-
1
-
-
33646156001
-
Wireless network security: 802.11
-
NIST Special Publication no. 800-48, US Dept. of Commerce, USA
-
Karygiannis T., Owens L., Wireless Network Security: 802.11, Bluetooth and Handheld Devices, NIST Special Publication no. 800-48, US Dept. of Commerce, USA 2002.
-
(2002)
Bluetooth and Handheld Devices
-
-
Karygiannis, T.1
Owens, L.2
-
2
-
-
33646123579
-
-
EU-1ST-2001-37763, Deliverable D4, May
-
PAMPAS ("Pioneering Advanced Mobile Privacy and Security") Project, EU-1ST-2001-37763, Final Roadmap, Deliverable D4, www.pampas.eu.org/, May 2003.
-
(2003)
Final Roadmap
-
-
-
3
-
-
33646164935
-
-
Feb.
-
DMTF CIM Policy Model v. 2.81, available at http://www.dmtf.org/ standards/published_documents.php (Feb. 2005).
-
(2005)
DMTF CIM Policy Model V. 2.81
-
-
-
4
-
-
33646156227
-
Representing security policies in web information systems, policy management for the web - WWW2005 workshop
-
May Chiba, Japan
-
Clemente F., Perez G., Blaya J., Skarmeta A., Representing Security Policies in Web Information Systems, Policy Management for the Web - WWW2005 Workshop, 14th International World Wide Web Conference, May 2005, Chiba, Japan.
-
(2005)
14th International World Wide Web Conference
-
-
Clemente, F.1
Perez, G.2
Blaya, J.3
Skarmeta, A.4
-
5
-
-
0003237703
-
Toward principles for the design of ontologies used for knowledge sharing
-
Kluwer Academic Publishers
-
Gruber T., "Toward principles for the design of ontologies used for knowledge sharing". In Formal Ontology in Conceptual Analysis and Knowledge Representation, Kluwer Academic Publishers, 1993.
-
(1993)
Formal Ontology in Conceptual Analysis and Knowledge Representation
-
-
Gruber, T.1
-
6
-
-
0002734441
-
Ontobroker: Ontology based access to distributed and semi-structured information
-
R. Meersman et al. (Eds.), Kluwer Academic Publishers
-
Decker S., et al., "Ontobroker: Ontology based access to distributed and semi-structured information". In R. Meersman et al. (Eds.), DS-8: Semantic Issues in Multimedia Systems. Kluwer Academic Publishers, 1999.
-
(1999)
DS-8: Semantic Issues in Multimedia Systems
-
-
Decker, S.1
-
7
-
-
84944048132
-
The ponder policy specification language
-
Workshop on Policies for Distributed Systems and Networks
-
Damianou N. et al., "The Ponder Policy Specification Language". In Workshop on Policies for Distributed Systems and Networks, Springer-Verlag LNCS 1995, 2001, pp. 18-39.
-
(2001)
Springer-Verlag LNCS
, vol.1995
, pp. 18-39
-
-
Damianou, N.1
-
10
-
-
62349137903
-
-
Germany (Mar.)
-
BSI, IT Baseline Protection Manual, Germany available at http://www.bsi.bund.de/english/index.htm (Mar. 2005).
-
(2005)
IT Baseline Protection Manual
-
-
-
13
-
-
33646128300
-
-
Mar.
-
Seclists. Org Security Mailing List Archive (http://seclists.org (Mar. 2005).
-
(2005)
-
-
-
17
-
-
8344253615
-
Evolving GATE to meet new challenges in language engineering
-
to appear
-
Bontcheva K., et al., Evolving GATE to Meet New Challenges in Language Engineering. Natural Language Engineering (to appear).
-
Natural Language Engineering
-
-
Bontcheva, K.1
-
19
-
-
0242517622
-
Ontology development 101: A guide to creating your first ontology
-
and Stanford Medical Informatics Technical Report SMI-2001-0880, March
-
Noy N., McGuiness D., "Ontology Development 101: A Guide to Creating Your First Ontology", Stanford Knowledge Systems Laboratory Technical Report KSL-01-05 and Stanford Medical Informatics Technical Report SMI-2001-0880, March 2001.
-
(2001)
Stanford Knowledge Systems Laboratory Technical Report
, vol.KSL-01-05
-
-
Noy, N.1
McGuiness, D.2
-
20
-
-
0011795457
-
A collaborative approach to ontology design
-
Holsapple C., Joshi K., "A collaborative approach to ontology design", Com. of the ACM, 45(2):42-47, 2002.
-
(2002)
Com. of the ACM
, vol.45
, Issue.2
, pp. 42-47
-
-
Holsapple, C.1
Joshi, K.2
-
24
-
-
33751094643
-
-
Mar.
-
Nmap scanner, available at http://www.insecure.org/nmap (Mar. 2005).
-
(2005)
Nmap Scanner
-
-
-
27
-
-
11244319576
-
Implementation of the CIM policy model using PONDER
-
7-9 June Yorktown Heights, NY, USA. IEEE Computer Society 2004, ISBN 0-7695-2141-X
-
Andrea Westerinen, Julie Schott "Implementation of the CIM Policy Model Using PONDER", 5th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2004), 7-9 June 2004, Yorktown Heights, NY, USA. IEEE Computer Society 2004, ISBN 0-7695-2141-X
-
(2004)
5th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2004)
-
-
Westerinen, A.1
Schott, J.2
-
28
-
-
4544385439
-
Ponder policy implementation and validation in a CIM and differentiated services framework
-
Seoul, April
-
L. Lymberopoulos, E. C. Lupu, M. S. Sloman "Ponder Policy Implementation and Validation in a CIM and Differentiated Services Framework". Presented at NOMS 2004, Seoul, April 2004.
-
(2004)
NOMS 2004
-
-
Lymberopoulos, L.1
Lupu, E.C.2
Sloman, M.S.3
-
29
-
-
33646128764
-
-
Department of Computing, Imperial College, 180 Queen's Gate, London SW7 2BZ
-
Oscar Diaz Alcantara, Morris Sloman, "QoS policy specification - A mapping from Ponder to the IETF", Department of Computing, Imperial College, 180 Queen's Gate, London SW7 2BZ,
-
QoS Policy Specification - A Mapping from Ponder to the IETF
-
-
Alcantara, O.D.1
Sloman, M.2
-
33
-
-
33646148762
-
Toward a security ontology
-
May
-
Donner M., "Toward a Security Ontology", In IEEE Security and Privacy, Vol. 1, No. 3, pp. 6-7, May 2003.
-
(2003)
IEEE Security and Privacy
, vol.1
, Issue.3
, pp. 6-7
-
-
Donner, M.1
-
37
-
-
83255163361
-
KAON - Towards a large scale semantic web
-
Bauknecht, K., et al. (Eds.): EC-WEB-2002
-
Bozsak E., Ehrig M., Handschuh S., Hotho J., "KAON - Towards a Large Scale Semantic Web", in: Bauknecht, K., et al. (Eds.): Proc. of the 3rd International Conference on e-Commerce and Web Technologies, EC-WEB-2002, 2002, pp. 304-313.
-
(2002)
Proc. of the 3rd International Conference on e-Commerce and Web Technologies
, pp. 304-313
-
-
Bozsak, E.1
Ehrig, M.2
Handschuh, S.3
Hotho, J.4
-
39
-
-
0242456149
-
Ontology in information security: A useful theoretical foundation and methodological tool
-
V. Raskin, et al. (Eds.), ACM, USA
-
Raskin V., et al., "Ontology in Information Security: A Useful Theoretical Foundation and Methodological Tool". In V. Raskin, et al. (Eds.), Proc. of the New Security Paradigms Workshop, ACM, USA, 2001.
-
(2001)
Proc. of the New Security Paradigms Workshop
-
-
Raskin, V.1
-
42
-
-
13244276903
-
Semantic web technologies to reconcile privacy and context awareness
-
Gandon F. L., Sadeh M. N., "Semantic web technologies to reconcile privacy and context awareness". Web Semantics Journal, 1 (3), 2004.
-
(2004)
Web Semantics Journal
, vol.1
, Issue.3
-
-
Gandon, F.L.1
Sadeh, M.N.2
|