Advertisement

Mereotopological Analysis of Formal Concepts in Security Ontologies

  • Gonzalo A. Aranda-Corral
  • Joaquín Borrego-Díaz
Part of the Advances in Intelligent and Soft Computing book series (AINSC, volume 85)

Abstract

In this paper an analysis of security ontologies, using an mereotopological interpretation of the relationship amongst their classes, based on the entailment in the ontology, is presented. The analysis is carried out by means of a graphical tool (called Paella) that implements such an interpretation and it can suggest the potential debugging of anomalies. The analysis also suggests how to interpret the representational anomalies.

Keywords

Information Security Formal Concept Security Expert Strong Interpretation Ontology Source 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Alonso-Jimenez, J.A., Borrego-Diaz, J., Chavez-Gonzalez, A.M., Martin-Mateos, F.J.: Foundational Challenges in Automated Semantic Web Data and Ontology Cleaning. IEEE Intelligent Systems 21(1), 42–52 (2006)CrossRefGoogle Scholar
  2. 2.
    Berners-Lee, T., Hendler, J., Lassila, O.: The Semantic Web. Sci. American, Singapore (May 2001)Google Scholar
  3. 3.
    Borrego-Díaz, J., Chávez-González, A.M.: Visual Ontology Cleaning: Cognitive Principles and Applicability. In: Sure, Y., Domingue, J. (eds.) ESWC 2006. LNCS, vol. 4011, pp. 317–331. Springer, Heidelberg (2006)CrossRefGoogle Scholar
  4. 4.
    Borrego-Díaz, J., Chávez-González, A.M.: Using Cognitive Entropy to Manage Uncertain Concepts in Formal Ontologies. In: da Costa, P.C.G., d’Amato, C., Fanizzi, N., Laskey, K.B., Laskey, K.J., Lukasiewicz, T., Nickles, M., Pool, M. (eds.) URSW 2005 - 2007. LNCS (LNAI), vol. 5327, pp. 315–329. Springer, Heidelberg (2008)CrossRefGoogle Scholar
  5. 5.
    Cohn, A.G., Bennett, B., Gooday, J.M., Gotts, N.M.: Representing and Reasoning with Qualitative Spatial Relations about Regions. In: Stock, O. (ed.) Spatial and Temporal Reasoning. Kluwer, Dordrecth (1997)Google Scholar
  6. 6.
    Fenz, S., Ekelhart, A.: Formalizing information security knowledge. In: Proc. 4th Int. Symp. on Inf., Computer, and Comm. Security ASIACCS 2009, pp. 183–194. ACM, New York (2009)CrossRefGoogle Scholar
  7. 7.
    Grütter, R., Scharrenbach, T., Bauer-Messmer, B.: Improving an RCC-Derived Geospatial Approximation by OWL Axioms. In: Sheth, A.P., Staab, S., Dean, M., Paolucci, M., Maynard, D., Finin, T., Thirunarayan, K. (eds.) ISWC 2008. LNCS, vol. 5318, pp. 293–306. Springer, Heidelberg (2008)CrossRefGoogle Scholar
  8. 8.
    Knauff, M., Rauh, R., Renz, J.: A Cognitive Assessment of Topological Spatial Relations: Results from an Empirical Investigation. In: Frank, A.U. (ed.) COSIT 1997. LNCS, vol. 1329, pp. 193–206. Springer, Heidelberg (1997)CrossRefGoogle Scholar
  9. 9.
    Miller, R.R.: Information management in the aftermath of 9/11. Comm. ACM 45(9), 31–33 (2002)CrossRefGoogle Scholar
  10. 10.
    Murtagh, F., Taskaya, T., Contreras, P., Mothe, J., Englmeier, K.: Interactive Visual Interfaces: A Survey. Artificial Intelligence Review 19, 263–283 (2003)CrossRefGoogle Scholar
  11. 11.
    Renz, J.: Qualitative Spatial Reasoning with Topological Information. In: Renz, J. (ed.) Qualitative Spatial Reasoning with Topological Information. LNCS (LNAI), vol. 2293, p. 31. Springer, Heidelberg (2002)CrossRefGoogle Scholar
  12. 12.
    Pereira, T., Santos, H.: An Ontology Based Approach to Information Security. Communications in Computer and Information Science 46(part 2), 183–192 (2009)CrossRefGoogle Scholar
  13. 13.
    Smith, S.W., Spafford, E.H.: Grand Challenges in Information Security: Process and Output. IEEE Security and Privacy 2(1), 69–71 (2004)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2010

Authors and Affiliations

  • Gonzalo A. Aranda-Corral
    • 1
  • Joaquín Borrego-Díaz
    • 2
  1. 1.Department of Information TechnologyUniversidad de HuelvaPalos de La FronteraSpain
  2. 2.Department of Computer Science and Artificial IntelligenceUniversidad de SevillaSevillaSpain

Personalised recommendations