Reference Hub1
SecAOnto: A Conceptual Model of Security Assessment

SecAOnto: A Conceptual Model of Security Assessment

Ferrucio de Franco Rosa, Luiz Antonio Lima Teixeira Junior, Rodrigo Bonacin, Mario Jino
Copyright: © 2020 |Volume: 12 |Issue: 2 |Pages: 24
ISSN: 1938-0194|EISSN: 1938-0208|EISBN13: 9781799805847|DOI: 10.4018/IJWP.2020070104
Cite Article Cite Article

MLA

Rosa, Ferrucio de Franco, et al. "SecAOnto: A Conceptual Model of Security Assessment." IJWP vol.12, no.2 2020: pp.57-80. http://doi.org/10.4018/IJWP.2020070104

APA

Rosa, F. D., Junior, L. A., Bonacin, R., & Jino, M. (2020). SecAOnto: A Conceptual Model of Security Assessment. International Journal of Web Portals (IJWP), 12(2), 57-80. http://doi.org/10.4018/IJWP.2020070104

Chicago

Rosa, Ferrucio de Franco, et al. "SecAOnto: A Conceptual Model of Security Assessment," International Journal of Web Portals (IJWP) 12, no.2: 57-80. http://doi.org/10.4018/IJWP.2020070104

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

Security assessment is crucial to the implementation and use of secure web portals. Literature reports studies about knowledge representation models for systems assessment and information security areas; however, there is a lack of conceptual formalization for the security assessment area. The security assessment ontology (SecAOnto) objective is to formalize knowledge on security assessment. It is based on ontologies, taxonomies, vocabularies, glossaries, and market guidelines. This paper presents an application of SecAOnto with the objective of identifying concepts in descriptions of security assessment items; the coverage of security characteristics is determined by using a coverage calculus algorithm. The application of SecAOnto and of the coverage calculus algorithms to the well-known standard ISO/IEC 27001 highlights its expressiveness. The proposal is useful for security experts and researchers in the context of security assessment, as well as to support web-based conceptual architectures.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.