Abstract—There are many security standards which the
company can use. While security standards can differ in
purpose and covered area, more than one standard can be used
at the same time which leads to overlap and potential conflicts
in requirements of different standards. In such cases, deep
analysis of used standards has to be done to ensure optimal
usage of company’s resources while implementing these
security requirements.
In this paper we analyze existing solutions for standard
harmonization, describe concepts of adaptive mapping and
present new ideas for visualization of mapped security
standards. These ideas were integrated into developed tool to
visualize mapped security standards.
Index Terms—Chord diagram, graph, mapping standard,
visualization.
S. Ramanauskaitė, D. Olifer, N. Goranin, A. Čenys, and L. Radvilavičius
are with the Vilnius Gediminas Technical University, Vilnius, LT-10223
Lithuania (e-mail: {simona.ramanauskaite, dmitrif.olifer, nikolaj.goranin,
antanas.cenys, lukas.radvilavicius}@vgtu.lt).
[PDF]
Cite:Simona Ramanauskaitė, Dmitrij Olifer, Nikolaj Goranin, Antanas Čenys, and Lukas Radvilavičius, "Visualization of Mapped Security Standards for Analysis and Use Optimisation," International Journal of Computer Theory and Engineering vol. 6, no. 5, pp. 372-376, 2014.