2017 IEEE 3rd International Conference on Collaboration and Internet Computing (CIC) 2017
DOI: 10.1109/cic.2017.00012
|View full text |Cite
|
Sign up to set email alerts
|

OntoEDS: Protecting Energy Delivery Systems by Collaboratively Analyzing Security Requirements

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
3
1

Relationship

2
2

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 11 publications
0
3
0
Order By: Relevance
“…OntoEDS [13] is a collaborative tool that models security requirements into a comprehensive, EDS-specific ontology, allowing for stakeholders and security experts in the EDS field to model and understand security requirements, their interdependencies, and their specific implementations, as well as retrieve and synthesize these requirements in an easy-to-use and tailored manner. OntoEDS also establishes a solid foundation of which additional tools can be built off of to help implement, analyze, and evaluate such security requirements.…”
Section: Ontology Modeling For Edsmentioning
confidence: 99%
See 1 more Smart Citation
“…OntoEDS [13] is a collaborative tool that models security requirements into a comprehensive, EDS-specific ontology, allowing for stakeholders and security experts in the EDS field to model and understand security requirements, their interdependencies, and their specific implementations, as well as retrieve and synthesize these requirements in an easy-to-use and tailored manner. OntoEDS also establishes a solid foundation of which additional tools can be built off of to help implement, analyze, and evaluate such security requirements.…”
Section: Ontology Modeling For Edsmentioning
confidence: 99%
“…For example, the NIST 800-82 document [21] describes EDS instances and their functional relationships, including what assets control or send data to each other. For the purposes of our ExSol approach, we leveraged the OntoEDS tool [13], previously described in Section 2.3, which provides a well-defined ontological representation containing a variety of requirements that elucidate system configurations and security features for EDS, such as information about threats and attacks that target specific assets, and information about what security features or requirements protect those assets against what attacks and threats.…”
Section: Modeling Security Requirementsmentioning
confidence: 99%
“…As a part of previous work [9], we developed 4 different types of ontology projections, namely, Scenario, Domain, Goal and Risk projections. Scenario projections provide facts describing a system that include agent behavior and environmental context.…”
Section: Introductionmentioning
confidence: 99%