{"title":"Enhanced Vulnerability Ontology for Information Risk Assessment and Dependability Management","authors":"M. Aime, Fabio Guasconi","doi":"10.1109/DEPEND.2010.22","DOIUrl":null,"url":null,"abstract":"Security vulnerabilities play an increasing role within dependability procedures for information systems. However, traditional vulnerability models present several general shortcomings when matched with today requirements. To overcome these limits, we propose a vulnerability ontology based on three main enhancements: deeper integration with system asset ontology, better modelling of cause-effect relationships, and deeper integration with dependability control ontology.","PeriodicalId":447746,"journal":{"name":"2010 Third International Conference on Dependability","volume":"125 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2010-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2010 Third International Conference on Dependability","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/DEPEND.2010.22","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 5
Abstract
Security vulnerabilities play an increasing role within dependability procedures for information systems. However, traditional vulnerability models present several general shortcomings when matched with today requirements. To overcome these limits, we propose a vulnerability ontology based on three main enhancements: deeper integration with system asset ontology, better modelling of cause-effect relationships, and deeper integration with dependability control ontology.