2010
DOI: 10.1007/978-3-642-16626-6_4
|View full text |Cite
|
Sign up to set email alerts
|

Mereotopological Analysis of Formal Concepts in Security Ontologies

Abstract: Abstract.In this paper an analysis of security ontologies, using an mereotopological interpretation of the relationship amongst their classes, based on the entailment in the ontology, is presented. The analysis is carried out by means of a graphical tool (called Paella) that implements such an interpretation and it can suggest the potential debugging of anomalies. The analysis also suggests how to interpret the representational anomalies.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2012
2012
2022
2022

Publication Types

Select...
2
1
1

Relationship

3
1

Authors

Journals

citations
Cited by 4 publications
(5 citation statements)
references
References 13 publications
0
5
0
Order By: Relevance
“…The approach presented does not attempt to combine both theories, just use a translation of DL to QSR to facilitate user interaction by visual reasoning. This approach was successful in previous case studies [4].…”
Section: Closing Remarks and Related Workmentioning
confidence: 65%
“…The approach presented does not attempt to combine both theories, just use a translation of DL to QSR to facilitate user interaction by visual reasoning. This approach was successful in previous case studies [4].…”
Section: Closing Remarks and Related Workmentioning
confidence: 65%
“…Additionally, SWT provide tools for analysing important features as, for instance, consistency, compliance with current Security Standards, as well as the fidelity with the intended model (see e.g. Aranda et al [3] in SIS, and Alonso et al [2] in general). The latter feature is based on a sound representation of some concepts, i.e.…”
Section: Semantic Methods For Sismentioning
confidence: 99%
“…Also the flowchart concept appears in biotechnology ontologies as, e.g. in the National Cancer Institute Thesaurus, 2 Semanticscience Integrated Ontology 3 and SWEET Governance Ontology 4 , among others approaches.…”
Section: Fig 1 Flowchart Box Element Classmentioning
confidence: 99%
“…Ontological Engineering provides tools to analyze important features as consistency, compliance with current Security Standards, and fidelity to the intended model [1]. The latter is about the sound representation of some concepts, this means, whether the specification represents the intentions of security experts and there are not axioms nor properties clearly incompatible with real concepts.…”
Section: Introductionmentioning
confidence: 99%
“…Therefore, the ontology-based approach enables the definition of security concepts and their dependencies in an understandable way for both, humans and software agents [11]. Beside consistency and complexity, the absence of representational anomalies is mandatory [1].…”
Section: Introductionmentioning
confidence: 99%