EconPapers    
Economics at your fingertips  
 

Méta modèle de la sécurité des systèmes d'information: enrichissement par le contexte

Jacky Akoka (), Nabil Laoufi and Nadira Lammari ()
Additional contact information
Jacky Akoka: CEDRIC - ISID - CEDRIC. Ingénierie des Systèmes d'Information et de Décision - CEDRIC - Centre d'études et de recherche en informatique et communications - ENSIIE - Ecole Nationale Supérieure d'Informatique pour l'Industrie et l'Entreprise - CNAM - Conservatoire National des Arts et Métiers [CNAM], IMT-BS - DSI - Département Systèmes d'Information - TEM - Télécom Ecole de Management - IMT - Institut Mines-Télécom [Paris] - IMT-BS - Institut Mines-Télécom Business School - IMT - Institut Mines-Télécom [Paris]
Nabil Laoufi: EMP - École Militaire Polytechnique [Alger] - MESRS - Ministère de l'Enseignement Supérieur et de la Recherche Scientifique [Algérie] - Ministère de la Défense Nationale [Algérie]
Nadira Lammari: CEDRIC - ISID - CEDRIC. Ingénierie des Systèmes d'Information et de Décision - CEDRIC - Centre d'études et de recherche en informatique et communications - ENSIIE - Ecole Nationale Supérieure d'Informatique pour l'Industrie et l'Entreprise - CNAM - Conservatoire National des Arts et Métiers [CNAM]

Post-Print from HAL

Abstract: Companies are increasingly confronted with the problems caused by their reliance on information systems. They are thus forced to implement a process of security requirements derivation starting from risks analysis. This process requires a thorough analysis of the organizational context. The purpose of this article is to propose a security meta model enriched by an ontology of the context. To this end, we propose (i) the development of a context ontology based on the ISO / IEC 27000: 2018 security standard,(ii) an approach to enrich the security meta model with context ontology. This enrichment is carried out in two phases. The first is related to the identification and extraction of elements of the context of the enterprise. The second concerns the determination of the security criteria of the assets of the organization to be protected and (iii) the application to a real case which also serves as a first step in the validation of our approach.

Keywords: Meta model; Information systems; Ontology; Security; Assets; Context; Méta modèle; Sécurité; Systèmes d’information; Ontologie; Contexte; Actifs (search for similar items in EconPapers)
Date: 2018-05-28
Note: View the original document on HAL open archive server: https://hal.science/hal-02283829v1
References: View complete reference list from CitEc
Citations:

Published in INFORSID 2018 : 36e congrès INFormatique des ORganisation et Systèmes d'Information et de Décision, May 2018, Nantes, France. pp.63 - 87

Downloads: (external link)
https://hal.science/hal-02283829v1/document (application/pdf)

Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.

Export reference: BibTeX RIS (EndNote, ProCite, RefMan) HTML/Text

Persistent link: https://EconPapers.repec.org/RePEc:hal:journl:hal-02283829

Access Statistics for this paper

More papers in Post-Print from HAL
Bibliographic data for series maintained by CCSD ().

 
Page updated 2025-03-19
Handle: RePEc:hal:journl:hal-02283829