-
3
-
-
0003237703
-
Toward principles for the design of ontologies used for knowledge sharing
-
Kluwer Academic Publishers
-
Gruber T., "Toward principles for the design of ontologies used for knowledge sharing". In Formal Ontology in Conceptual Analysis and Knowledge Representation, Kluwer Academic Publishers, 1993.
-
(1993)
Formal Ontology in Conceptual Analysis and Knowledge Representation
-
-
Gruber, T.1
-
9
-
-
0011795457
-
A collaborative approach to ontology design
-
Holsapple C., Joshi K., "A collaborative approach to ontology design", Com. of the ACM, 45(2):42-47, 2002.
-
(2002)
Com. of the ACM
, vol.45
, Issue.2
, pp. 42-47
-
-
Holsapple, C.1
Joshi, K.2
-
11
-
-
33646728323
-
Toward a formal common information model ontology
-
Quirolgico S., Assis A., Westerinen A., Baskey M., Stokes E., "Toward a Formal Common Information Model Ontology", in Proc. of WISE, pp 11-21, 2004.
-
(2004)
Proc. of WISE
, pp. 11-21
-
-
Quirolgico, S.1
Assis, A.2
Westerinen, A.3
Baskey, M.4
Stokes, E.5
-
12
-
-
33751114731
-
-
Sep.
-
Protégé Ontology Development Environment, available at http://protege.stanford.edu/ (Sep. 2005)
-
(2005)
-
-
-
13
-
-
33751084922
-
-
Sep.
-
Protégé OWL Plugin, available at http://protege.stanford. edu/pluging/owl/ (Sep. 2005)
-
(2005)
-
-
-
15
-
-
62349137903
-
-
BSI, Germany (Mar.)
-
BSI, IT Baseline Protection Manual, Germany available at www.bsi.bund.de/ (Mar. 2005).
-
(2005)
IT Baseline Protection Manual
-
-
-
16
-
-
33751101931
-
-
Mar.
-
Cisco Security Advisories, available at www.cisco.com/go/psirt/ (Mar. 2005).
-
(2005)
-
-
-
17
-
-
33751081596
-
-
Mar.
-
SecurityFocus security portal, available at www.securityfocus.com (Mar. 2005).
-
(2005)
-
-
-
18
-
-
33751082725
-
-
Mar.
-
Org Security Mailing List Archive, available at www.seclists.org (Mar. 2005).
-
(2005)
-
-
-
19
-
-
33751083638
-
-
Mar.
-
Common Vulnerabilities and Exposures, available at www.cve.mitre.org/ (Mar. 2005).
-
(2005)
-
-
-
20
-
-
33751094643
-
-
Mar.
-
Nmap scanner, available at wwvv.insecure.org/nmap (Mar. 2005).
-
(2005)
Nmap Scanner
-
-
-
23
-
-
84944048132
-
The ponder policy specification language
-
Workshop on Policies for Distributed Systems and Networks
-
Damianou N., et al., "The Ponder Policy Specification Language". In Workshop on Policies for Distributed Systems and Networks, Springer-Verlag (LNCS 1995), 2001, pp. 18-39.
-
(2001)
Springer-Verlag (LNCS)
, vol.1995
, pp. 18-39
-
-
Damianou, N.1
-
25
-
-
4544385439
-
Ponder policy implementation and validation in a CIM and differentiated services framework
-
Seoul
-
Lymberopoulos L., Lupu E., Sloman M., "Ponder Policy Implementation and Validation in a CIM and Differentiated Services Framework". NOMS 2004, Seoul, 2004.
-
(2004)
NOMS 2004
-
-
Lymberopoulos, L.1
Lupu, E.2
Sloman, M.3
-
28
-
-
33646148762
-
Toward a security ontology
-
May
-
Donner M., "Toward a Security Ontology", In IEEE Security and Privacy, Vol. 1, No. 3, pp. 6-7, May 2003.
-
(2003)
IEEE Security and Privacy
, vol.1
, Issue.3
, pp. 6-7
-
-
Donner, M.1
-
34
-
-
0242456149
-
Ontology in information security: A useful theoretical foundation and methodological tool
-
V. Raskin, et al. (Eds.), ACM, USA
-
Raskin V., et al., "Ontology in Information Security: A Useful Theoretical Foundation and Methodological Tool". In V. Raskin, et al. (Eds.), Proc. of the New Security Paradigms Workshop, ACM, USA, 2001.
-
(2001)
Proc. of the New Security Paradigms Workshop
-
-
Raskin, V.1
-
37
-
-
13244276903
-
Semantic web technologies to reconcile privacy and context awareness
-
Gandon F., Sadeh N., "Semantic web technologies to reconcile privacy and context awareness". Web Semantics Journal, 1(3), 2004.
-
(2004)
Web Semantics Journal
, vol.1
, Issue.3
-
-
Gandon, F.1
Sadeh, N.2
|