-
1
-
-
57849101921
-
AMBRA: Automated model-based risk analysis
-
New York, NY, USA, ACM
-
M. Aime, A. Atzeni, and P. Pomi. AMBRA: automated model-based risk analysis. In QoP '07: Proceedings of the 2007 ACM workshop on Quality of protection, pages 43-48, New York, NY, USA, 2007. ACM.
-
(2007)
QoP '07: Proceedings of the 2007 ACM Workshop on Quality of Protection
, pp. 43-48
-
-
Aime, M.1
Atzeni, A.2
Pomi, P.3
-
2
-
-
9744248703
-
Review: Knowledge management and knowledge management systems: Conceptual foundations and research issues
-
M. Alavi and D. E. Leidner. Review: Knowledge management and knowledge management systems: Conceptual foundations and research issues. MIS Quarterly, 25 (1):107-136, 2001.
-
(2001)
MIS Quarterly
, vol.25
, Issue.1
, pp. 107-136
-
-
Alavi, M.1
Leidner, D.E.2
-
3
-
-
12344308304
-
Basic concepts and taxonomy of dependable and secure computing
-
January-March
-
A. Avizienis, J.-C. Laprie, B. Randell, and C. Landwehr. Basic concepts and taxonomy of dependable and secure computing. IEEE Transactions on Dependable and Secure Computing, 1 (1):11-33, January-March 2004.
-
(2004)
IEEE Transactions on Dependable and Secure Computing
, vol.1
, Issue.1
, pp. 11-33
-
-
Avizienis, A.1
Laprie, J.-C.2
Randell, B.3
Landwehr, C.4
-
4
-
-
0003727420
-
-
Cambridge University Press, January
-
F. Baader, D. Calvanese, D. McGuinness, D. Nardi, and P. Patel-Schneider. The Description Logic Handbook: Theory, Implementation and Applications. Cambridge University Press, January 2003.
-
(2003)
The Description Logic Handbook: Theory, Implementation and Applications
-
-
Baader, F.1
Calvanese, D.2
McGuinness, D.3
Nardi, D.4
Patel-Schneider, P.5
-
5
-
-
36849090566
-
-
chapter Description Logics as Ontology Languages for the Semantic Web, Springer Berlin/Heidelberg
-
F. Baader, I. Horrocks, and U. Sattler. Mechanizing Mathematical Reasoning, volume 2605/2005 of Lecture Notes in Computer Science, chapter Description Logics as Ontology Languages for the Semantic Web, pages 228-248. Springer Berlin/Heidelberg, 2005.
-
(2005)
Mechanizing Mathematical Reasoning, Volume 2605/2005 of Lecture Notes in Computer Science
, pp. 228-248
-
-
Baader, F.1
Horrocks, I.2
Sattler, U.3
-
6
-
-
0027804413
-
Information systems security design methods: Implications for information systems development
-
December
-
R. Baskerville. Information systems security design methods: Implications for information systems development. ACM Computing Surveys, 25 (4):375-414, December 1993.
-
(1993)
ACM Computing Surveys
, vol.25
, Issue.4
, pp. 375-414
-
-
Baskerville, R.1
-
8
-
-
3042782049
-
What is computer security?
-
M. Bishop. What is computer security? IEEE Security and Privacy, 1 (1):67-69, 2003.
-
(2003)
IEEE Security and Privacy
, vol.1
, Issue.1
, pp. 67-69
-
-
Bishop, M.1
-
12
-
-
42149157224
-
Enabling experts to build knowledge bases from science textbooks
-
New York, NY, USA, ACM
-
V. K. Chaudhri, B. E. John, S. Mishra, J. Pacheco, B. Porter, and A. Spaulding. Enabling experts to build knowledge bases from science textbooks. In K-CAP '07: Proceedings of the 4th international conference on Knowledge capture, pages 159-166, New York, NY, USA, 2007. ACM.
-
(2007)
K-CAP '07: Proceedings of the 4th International Conference on Knowledge Capture
, pp. 159-166
-
-
Chaudhri, V.K.1
John, B.E.2
Mishra, S.3
Pacheco, J.4
Porter, B.5
Spaulding, A.6
-
13
-
-
77952350223
-
-
DCSSI. EBIOS - Section 2 - Approach. February
-
DCSSI. EBIOS - Section 2 - Approach. February 2004.
-
(2004)
-
-
-
14
-
-
0242371001
-
Security for DAML web services: Annotation and matchmaking
-
G. Denker, L. Kagal, T. W. Finin, M. Paolucci, and K. P. Sycara. Security for DAML web services: Annotation and matchmaking. In International Semantic Web Conference, pages 335-350, 2003.
-
(2003)
International Semantic Web Conference
, pp. 335-350
-
-
Denker, G.1
Kagal, L.2
Finin, T.W.3
Paolucci, M.4
Sycara, K.P.5
-
15
-
-
51449103458
-
Risk management: Implementation principles and inventories for risk management/risk assessment methods and tools
-
ENISA, European Network and Information Security Agency, June
-
ENISA. Risk management: implementation principles and inventories for risk management/risk assessment methods and tools. Technical report, European Network and Information Security Agency, June 2006.
-
(2006)
Technical Report
-
-
-
16
-
-
58149365542
-
Toward principles for the design of ontologies used for knowledge sharing
-
T. Gruber. Toward principles for the design of ontologies used for knowledge sharing. International Journal of Humam-Computer Studies, 43 (5-6):907-928, 1995.
-
(1995)
International Journal of Humam-Computer Studies
, vol.43
, Issue.5-6
, pp. 907-928
-
-
Gruber, T.1
-
17
-
-
85001799494
-
An ontology of information security
-
October-December
-
A. Herzog, N. Shahmehri, and C. Duma. An ontology of information security. International Journal of Information Security and Privacy, 1 (4):1-23, October-December 2007.
-
(2007)
International Journal of Information Security and Privacy
, vol.1
, Issue.4
, pp. 1-23
-
-
Herzog, A.1
Shahmehri, N.2
Duma, C.3
-
18
-
-
4344615591
-
From SHIQ and RDF to OWL: The making of a web ontology language
-
I. Horrocks, P. Patel-Schneider, and F. van Harmelen. From SHIQ and RDF to OWL: The making of a web ontology language. Journal of Web Semantics, 1 (1):7-26, 2003.
-
(2003)
Journal of Web Semantics
, vol.1
, Issue.1
, pp. 7-26
-
-
Horrocks, I.1
Patel-Schneider, P.2
Van Harmelen, F.3
-
19
-
-
77952368501
-
-
ISO/IEC. ISO/IEC 27001:2005, Information technology - Security techniques - Information security management systems - Requirements
-
ISO/IEC. ISO/IEC 27001:2005, Information technology - Security techniques - Information security management systems - Requirements, 2005.
-
(2005)
-
-
-
20
-
-
24644436684
-
Research questions guiding selection of an appropriate research method
-
Vienna, Austria, July 3-5, 2000
-
P. Jrvinen. Research questions guiding selection of an appropriate research method. In Proceedings of the 8th European Conference on Information Systems, Trends in Information and Communication Systems for the 21st Century, ECIS 2000, Vienna, Austria, July 3-5, 2000, 2000.
-
(2000)
Proceedings of the 8th European Conference on Information Systems, Trends in Information and Communication Systems for the 21st Century, ECIS 2000
-
-
Jrvinen, P.1
-
21
-
-
0141952238
-
Risk analysis for electronic commerce using case-based reasoning
-
C. Jung, I. Han, and B. Suh. Risk analysis for electronic commerce using case-based reasoning. International Journal of Intelligent Systems in Accounting, Finance & Management, 8:61-73, 1999.
-
(1999)
International Journal of Intelligent Systems in Accounting, Finance & Management
, vol.8
, pp. 61-73
-
-
Jung, C.1
Han, I.2
Suh, B.3
-
22
-
-
33750962363
-
An ontology for secure e-government applications
-
Washington, DC, USA, IEEE Computer Society
-
M. Karyda, T. Balopoulos, L. Gymnopoulos, S. Kokolakis, C. Lambrinoudakis, S. Gritzalis, and S. Dritsas. An ontology for secure e-government applications. In ARES '06: Proceedings of the First International Conference on Availability, Reliability and Security (ARES'06), pages 1033-1037, Washington, DC, USA, 2006. IEEE Computer Society.
-
(2006)
ARES '06: Proceedings of the First International Conference on Availability, Reliability and Security (ARES'06)
, pp. 1033-1037
-
-
Karyda, M.1
Balopoulos, T.2
Gymnopoulos, L.3
Kokolakis, S.4
Lambrinoudakis, C.5
Gritzalis, S.6
Dritsas, S.7
-
23
-
-
34547320186
-
A knowledge architecture for it security
-
S. Kesh and P. Ratnasingam. A knowledge architecture for it security. Communications of the ACM, 50 (7):103-108, 2007.
-
(2007)
Communications of the ACM
, vol.50
, Issue.7
, pp. 103-108
-
-
Kesh, S.1
Ratnasingam, P.2
-
24
-
-
33646699357
-
Security ontology for annotating resources
-
A. Kim, J. Luo, and M. Kang. Security ontology for annotating resources. In OTM Conferences (2), pages 1483-1499, 2005.
-
(2005)
OTM Conferences (2)
, pp. 1483-1499
-
-
Kim, A.1
Luo, J.2
Kang, M.3
-
25
-
-
0001859044
-
A technique for the measurement of attitudes
-
R. Likert. A technique for the measurement of attitudes. Archives of Psychology, 140:1-55, 1932.
-
(1932)
Archives of Psychology
, vol.140
, pp. 1-55
-
-
Likert, R.1
-
28
-
-
0038562418
-
An introduction to computer security - The nist handbook
-
NIST, NIST National Institute of Standards and Technology, October, Special Publication
-
NIST. An Introduction to Computer Security - The NIST Handbook. Technical report, NIST (National Institute of Standards and Technology), October 1995. Special Publication 800-12.
-
(1995)
Technical Report
, pp. 800-812
-
-
-
29
-
-
18744409356
-
Ontokhoj: A semantic web portal for ontology searching, ranking and classification
-
New York, NY, USA, ACM Press
-
C. Patel, K. Supekar, Y. Lee, and E. Park. Ontokhoj: a semantic web portal for ontology searching, ranking and classification. In WIDM '03: Proceedings of the 5th ACM international workshop on Web information and data management, pages 58-61, New York, NY, USA, 2003. ACM Press.
-
(2003)
WIDM '03: Proceedings of the 5th ACM International Workshop on Web Information and Data Management
, pp. 58-61
-
-
Patel, C.1
Supekar, K.2
Lee, Y.3
Park, E.4
-
30
-
-
67249108223
-
-
Auerbach Publications, Boca Raton, Florida, ISBN: 0-8493-0880-1
-
T. Peltier. Information Security Risk Analysis. Auerbach Publications, Boca Raton, Florida, 2001. ISBN: 0-8493-0880-1.
-
(2001)
Information Security Risk Analysis
-
-
Peltier, T.1
-
31
-
-
33645766952
-
Cyber security: A crisis of prioritization - Report to the president
-
PITAC, President's Information Technology Advisory Committee, February
-
PITAC. Cyber security: A crisis of prioritization - report to the president. Technical report, President's Information Technology Advisory Committee, February 2005.
-
(2005)
Technical Report
-
-
-
32
-
-
0242456149
-
Ontology in information security: A useful theoretical foundation and methodological tool
-
New York, NY, USA, ACM Press
-
V. Raskin, C. F. Hempelmann, K. E. Triezenberg, and S. Nirenburg. Ontology in information security: a useful theoretical foundation and methodological tool. In NSPW '01: Proceedings of the 2001 workshop on New security paradigms, pages 53-59, New York, NY, USA, 2001. ACM Press.
-
(2001)
NSPW '01: Proceedings of the 2001 Workshop on New Security Paradigms
, pp. 53-59
-
-
Raskin, V.1
Hempelmann, C.F.2
Triezenberg, K.E.3
Nirenburg, S.4
-
35
-
-
2342563770
-
Grand challenges in information security: Process and output
-
S. Smith and E. Spafford. Grand challenges in information security: Process and output. IEEE Security & Privacy, 2 (1):69-71, 2004.
-
(2004)
IEEE Security & Privacy
, vol.2
, Issue.1
, pp. 69-71
-
-
Smith, S.1
Spafford, E.2
-
36
-
-
77952392811
-
-
Risk management guide for information technology systems. NIST Special Publication 800-30, National Institute of Standards and Technology NIST, Gaithersburg, MD 20899-8930, July
-
G. Stoneburner, A. Goguen, and A. Feringa. Risk management guide for information technology systems. NIST Special Publication 800-30, National Institute of Standards and Technology (NIST), Gaithersburg, MD 20899-8930, July 2002.
-
(2002)
-
-
Stoneburner, G.1
Goguen, A.2
Feringa, A.3
-
37
-
-
0001133137
-
Coping with systems risk: Security planning models for management decision making
-
December
-
D. Straub and R. Welke. Coping with systems risk: Security planning models for management decision making. MIS Quarterly, 22 (4):441-469, December 1998.
-
(1998)
MIS Quarterly
, vol.22
, Issue.4
, pp. 441-469
-
-
Straub, D.1
Welke, R.2
-
38
-
-
77952324468
-
-
United Nations. United Nations Standard Products and Services Code
-
United Nations. United Nations Standard Products and Services Code, 2006.
-
(2006)
-
-
-
39
-
-
0030166318
-
Ontologies: Principles, methods and applications
-
M. Uschold and M. Grninger. Ontologies: Principles, methods and applications. Knowledge Engineering Review, 11 (2):93-155, 1996.
-
(1996)
Knowledge Engineering Review
, vol.11
, Issue.2
, pp. 93-155
-
-
Uschold, M.1
Grninger, M.2
-
40
-
-
77952324971
-
-
W3C. OWL - web ontology language, February
-
W3C. OWL - web ontology language, February 2004.
-
(2004)
-
-
-
41
-
-
77952344218
-
-
W3C. SPARQL - query language for RDF
-
W3C. SPARQL - query language for RDF, 2007.
-
(2007)
-
-
-
42
-
-
4243198165
-
Enemy at the gate: Threats to information security
-
M. Whitman. Enemy at the gate: threats to information security. Communications of the ACM, 46 (8):91-95, 2003.
-
(2003)
Communications of the ACM
, vol.46
, Issue.8
, pp. 91-95
-
-
Whitman, M.1
|