-
1
-
-
58149365542
-
Towards Principles for the Design of Ontologies used for Knowledge Sharing
-
Gruber, T., Towards Principles for the Design of Ontologies used for Knowledge Sharing. International Journal of Human-Computer Studies, 1995. 43(5/6): p. 907-928.
-
(1995)
International Journal of Human-Computer Studies
, vol.43
, Issue.5-6
, pp. 907-928
-
-
Gruber, T.1
-
2
-
-
49049106851
-
-
Dobson, G. and P. Sawyer, Revisiting Ontology-Based Requirements Engineering in the age of the Semantic Web. International Seminar on Dependable Requirements Engineering of Computerised Systems at NPPs, Institute for Energy Technology (IFE), Halden, 2006.
-
Dobson, G. and P. Sawyer, Revisiting Ontology-Based Requirements Engineering in the age of the Semantic Web. International Seminar on "Dependable Requirements Engineering of Computerised Systems at NPPs", Institute for Energy Technology (IFE), Halden, 2006.
-
-
-
-
4
-
-
0002971942
-
Ontology Applications and Design
-
Gruninger, M. and J. Lee, Ontology Applications and Design. Communications of the ACM, 2002. 45(2): p. 39-41.
-
(2002)
Communications of the ACM
, vol.45
, Issue.2
, pp. 39-41
-
-
Gruninger, M.1
Lee, J.2
-
8
-
-
17044383806
-
Security in the Semantic Web using OWL
-
2005. 101, p
-
Denker, G., L. Kagal, and T. Finin, Security in the Semantic Web using OWL. Information Security Technical Report, 2005. 10(1): p. 51-58.
-
Information Security Technical Report
, pp. 51-58
-
-
Denker, G.1
Kagal, L.2
Finin, T.3
-
9
-
-
0002698747
-
Information system security management in the new millennium
-
Dhillon, G. and J. Backhouse, Information system security management in the new millennium. Communications of the ACM, 2000. 43(7): p. 125-128.
-
(2000)
Communications of the ACM
, vol.43
, Issue.7
, pp. 125-128
-
-
Dhillon, G.1
Backhouse, J.2
-
11
-
-
33751088049
-
-
Tsoumas, B. and D. Gritzalis, Towards an Ontology-based Security Management. Proceedings of the 20th International Conference on Advanced Information Networking and Applications. IEEE Computer Society, 2006. 1 (AINA'06) - 01 AINA '06.
-
Tsoumas, B. and D. Gritzalis, Towards an Ontology-based Security Management. Proceedings of the 20th International Conference on Advanced Information Networking and Applications. IEEE Computer Society, 2006. Volume 1 (AINA'06) - Volume 01 AINA '06.
-
-
-
-
12
-
-
49049105374
-
-
Kitchenham, B., Procedures for performing systematic reviews (Joint Technical Report), in TR/SE-0401. 2004, Software Engineering Group. Department of Computer Science: Keele University. p. 33 p.
-
Kitchenham, B., Procedures for performing systematic reviews (Joint Technical Report), in TR/SE-0401. 2004, Software Engineering Group. Department of Computer Science: Keele University. p. 33 p.
-
-
-
-
13
-
-
42149158539
-
-
Systems Engineering and Computer Science Department, UFRJ: Río de Janeiro, Brazil
-
Biolchini, J. and P. Gomes, Systematic Review in Software Engineering. 2005, Systems Engineering and Computer Science Department, UFRJ: Río de Janeiro, Brazil.
-
(2005)
Systematic Review in Software Engineering
-
-
Biolchini, J.1
Gomes, P.2
-
18
-
-
49049116215
-
An ontology description for SIP security flaws
-
Corrected Proof, In Press
-
Geneiatakis, D. and C. Lambrinoudakis, An ontology description for SIP security flaws. Computer Communications, 2006. In Press, Corrected Proof.
-
(2006)
Computer Communications
-
-
Geneiatakis, D.1
Lambrinoudakis, C.2
-
20
-
-
49249114417
-
Modeling conversation policies using permissions and obligations
-
AAMAS workshop on Agent communication, Springer-Verlag
-
Kagal, L. and T. Finin, Modeling conversation policies using permissions and obligations. AAMAS workshop on Agent communication, LNCS. Springer-Verlag, 2005.
-
(2005)
LNCS
-
-
Kagal, L.1
Finin, T.2
-
22
-
-
62749155242
-
Security Ontology for Annotating Resources
-
Agia Napa. Cyprus
-
Kim, A., J. Luo, and M. Kang. Security Ontology for Annotating Resources. in 4th International Conference on Ontologies, Databases, and Applications of Semantics (ODBASE'05). 2005. Agia Napa. Cyprus.
-
(2005)
4th International Conference on Ontologies, Databases, and Applications of Semantics (ODBASE'05)
-
-
Kim, A.1
Luo, J.2
Kang, M.3
-
23
-
-
49049115424
-
Visual modeling and formal specification of constraints of RBAC using semantic web technology
-
Corrected Proof, In Press
-
Kwon, J. and C.-J. Moon, Visual modeling and formal specification of constraints of RBAC using semantic web technology. Knowledge-Based Systems, 2006. In Press, Corrected Proof.
-
(2006)
Knowledge-Based Systems
-
-
Kwon, J.1
Moon, C.-J.2
-
25
-
-
33646503483
-
Towards an ontology-based approach for specifying and securing Web services
-
Maamar, Z., N.C. Narendra, and S. Sattanathan, Towards an ontology-based approach for specifying and securing Web services. Information and Software Technology, 2006. 48(7): p. 441-455.
-
(2006)
Information and Software Technology
, vol.48
, Issue.7
, pp. 441-455
-
-
Maamar, Z.1
Narendra, N.C.2
Sattanathan, S.3
-
26
-
-
17744389776
-
A service-centric model for intrusion detection in next-generation networks
-
McGibney, J., N. Schmidt, and A. Patel, A service-centric model for intrusion detection in next-generation networks. Computer Standards & Interfaces, 2005. 27(5): p. 513-520.
-
(2005)
Computer Standards & Interfaces
, vol.27
, Issue.5
, pp. 513-520
-
-
McGibney, J.1
Schmidt, N.2
Patel, A.3
-
27
-
-
8344270973
-
An Ontology for Modelling Security: The Tropos Approach
-
Springer Berlin, Heidelberg. p
-
Mouratidis, H., P. Giorgini, and G. Manson, An Ontology for Modelling Security: The Tropos Approach, in Knowledge-Based Intelligent Information and Engineering Systems. 2003, Springer Berlin / Heidelberg. p. 1387-1394.
-
(2003)
Knowledge-Based Intelligent Information and Engineering Systems
, pp. 1387-1394
-
-
Mouratidis, H.1
Giorgini, P.2
Manson, G.3
-
30
-
-
10044293324
-
Security standards for the semantic web
-
Thuraisingham, B., Security standards for the semantic web. Computer Standards & Interfaces, 2005. 27(3): p. 257-268.
-
(2005)
Computer Standards & Interfaces
, vol.27
, Issue.3
, pp. 257-268
-
-
Thuraisingham, B.1
-
32
-
-
49049100141
-
-
DOD, Orange Book. Estándar DOD 5200.58-STD., in www.radium.ncsc.mil/tpep/library/rainbow/5200.28-STD.html, D.d.d.d.l. EEUU, Editor. 1970.
-
DOD, Orange Book. Estándar DOD 5200.58-STD., in www.radium.ncsc.mil/tpep/library/rainbow/5200.28-STD.html, D.d.d.d.l. EEUU, Editor. 1970.
-
-
-
-
33
-
-
44949240818
-
Security Attack Ontology for Web Services
-
IEEE Computer Society
-
Vorobiev, A. and J. Han, Security Attack Ontology for Web Services. Proceedings of the Second International Conference on Semantics, Knowledge, and Grid SKG '06. IEEE Computer Society, 2006: p. 42.
-
(2006)
Proceedings of the Second International Conference on Semantics, Knowledge, and Grid SKG '06
, pp. 42
-
-
Vorobiev, A.1
Han, J.2
-
35
-
-
49049103440
-
Ontology-based software reliability modelling
-
Helsinki, Finland
-
Zhou, J., E. Niemelä, and A. Evesti, Ontology-based software reliability modelling. Proccedings of Software and Services Variability Management Workshop - Concepts, Models and Tools. Helsinki, Finland, 2007: p. 17-31.
-
(2007)
Proccedings of Software and Services Variability Management Workshop - Concepts, Models and Tools
, pp. 17-31
-
-
Zhou, J.1
Niemelä, E.2
Evesti, A.3
-
36
-
-
49049097377
-
-
Zhou, J., E. Niemela, and P. Savolainen, An Integrated QoS-Aware Service Development and Management Framework. wicsa, 2007: p. 13.
-
Zhou, J., E. Niemela, and P. Savolainen, An Integrated QoS-Aware Service Development and Management Framework. wicsa, 2007: p. 13.
-
-
-
-
38
-
-
1542273520
-
A Method to Choose the Appropriate Ontology
-
ONTOMETRIC
-
Lozano-Tello, A. and A. Gómez-Pérez, ONTOMETRIC: A Method to Choose the Appropriate Ontology. Journal of Database Management. Special Issue on Ontological analysis, Evaluation, and Engineering of Business Systems Analysis Methods, 2004. 15(2).
-
(2004)
Journal of Database Management
, vol.15
, Issue.2
-
-
Lozano-Tello, A.1
Gómez-Pérez, A.2
|