Switch to: References

Citations of:

Understanding and Modeling Prevention

In Renata Guizzardi, Jolita Ralyté & Xavier Franch (eds.), Research Challenges in Information Science - 16th International Conference, RCIS 2022. Cham, Svizzera: Springer. pp. 389-405 (2022)

Add citations

You must login to add citations.
  1. An Ontology of Security from a Risk Treatment Perspective.Ítalo Oliveira, Tiago Prince Sales, Riccardo Baratella, Mattia Fumagalli & Giancarlo Guizzardi - 2022 - In 41th International Conference, ER 2022, Proceedings. Cham: Springer. pp. 365-379.
    In Risk Management, security issues arise from complex relations among objects and agents, their capabilities and vulnerabilities, the events they are involved in, and the value and risk they ensue to the stakeholders at hand. Further, there are patterns involving these relations that crosscut many domains, ranging from information security to public safety. Understanding and forming a shared conceptualization and vocabulary about these notions and their relations is fundamental for modeling the corresponding scenarios, so that proper security countermeasures can be (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  • Ontological Analysis and Redesign of Security Modeling in ArchiMate.Ítalo Oliveira, Tiago Prince Sales, João Paulo A. Almeida, Riccardo Baratella, Mattia Fumagalli & Giancarlo Guizzardi - 2022 - In The Practice of Enterprise Modeling - 15th IFIP WG 8.1 Working Conference, PoEM 2022. Springer. pp. 82-98.
    Enterprise Risk Management and security have become a fundamental part of Enterprise Architecture, so several frameworks and modeling languages have been designed to support the activities associated with these areas. Archi- Mate’s Risk and Security Overlay is one of such proposals, endorsed by The Open Group. We investigate the capabilities of the proposed security-related con- structs in ArchiMate with regard to the necessities of enterprise security modeling. Our analysis relies on a well-founded reference ontology of security to uncover ambiguity, missing (...)
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation