• May 27, 2016 News!The submission for Special Issue is officially open now!   [Click]
  • May 03, 2016 News!Vol.6, No.6 has been indexed by EI (Inspec).   [Click]
  • Mar 17, 2017 News!Vol.9, No.2 has been published with online version. 13 peer reviewed articles from 4 specific areas are published in this issue.   [Click]
General Information
Editor-in-chief
Prof. Wael Badawy
Department of Computing and Information Systems Umm Al Qura University, Canada
I'm happy to take on the position of editor in chief of IJCTE. We encourage authors to submit papers concerning any branch of computer theory and engineering.
IJCTE 2014 Vol.6(5): 372-376 ISSN: 1793-8201
DOI: 10.7763/IJCTE.2014.V6.892

Visualization of Mapped Security Standards for Analysis and Use Optimisation

Simona Ramanauskaitė, Dmitrij Olifer, Nikolaj Goranin, Antanas Čenys, and Lukas Radvilavičius
Abstract—There are many security standards which the company can use. While security standards can differ in purpose and covered area, more than one standard can be used at the same time which leads to overlap and potential conflicts in requirements of different standards. In such cases, deep analysis of used standards has to be done to ensure optimal usage of company’s resources while implementing these security requirements.
In this paper we analyze existing solutions for standard harmonization, describe concepts of adaptive mapping and present new ideas for visualization of mapped security standards. These ideas were integrated into developed tool to visualize mapped security standards.

Index Terms—Chord diagram, graph, mapping standard, visualization.

S. Ramanauskaitė, D. Olifer, N. Goranin, A. Čenys, and L. Radvilavičius are with the Vilnius Gediminas Technical University, Vilnius, LT-10223 Lithuania (e-mail: {simona.ramanauskaite, dmitrif.olifer, nikolaj.goranin, antanas.cenys, lukas.radvilavicius}@vgtu.lt).

[PDF]

Cite:Simona Ramanauskaitė, Dmitrij Olifer, Nikolaj Goranin, Antanas Čenys, and Lukas Radvilavičius, "Visualization of Mapped Security Standards for Analysis and Use Optimisation," International Journal of Computer Theory and Engineering vol. 6, no. 5, pp. 372-376, 2014.

Copyright © 2008-2015. International Journal of Computer Theory and Engineering. All rights reserved.
E-mail: ijcte@vip.163.com