Knowledge Based Concept Analysis Method using Concept Maps and UML: Security Notion Case
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 32797
Knowledge Based Concept Analysis Method using Concept Maps and UML: Security Notion Case

Authors: Miquel Colobran, Josep M. Basart

Abstract:

One of the most ancient humankind concerns is knowledge formalization i.e. what a concept is. Concept Analysis, a branch of analytical philosophy, relies on the purpose of decompose the elements, relations and meanings of a concept. This paper aims at presenting a method to make a concept analysis obtaining a knowledge representation suitable to be processed by a computer system using either object-oriented or ontology technologies. Security notion is, usually, known as a set of different concepts related to “some kind of protection". Our method concludes that a more general framework for the concept, despite it is dynamic, is possible and any particular definition (instantiation) depends on the elements used by its construction instead of the concept itself.

Keywords: Concept analysis, Knowledge representation, Security, UML.

Digital Object Identifier (DOI): doi.org/10.5281/zenodo.1061659

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2333

References:


[1] L. C. Agrela, "La superacion por Leibniz de la logica aristotelica," Revista Internacional de Filosofia, vol. Suplemento 3ÔÇ× pp. 67-74, 2010.
[2] P. Jetli, "The Completion of the Emergence of Modern Logic from Boole-s The Mathematical Analysis of Logic to Frege-s Begriffsschrift," in Logic and Its Applications, ser. Lecture Notes in Computer Science, M. Banerjee and A. Seth, Eds. Springer Berlin Heidelberg, 2011, vol. 6521, pp. 105-123. (Online). Available: http://dx.doi.org/10.1007/978- 3-642-18026-2_10
[3] R. Streveler, T. Litzinger, R. Miller, and P. Steif, "Learning Conceptual Knowledge in the Engineering Sciences: Overview and Future Research Directions," Journal of Engineering Education, vol. 97, pp. 279-294, July 2008.
[4] J. Goguen, "What Is a Concept?" Lecture Notes in Computer Science: Conceptual Structures: Common Semantics for Sharing Knowledge, pp. 52-77, 2005. (Online). Available: http://dx.doi.org/10.1007/11524564_4
[5] J. Wilson, Thinking with concepts. Cambridge University Press, 1963.
[6] B. L. Rodgers, "Concepts, Analysis, and the Development of Nursing Knowledge: The Evolutionary Cycle." Journal of Advanced Nursing, vol. 14, pp. 330-335, 1989.
[7] K. C. Walker, L.O. Avant, Strategies for theory construction in nursing, 3rd ed. Norwalk, CT: Appleton & Lange, 1995.
[8] V. L. Griffin-Heslin and al., "An analysis of the concept dignity," Accident and Emergency Nursing, vol. 13, pp. 251-257, 2005.
[9] U. Priss, "Formal Concept Analysis in Information Science," Annual Review of Information Science and Technology, vol. 40, pp. 521-543, 2006. (Online). Available: (http://www.upriss.org.uk/papers/arist.pdf).
[10] J. D. Novak and A. J. Ca├▒as, "The Theory Underlying Concept Maps and How to Construct Them," Technical Report IHMC CmapTools, Tech. Rep. 2006-01, 2006. (Online). Available: (http://cmap.ihmc.us/Publications/ResearchPapers/TheoryCmaps/Theory UnderlyingConceptMaps.htm).
[11] B. Ganter and R. Wille, Formal Concept Analysis: Mathematical Foundations, 1st ed. Secaucus, NJ, USA: Springer-Verlag New York, Inc., 1997.
[12] R. S. Pressman, Software engineeering: a practioner-s approach, 6th ed. Boston, EUA: McGraw-Hill, 2005.
[13] M. O-Docherty, Object-oriented analysis and design : understanding system development with UML 2.0. John Wiley & Sons, 2005.
[14] P. Coad and E. Yourdon, Object-Oriented Analysis. London: Prentice- Hall, 1991.
[15] R. Studer, R. Benjamins, and D. Fensel, "Knowledge engineering: principles and methods," Data and knowledge engineering, vol. 25, pp. 161-197, 1998.
[16] S. Kendal and M. Creen, An Introduction to Knowledge Engineering, 1st ed. Springer, Oct. 2006.
[17] J. Hua, "Study on Knowledge Acquisition Techniques," in Proceedings of the 2008 Second International Symposium on Intelligent Information Technology Application - Volume 01, ser. IITA -08. Washington, DC, USA: IEEE Computer Society, 2008, pp. 181-185. (Online). Available: http://dx.doi.org/10.1109/IITA.2008.152.
[18] S. Potter, "A Survey of Knowledge Acquisition from Natural Language," AKT project report Task 1.1.2, 2001.
[19] J. Wang, Y. Wu, X. Liu, and X. Gao, "Knowledge acquisition method from domain text based on theme logic model and artificial neural network." Expert Syst. Appl., vol. 37, pp. 267-275, 2010. (Online). Available: http://dx.doi.org/10.1016/j.eswa.2009.05.009.
[20] S. P. Overmyer, B. Lavoie, and O. Rambow, "Conceptual Modeling through Linguistic Analysis Using LIDA." in Software Engineering, 2001. ICSE 2001. Proceedings of the 23rd International Conference. IEEE Computer Society, 2001, pp. 401-410.
[21] R. J. Abbott, "Program design by informal English descriptions," Commun. ACM, vol. 26, pp. 882-894, November 1983. (Online). Available: http://doi.acm.org/10.1145/182.358441.
[22] L. Dillard and B. Myers, "Visual Teaching Tools: Concept Maps," University of Florida, Tech. Rep., May 2008.
[23] M. J. Eppler, "A comparison between concept maps, mind maps, conceptual diagrams, and visual metaphors as complementary tools for knowledge construction and sharing," Information Visualization, vol. 5, no. 3, pp. 202-210, 2006.
[24] T. Buzan and B. Buzan, The Mind Map Book, 2nd ed. London: BBC Books, 1995.
[25] G. Booch, Object-oriented analysis and design with applications (2nd ed.). Redwood City, CA, USA: Benjamin-Cummings Publishing Co., Inc., 1994. (Online). Available: http://portal.acm.org/citation.cfm?id=174890.
[26] J. Rumbaugh, Object-oriented modeling and design. Prentice Hall, 1991.
[27] I. Jacobson, Object Oriented Software Engineering: A Use Case Driven Approach. Addison-Wesley, 1992.
[28] E. H. Orallo, "El Lenguaje Unificado de Modelado (UML)," Manuales Formativos ACTA, num 26, October 2002.
[29] S. Cranefield and M. K. Purvis, "UML as an Ontology Modelling Language." in In Proceedings of the Workshop on Intelligent Information Integration, 16th International Joint Conference on Artificial Intelligence (IJCAI-99), 1999, pp. 46-53.
[30] A. Felfernig, G. Friedrich, D. Jannach, and M. Zanker, "Configuration Knowledge Representation Using UML/OCL," in "UML" 2002 - The Unified Modeling Language. Springer Berlin / Heidelberg, 2002, pp. 91-108. (Online). Available: http://dx.doi.org/10.1007/3-540-45800- X_5.
[31] C. W. Chan, "Knowledge and software modeling using UML." Software and System Modeling, vol. 3, no. 4, pp. 294-302, 2004.
[32] B. Buzan, People, States and Fear. Harvester-Wheatsheaf, Brighton, 1983.
[33] P. Digeser, "The Concept of Security," 1994, presented at the Annual Meeting of the American Political Science Association 14 September 1994. Obtained from author. Unpublished.
[34] Undp, HDR 1994 - New Dimensions of Human Security. Human Development Report Office (HDRO), United Nations Development Programme (UNDP), 1994. (Online). Available: http://EconPapers.repec.org/RePEc:hdr:report:hdr1994.
[35] E. Rothschild, "What is security? the quest for world order," Daedalus, vol. 124, no. 3, pp. 53-99, June 1995.