Skip to main content

Mereotopological Analysis of Formal Concepts in Security Ontologies

  • Conference paper
Computational Intelligence in Security for Information Systems 2010

Part of the book series: Advances in Intelligent and Soft Computing ((AINSC,volume 85))

Abstract

In this paper an analysis of security ontologies, using an mereotopological interpretation of the relationship amongst their classes, based on the entailment in the ontology, is presented. The analysis is carried out by means of a graphical tool (called Paella) that implements such an interpretation and it can suggest the potential debugging of anomalies. The analysis also suggests how to interpret the representational anomalies.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Alonso-Jimenez, J.A., Borrego-Diaz, J., Chavez-Gonzalez, A.M., Martin-Mateos, F.J.: Foundational Challenges in Automated Semantic Web Data and Ontology Cleaning. IEEE Intelligent Systems 21(1), 42–52 (2006)

    Article  Google Scholar 

  2. Berners-Lee, T., Hendler, J., Lassila, O.: The Semantic Web. Sci. American, Singapore (May 2001)

    Google Scholar 

  3. Borrego-Díaz, J., Chávez-González, A.M.: Visual Ontology Cleaning: Cognitive Principles and Applicability. In: Sure, Y., Domingue, J. (eds.) ESWC 2006. LNCS, vol. 4011, pp. 317–331. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  4. Borrego-Díaz, J., Chávez-González, A.M.: Using Cognitive Entropy to Manage Uncertain Concepts in Formal Ontologies. In: da Costa, P.C.G., d’Amato, C., Fanizzi, N., Laskey, K.B., Laskey, K.J., Lukasiewicz, T., Nickles, M., Pool, M. (eds.) URSW 2005 - 2007. LNCS (LNAI), vol. 5327, pp. 315–329. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  5. Cohn, A.G., Bennett, B., Gooday, J.M., Gotts, N.M.: Representing and Reasoning with Qualitative Spatial Relations about Regions. In: Stock, O. (ed.) Spatial and Temporal Reasoning. Kluwer, Dordrecth (1997)

    Google Scholar 

  6. Fenz, S., Ekelhart, A.: Formalizing information security knowledge. In: Proc. 4th Int. Symp. on Inf., Computer, and Comm. Security ASIACCS 2009, pp. 183–194. ACM, New York (2009)

    Chapter  Google Scholar 

  7. Grütter, R., Scharrenbach, T., Bauer-Messmer, B.: Improving an RCC-Derived Geospatial Approximation by OWL Axioms. In: Sheth, A.P., Staab, S., Dean, M., Paolucci, M., Maynard, D., Finin, T., Thirunarayan, K. (eds.) ISWC 2008. LNCS, vol. 5318, pp. 293–306. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  8. Knauff, M., Rauh, R., Renz, J.: A Cognitive Assessment of Topological Spatial Relations: Results from an Empirical Investigation. In: Frank, A.U. (ed.) COSIT 1997. LNCS, vol. 1329, pp. 193–206. Springer, Heidelberg (1997)

    Chapter  Google Scholar 

  9. Miller, R.R.: Information management in the aftermath of 9/11. Comm. ACM 45(9), 31–33 (2002)

    Article  Google Scholar 

  10. Murtagh, F., Taskaya, T., Contreras, P., Mothe, J., Englmeier, K.: Interactive Visual Interfaces: A Survey. Artificial Intelligence Review 19, 263–283 (2003)

    Article  Google Scholar 

  11. Renz, J.: Qualitative Spatial Reasoning with Topological Information. In: Renz, J. (ed.) Qualitative Spatial Reasoning with Topological Information. LNCS (LNAI), vol. 2293, p. 31. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  12. Pereira, T., Santos, H.: An Ontology Based Approach to Information Security. Communications in Computer and Information Science 46(part 2), 183–192 (2009)

    Article  Google Scholar 

  13. Smith, S.W., Spafford, E.H.: Grand Challenges in Information Security: Process and Output. IEEE Security and Privacy 2(1), 69–71 (2004)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Aranda-Corral, G.A., Borrego-Díaz, J. (2010). Mereotopological Analysis of Formal Concepts in Security Ontologies. In: Herrero, Á., Corchado, E., Redondo, C., Alonso, Á. (eds) Computational Intelligence in Security for Information Systems 2010. Advances in Intelligent and Soft Computing, vol 85. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-16626-6_4

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-16626-6_4

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-16625-9

  • Online ISBN: 978-3-642-16626-6

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics