5 CONCLUSIONS
Semantics in security data improves their manage-
ment and exploitation. Ontology engineering is de-
signed to face the challenges of management and for-
malization of knowledge. We define a simple method-
ology to get security knowledge properly managed.
Finally, we obtain a ontology-based system that does
an efficient management of the security knowledge.
Due to the lack of an already reference model,
we must define the necessary main ontology to our
web application security domain. The defined ontol-
ogy is the base to provide security knowledge that will
be efficiently managed. Among other advantages, all
stakeholders can now share their security knowledge
in an understandable way.
A semantic scraper that uses the main ontology
overcomes challenges associated to extraction and in-
tegration processes. We demonstrate heterogeneous
and unstructured information from various commu-
nities can be formalized, organized and merged with
a main ontology. The generated full and integrated
security knowledge base provides a rich encyclope-
dia and specific guidelines so that people can apply
security knowledge in their daily works from the be-
ginning. With a large amount of open and quality se-
curity knowledge, people and organizations can make
better informed decisions, building active communi-
ties. We check the ontology can manage the man-
agement processes involved in the security knowledge
generation. Moreover, the knowledge base mitigates
the lack of open security linked data.
The security knowledge management system pro-
vided by the semantic wiki facilitates intelligent ac-
cess to knowledge. The wiki facilities reduce the time
that users have to spend in security and knowledge
management processes, providing everyone can con-
tribute to the knowledge extension using the under-
lying main ontology. This social platform brings to
reality the need of a collaborative knowledge system.
Inside it, people can discuss and reach a consensus in
security activities with knowledge awareness
Future works include researching techniques and
means to make people more awareness to apply secu-
rity knowledge in their processes. In this sense, meth-
ods to enhance people’ understanding and to improve
the content quality will be investigated. A further en-
hancement of the knowledge management provides
the possibility of tracking security processes over ex-
plicit semantic processes. By the way, users add con-
trols that try to solve the vulnerabilities in mitigation
processes. By using a reputation system, users can
be reputed to indicate what controls are a priori better
suited according to the user that references it.
REFERENCES
Ahlgren, R. (2011). Software patterns, organizational learn-
ing and sotware process improvement.
Antezana, E., Blonde, W., and more (2009). Biogateway: a
semantic systems biology tool for the life sciences.
Aurum, A., Daneshgar, F., and more (2008). Investigating
knowledge management practices in software devel-
opment organizations - an australian experience.
Blanco, C., Lasheras, J., and more (2008). A systematic
review and comparison of security ontologies. Avail-
ability, Reliability and Security, 0:813–820.
Debruyne, C., Reul, Q., and more (2010). Gospl: Ground-
ing ontologies with social processes and natural lan-
guage. In Information Technology: New Generations.
Elahi, G., Eric, Y., and more (2010). A vulnerability-centric
requirements engineering framework: analyzing secu-
rity attacks, countermeasures, and requirements based
on vulnerabilities. Requir. Eng., 15:41–62.
Fenz, S. and Ekelhart, A. (2009). Formalizing information
security knowledge.
Fern
´
andez-Villamor, J. I., Blasco, J., Iglesias, C. A., and
Garijo, M. (2011). A Semantic Scraping Model for
Web Resources – Applying Linked Data to Web Page
Screen Scraping. In Third International Conference
on Agents and Artificial Intelligence.
Fink, T. and Koch, M. (2006). An mda approach to access
control specifications using mof and uml profiles.
Garcia, R. and Gil, R. (2010). Semantic wiki for quality
management in software development projects.
Guo, K. H. (2010). Knowledge for managing information
systems security: Review and future research direc-
tions.
Herzogand, A., Shahmehri, N., and more (2007). An ontol-
ogy of information security.
Huner, K. M. and Otto, B. (2009). The effect of using a se-
mantic wiki for metadata management: A controlled
experiment.
Kasisopha, N. and Wongthongtham, P. (2009). Semantic
wiki-based ontology evolution.
Korkala, M. and Abrahamsson, P. (2007). Communication
in distributed agile development: A case study.
Mouratidis, H. and Giorgini, P. (2006). Integrating secu-
rity and software engineering: Advances and future
vision.
Papadaki, E., Polemi, D., and more (2008). A holistic, col-
laborative, knowledge-sharing approach for informa-
tion security risk management. In Internet Monitoring
and Protection, 2008, pages 125 –130.
Thuraisingham, B. (2005). Security standards for the se-
mantic web.
Tsoumas, B. and Gritzalis, D. (2006). Towards an ontology-
based security management.
Wang, J. A. and Guo, M. (2009). Ovm: An ontology for
vulnerability management.
Zhuge, H. (2003). Active e-document framework adf:
model and tool.
ICAART 2012 - International Conference on Agents and Artificial Intelligence
490