loading
Papers Papers/2022 Papers Papers/2022

Research.Publish.Connect.

Paper

Paper Unlock

Authors: Haibo Hu 1 ; Dan Yang 1 ; Hong Xiang 1 ; Li Fu 1 ; Chunxiao Ye 2 and Ren Li 2

Affiliations: 1 The School of Software Engineering and Huxi Campus of Chongqing University, China ; 2 Chongqing University, China

Keyword(s): .

Abstract: Eliciting security requirements is critical but hard for non-expert to fulfill an exhaustive analysis on large body of security knowledge. Emerging models in requirements engineering (RE) society release some burden of such difficulty, as well as security ontologies are booming for knowledge sharing and reuse. There exists necessity for the synergy of them, such as utilizing security ontology (SO) as the back end of Knowledge Base (KB) for capturing security requirements by using known RE models. Research advances in the Semantic Web (SW) community provide a common framework of technologies that allows data to be shared and reused across boundaries of various application and community. This paper proposes a knowledge base which is constructed on SO and Misuse Case Model (MCM), by representing them into OWL (Web Ontology Language). Semantic rules can be derived from the correlation of SO and MCM to be utilized for reasoning and querying security knowledge via MCM-based requirements el icitation. The proposed KB coordinates SO with a specific RE model to facilitate knowledge sharing to be a foundation for eliciting security requirements auto-matically. (More)

CC BY-NC-ND 4.0

Sign In Guest: Register as new SciTePress user now for free.

Sign In SciTePress user: please login.

PDF ImageMy Papers

You are not signed in, therefore limits apply to your IP address 3.145.178.157

In the current month:
Recent papers: 100 available of 100 total
2+ years older papers: 200 available of 200 total

Paper citation in several formats:
Hu, H.; Yang, D.; Xiang, H.; Fu, L.; Ye, C. and Li, R. (2011). Towards a Semantic Web-enabled Knowledge Base to Elicit Security Requirements for Misuse Cases . In Proceedings of the 8th International Workshop on Security in Information Systems (ICEIS 2011) - WOSIS; ISBN 978-989-8425-61-4, SciTePress, pages 103-112. DOI: 10.5220/0003588301030112

@conference{wosis11,
author={Haibo Hu. and Dan Yang. and Hong Xiang. and Li Fu. and Chunxiao Ye. and Ren Li.},
title={Towards a Semantic Web-enabled Knowledge Base to Elicit Security Requirements for Misuse Cases },
booktitle={Proceedings of the 8th International Workshop on Security in Information Systems (ICEIS 2011) - WOSIS},
year={2011},
pages={103-112},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0003588301030112},
isbn={978-989-8425-61-4},
}

TY - CONF

JO - Proceedings of the 8th International Workshop on Security in Information Systems (ICEIS 2011) - WOSIS
TI - Towards a Semantic Web-enabled Knowledge Base to Elicit Security Requirements for Misuse Cases
SN - 978-989-8425-61-4
AU - Hu, H.
AU - Yang, D.
AU - Xiang, H.
AU - Fu, L.
AU - Ye, C.
AU - Li, R.
PY - 2011
SP - 103
EP - 112
DO - 10.5220/0003588301030112
PB - SciTePress