{"title":"面向信息风险评估与可靠性管理的改进漏洞本体","authors":"M. Aime, Fabio Guasconi","doi":"10.1109/DEPEND.2010.22","DOIUrl":null,"url":null,"abstract":"Security vulnerabilities play an increasing role within dependability procedures for information systems. However, traditional vulnerability models present several general shortcomings when matched with today requirements. To overcome these limits, we propose a vulnerability ontology based on three main enhancements: deeper integration with system asset ontology, better modelling of cause-effect relationships, and deeper integration with dependability control ontology.","PeriodicalId":447746,"journal":{"name":"2010 Third International Conference on Dependability","volume":"125 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2010-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":"{\"title\":\"Enhanced Vulnerability Ontology for Information Risk Assessment and Dependability Management\",\"authors\":\"M. Aime, Fabio Guasconi\",\"doi\":\"10.1109/DEPEND.2010.22\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Security vulnerabilities play an increasing role within dependability procedures for information systems. However, traditional vulnerability models present several general shortcomings when matched with today requirements. To overcome these limits, we propose a vulnerability ontology based on three main enhancements: deeper integration with system asset ontology, better modelling of cause-effect relationships, and deeper integration with dependability control ontology.\",\"PeriodicalId\":447746,\"journal\":{\"name\":\"2010 Third International Conference on Dependability\",\"volume\":\"125 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2010-07-18\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"5\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2010 Third International Conference on Dependability\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/DEPEND.2010.22\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2010 Third International Conference on Dependability","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/DEPEND.2010.22","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Enhanced Vulnerability Ontology for Information Risk Assessment and Dependability Management
Security vulnerabilities play an increasing role within dependability procedures for information systems. However, traditional vulnerability models present several general shortcomings when matched with today requirements. To overcome these limits, we propose a vulnerability ontology based on three main enhancements: deeper integration with system asset ontology, better modelling of cause-effect relationships, and deeper integration with dependability control ontology.