-
2
-
-
78649523714
-
-
CC IS, Accessed 3- Feb-2008
-
CC IS (2006): Common criteria international standard. http://www.niap-ccevs.org/cc-scheme. Accessed 3- Feb-2008.
-
(2006)
Common Criteria International Standard
-
-
-
3
-
-
78649494225
-
-
CORE IMPACT, Accessed 15-Sept-2008
-
CORE IMPACT (2008): CORE IMPACT website. http://www.coresecurity.com. Accessed 15-Sept-2008.
-
(2008)
CORE IMPACT Website
-
-
-
4
-
-
33947679958
-
-
CCS, Washington, USA
-
DAMIANI, E., De CAPITANI Di VIMERCATI, S., PARABOSCHI, S., SAMARATI, P. and VIOLANTE, F. (2002): A reputation-based approach for choosing reliable resources in peer-to-peer networks. CCS, Washington, USA.
-
(2002)
A Reputation-Based Approach for Choosing Reliable Resources in Peer-To-Peer Networks
-
-
Damiani, E.1
De Capitani Di Vimercati, S.2
Paraboschi, S.3
Samarati, P.4
Violante, F.5
-
5
-
-
44949259605
-
OWL-S semantics of security web services: A case study
-
Menlo Park, California, USA
-
DENKER, G., NGUYEN, S. and TON, A. (2004): OWL-S semantics of security web services: A case study. SRI International, Menlo Park, California, USA.
-
(2004)
SRI International
-
-
Denker, G.1
Nguyen, S.2
Ton, A.3
-
8
-
-
0344235406
-
A security characterisation framework for trustworthy component based software systems
-
KHAN, K. and HAN, J. (2003): A security characterisation framework for trustworthy component based software systems. COMPSAC2003, 164-169.
-
(2003)
COMPSAC2003
, pp. 164-169
-
-
Khan, K.1
Han, J.2
-
10
-
-
62749155242
-
Security ontology for annotating resources
-
KIM, A., LUO, J. and KANG, M. (2005): Security ontology for annotating resources. The 4th International Conference on Ontologies, Databases, and Applications of Semantics (ODBASE 2005).
-
(2005)
The 4th International Conference on Ontologies, Databases, and Applications of Semantics (ODBASE 2005)
-
-
Kim, A.1
Luo, J.2
Kang, M.3
-
14
-
-
78649511670
-
-
Nmap SCANNER, Accessed 10-Sept-2008
-
Nmap SCANNER (2007): Nmap scanner website. http://www.insecure.org/nmap. Accessed 10-Sept-2008.
-
(2007)
Nmap Scanner Website
-
-
-
16
-
-
50249085624
-
Online gaming growing fast in China
-
NYSTEDT, D. (2005): Online gaming growing fast in China. IDG News Service.
-
(2005)
IDG News Service
-
-
Nystedt, D.1
-
17
-
-
38749085178
-
-
OWL, Accessed 17-May-2007
-
OWL (2007): Web ontology language. http:w3.org/TR/owl-features. Accessed 17-May-2007.
-
(2007)
Web Ontology Language
-
-
-
18
-
-
77953358041
-
-
OWL-S, Accessed 17-May-2007
-
OWL-S (2007): Semantic markup for web services. http://www.daml.org/ services. Accessed 17-May-2007.
-
(2007)
Semantic Markup for Web Services
-
-
-
19
-
-
35048841335
-
OntoGenie: Extracting ontology instances from WWW
-
Sanibel Island, Florida
-
PATEL, C., SUPERKAR, K. and LEE, Y. (2003): OntoGenie: Extracting ontology instances from WWW, Proc. of Workshop on Human Language Technology for the Semantic Web and Web Services 2003, Sanibel Island, Florida, 123-126.
-
(2003)
Proc. of Workshop on Human Language Technology for the Semantic Web and Web Services
, vol.2003
, pp. 123-126
-
-
Patel, C.1
Superkar, K.2
Lee, Y.3
-
21
-
-
78649519207
-
-
SAINT, Accessed 20-Sept-2008
-
SAINT (2008): SAINT website. http://www.saintcorporation.com. Accessed 20-Sept-2008.
-
(2008)
SAINT Website
-
-
-
23
-
-
37149052021
-
-
SWSL, Accessed 17-May-2007
-
SWSL (2007): Semantic web services language. http://www.daml.org/ services/swsl. Accessed 17-May- 2007.
-
(2007)
Semantic Web Services Language
-
-
-
25
-
-
33751088049
-
Towards an ontology-based security management
-
Austria
-
TSOUMAS, B. and GRITZALIS, D. (2006): Towards an ontology-based security management, Proc. of AINA06, Austria.
-
(2006)
Proc. of AINA06
-
-
Tsoumas, B.1
Gritzalis, D.2
-
26
-
-
33746416682
-
A target-centric ontology for intrusion detection
-
Mexico
-
UNDERCOFFER, J., JOSHI, A., FININ, T. and PINKSTON, J. (2004): A target-centric ontology for intrusion detection. International Joint Conference on Artificial Intelligence, Mexico.
-
(2004)
International Joint Conference on Artificial Intelligence
-
-
Undercoffer, J.1
Joshi, A.2
Finin, T.3
Pinkston, J.4
-
27
-
-
0032028766
-
The enterprise ontology
-
USCHOLD, M., KING, M., MORALEE, S. and ZORGIOS, Y. (1998): The enterprise ontology. The Knowledge Engineering Review 13(1): 31-89.
-
(1998)
The Knowledge Engineering Review
, vol.13
, Issue.1
, pp. 31-89
-
-
Uschold, M.1
King, M.2
Moralee, S.3
Zorgios, Y.4
-
28
-
-
44949110433
-
Specifying dynamic security properties of web service based systems
-
China
-
VOROBIEV, A. and HAN, J. (2006a): Specifying dynamic security properties of web service based systems. Proc. of SKG06, China.
-
(2006)
Proc. of SKG06
-
-
Vorobiev, A.1
Han, J.2
-
29
-
-
44949240818
-
Security attack ontology for web services
-
China
-
VOROBIEV, A., HAN, J. (2006b): Security attack ontology for web services. Proc. of SKG06, China.
-
(2006)
Proc. of SKG06
-
-
Vorobiev, A.1
Han, J.2
-
30
-
-
50249091529
-
An ontology framework for managing security attacks and defences in component based software systems
-
Perth, Australia
-
VOROBIEV, A., HAN, J. and BEKMAMEDOVA, N. (2008): An ontology framework for managing security attacks and defences in component based software systems. Proc. of the Australian Software Engineering Conference (ASWEC'08), Perth, Australia.
-
(2008)
Proc. of the Australian Software Engineering Conference (ASWEC'08)
-
-
Vorobiev, A.1
Han, J.2
Bekmamedova, N.3
|