two different security documents. Ontologies can be used to solve this issue. The article offers a review of different security documents and ontology types as well as investigates possible use of ontologies for mapping of security standards.

Article in Lithuanian

Article in: Lithuanian

Article published: 2013-05-24

Keyword(s): ontology; information security standard; information security requirements; mapping; graph

DOI: 10.3846/mla.2013.15

Full Text: PDF pdf

Science – Future of Lithuania / Mokslas – Lietuvos Ateitis ISSN 2029-2341, eISSN 2029-2252
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 License.