Tools for Hierarchical Security Modeling Cover Image

Tools for Hierarchical Security Modeling
Tools for Hierarchical Security Modeling

Author(s): Florentina-Loredana Dragomir, Gelu Alexandrescu, Florin Postolache
Subject(s): Social Sciences, Education
Published by: Carol I National Defence University Publishing House
Keywords: Ontology; Security System; Hierarchical Security Systems;

Summary/Abstract: Identifying security properties raises a laborious analysis within the design of a software system. Some tools help model security concepts, others test and validate results. The article introduces an introduction to the software used to design security systems, especially in the sphere of hierarchical security modelling encountered in organizations. An analysis of the design and modelling tools from the perspective of security requirements and the adjacent principles of interest is presented. As there is no clear separation between design errors and security deficiencies, there are some design practices that lead to a security breach. Obviously, some design methods generate more insecurity than others, which is why the tools are presented from the perspective of vulnerability modelling, cryptography, security protocols, and risk management. The use of security-oriented tools guarantees the availability of functionality, does not guarantee by this functionality the security itself, because they are specialized in certain areas of application and abstraction The aim of this paper is the ontology development for multiple personalized security system approaches in order to adapt a suitable domain ontology according to hierarchical security systems policies and to satisfy the future requirements of users and promote the use value. To answer at “How efficiency is the proposed Hierarchical Ontology?”, a domain ontology model is designed and a methodology for domain ontology adaptation is developed. Subsequently, a domain ontology adaptation system is implemented based on organizational security culture key factors. The article ends with the presentation of a few questions that an instrument designed for the hierarchical security of an organization needs to answer.

  • Issue Year: 14/2018
  • Issue No: 04
  • Page Range: 034-038
  • Page Count: 5
  • Language: English
Toggle Accessibility Mode