{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T16:02:38Z","timestamp":1725465758862},"publisher-location":"Boston","reference-count":27,"publisher":"Kluwer Academic Publishers","isbn-type":[{"type":"print","value":"0387287531"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/0-387-29773-1_13","type":"book-chapter","created":{"date-parts":[[2006,6,7]],"date-time":"2006-06-07T07:00:15Z","timestamp":1149663615000},"page":"187-201","source":"Crossref","is-referenced-by-count":2,"title":["Employing Ontologies for the Development of Security Critical Applications"],"prefix":"10.1007","author":[{"given":"S.","family":"Dritsas","sequence":"first","affiliation":[]},{"given":"L.","family":"Gymnopoulos","sequence":"additional","affiliation":[]},{"given":"M.","family":"Karyda","sequence":"additional","affiliation":[]},{"given":"T.","family":"Balopoulos","sequence":"additional","affiliation":[]},{"given":"S.","family":"Kokolakis","sequence":"additional","affiliation":[]},{"given":"C.","family":"Lambrinoudakis","sequence":"additional","affiliation":[]},{"given":"S.","family":"Gritzalis","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"13_CR1","unstructured":"Noy, N.F. and Mc Guinness, D.L. \u201cOntology Development 101: A Guide to Creating Your First Ontology\u201d, Stanford Knowledge Systems Laboratory Technical Report KSL-01-05. (2001)"},{"key":"13_CR2","unstructured":"CCTA, CRAMM User Manuals, ver. 5.0, United Kingdom, (2002)"},{"key":"13_CR3","unstructured":"IETF and W3C XML Signature Working Group. http:\/\/www.w3.org\/Signature\/"},{"key":"13_CR4","unstructured":"OASIS Security Service TC. Security Assertion Markup Language (SAML)"},{"key":"13_CR5","unstructured":"http:\/\/www.oasis-open.org\/committees\/security\/ (accessed September 2004)"},{"key":"13_CR6","doi-asserted-by":"crossref","unstructured":"Bozsak, E., Ehrig, M., Handschub, S., Hotho: KAON-Towards a Large Scale Semantic Web. In: Bauknecht, K.; Min Tjoa, A.; Quirch-ma-yr, G. (Eds.): Proc. of the 3rd International Conference on E-Commerce and Web Technologies, (2002), pp. 304\u2013313","DOI":"10.1007\/3-540-45705-4_32"},{"key":"13_CR7","unstructured":"Kagal, L., Finin, T., Joshi, A.: \u201cA policy language for a pervasive computing environment\u201d. In IEEE 4th International Workshop on Policies for Dis-tributed Systems and Networks, (2003)"},{"key":"13_CR8","volume-title":"Proceedings of the New Security Paradigms Workshop","author":"V. Raskin","year":"2001","unstructured":"Raskin, V., Hempelmann, C, Triezenberg, K., and Nirenburg, S.: Ontology in Information Security: A Useful Theoretical Foundation and Methodological Tool. In Viktor Raskin and Christian F. Hempelmann, editors, Proceedings of the New Security Paradigms Workshop, New York. ACM, (2001)"},{"key":"13_CR9","doi-asserted-by":"crossref","unstructured":"Chung, L.: Dealing with Security Requirements during the development of Information Systems. CaiSE\u2019 93. The 5th Int. Conf of Advanced Info. Systems Engineering. Paris, France, (1993)","DOI":"10.1007\/3-540-56777-1_13"},{"key":"13_CR10","doi-asserted-by":"publisher","first-page":"483","DOI":"10.1109\/32.142871","volume":"18","author":"J. Mylopoulos","year":"1992","unstructured":"Mylopoulos, J., Chung L., Nixon, B.: Representing and Using Non-Functional Requirements A Process Oriented Approach. IEEE Trans. Soft Eng., vol. 18. pp. 483\u2013497 (1992)","journal-title":"IEEE Trans. Soft Eng."},{"key":"13_CR11","volume-title":"Proceedings of the KES 2003 Invited Session Ontology and Multi-Agent Systems Design (OMASD\u201903)","author":"H. Mouratidis","year":"2003","unstructured":"Mouratidis, H., Giorgini, P., Manson, G.: An Ontology for Modelling Security: The Tropos Project. Proceedings of the KES 2003 Invited Session Ontology and Multi-Agent Systems Design (OMASD\u201903), United Kingdom, University of Oxford, (2003)"},{"key":"13_CR12","unstructured":"Liu, L., Yu, E., Mylopoulos, J.: Analyzing Security Requirements as Relationships among Strategic Actors. (SREIS\u201902), Raleigh, North Carolina, (2002)"},{"key":"13_CR13","unstructured":"He, Q., Ant\u00f3n, I., A.: A Framework for modeling Privacy Requirements in Role Engineering. Int\u2019l Workshop on Requirements Engineering for Software Quality (REFSQ) Austria Klagenfurt \/ Velden (2003)"},{"key":"13_CR14","unstructured":"Moffett, D., J., Nuseibeh, A., B.: A Framework for Security Requirements Engineering. Report YCS 368, Department of Computer Science, University of York, (2003)"},{"key":"13_CR15","unstructured":"Ant\u00f3n, I., A.: Goal-Based Requirements Analysis. ICRE\u2019 96 IEEE Colorado Springs Colorado USA pp. 136\u2013144, (1996)"},{"key":"13_CR16","doi-asserted-by":"crossref","unstructured":"Ant\u00f3n, I., A., Earp, B., J.: Strategies for Developing Policies and Requirements for Secure Electronic Commerce Systems. 1st ACM Workshop on Security and Privacy in E-Commerce (2000)","DOI":"10.1007\/978-1-4615-1467-1_5"},{"key":"13_CR17","doi-asserted-by":"crossref","unstructured":"Uszok, A., Bradshaw, J., Jeffers, R., Suri, N., Hayes, P., Breedy, M., Bunch, L., Johnson, M., Kulkarni, S. and Lott, J. KAoS Policy and Domain Services: Toward a Description-Logic Approach to Policy Representation, Deconfliction and Enforcement. In Proceedings of the IEEE Workshop on Policy (2003)","DOI":"10.1109\/POLICY.2003.1206963"},{"key":"13_CR18","doi-asserted-by":"crossref","unstructured":"Uszok, A., Bradshaw, J., Jeffers, R. (2004). KAoS: A Policy and Domain Services Framework for Grid Computing and Semantic Web Services. In Proceedings of the Second International Conference on Trust Management (iTrust 2004), Springer-Verlag","DOI":"10.1007\/978-3-540-24747-0_2"},{"key":"13_CR19","unstructured":"http:\/\/ontology.ihmc.us\/ontology.html"},{"key":"13_CR20","unstructured":"Smith, W.: Cryptography Meets Voting, http:\/\/www.math.temple.edu\/~wds\/homepage\/cryptovot.pdf"},{"key":"13_CR21","unstructured":"Prot\u00e9g\u00e9, http:\/\/protege.stanford.edu\/"},{"key":"13_CR22","unstructured":"Racer Inference Engine, http:\/\/www.sts.tu-harburg.de\/~r.fmoeller\/racer\/"},{"key":"13_CR23","unstructured":"The New Racer Query Language, http:\/\/www.cs.concordia.ca\/~haarslev\/racer\/racer-queries.pdf"},{"key":"13_CR24","volume-title":"Access Control and Data Integrity for DAML+OIL and DAML-S","author":"G. Denker","year":"2002","unstructured":"Denker, G., Access Control and Data Integrity for DAML+OIL and DAML-S, SRI International, USA, (2002)"},{"key":"13_CR25","unstructured":"Gruber T. Toward principles for the design of ontologies used for knowledge sharing, in Formal Ontology in Conceptual Analysis and Knowledge Representation, Kluwer (1993)."},{"key":"13_CR26","unstructured":"Web Ontology Language (OWL), http:\/\/www.w3.org\/2001\/sw\/WebOnt\/"},{"key":"13_CR27","unstructured":"O. Lassila, Ralph Swick (eds).: Resource Description Framework (RDF) Model and Syntax Specification, W3C Recommendation 22 February 1999, http:\/\/www.w3.org\/TR\/REC-rdf-syntax\/"}],"container-title":["IFIP International Federation for Information Processing","Challenges of Expanding Internet: E-Commerce, E-Business, and E-Government"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/0-387-29773-1_13.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T00:59:12Z","timestamp":1619485152000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/0-387-29773-1_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["0387287531"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/0-387-29773-1_13","relation":{},"subject":[]}}