6. Baader, F., Calvanese, D., McGuinness, D., Nardi, D., Patel-Schneider, P.: The Description
Logic Handbook: Theory, Implementation and Applications. Cambridge University Press
(2003)
7. Haarslev, V., Mller, R.: Description Logic Systems with Concrete Domains: Applications
for the Semantic Web. In: Proceedings of the International Workshop on Knowledge Repre-
sentation meets Databases, (KRDB), Hamburg, Germany. (2003)
8. Taniar, D., Rahayu, J.W.: Web Semantics Ontology. Idea Publishing (2006)
9. O’Connor, M.J., Knublauch, H., Tu, S.W., Grossof, B., Dean, M., Grosso, W.E., Musen.,
M.A.: Supporting Rule System Interoperability on the Semantic Web with SWRL. (Fourth
International Semantic Web Conference (ISWC2005)
10. Standford: Protege IDE. (http://protege.stanford.edu/)
11. Foley, S.N., Fitzgerald, W.M.: Semantic Web and Firewall Alignment. First International
Workshop on Secure Semantic Web (SSW’08), Cancun, Mexico (2008)
12. Anya Kim, J.L., Kang, M.: Security Ontology for Annotating Resources. 4th Interna-
tional Conference on Ontologies, Databases, and Applications of Semantics, (ODBASE),
Agia Napa, Cyprus. (2005)
13. Herzog, A., Shahmehri, N., Duma, C.: An Ontology of Information Security. International
Journal of Information Security and Privacy (2007)
14. Uszok, A., Bradshaw, J., Jeffers, R., Johnson, M., Tate, A., Dalton, J., Aitken, S.: KAoS
Policy Management for Semantic Web Services. In IEEE Intelligent Systems, Vol. 19, No.
4, (2004)
15. Prez, G.M., Clemente, F.J.G., Blaya, J.A.B., Skarmeta, A.F.G.: Representing Security Poli-
cies in Web Information Systems. Policy Management for the Web (PM4W) Workshop in
the 14th International World Wide Web (WWW) Conference (2005)
16. Guttman, J.D.: Filtering Postures: Local Enforcement for Global Security Policies. IEEE
Symposium on Security and Privacy, Oakland (1997)
17. Mayer, A., Wool, A., Zishind, E.: Fang: A Firewall Analysis Engine. 2000 IEEE Symposium
on Security and Privacy, p. 0177 (2000)
18. Eronen, P., Zitting, J.: An Expert System for Analyzing Firewall Rules. (In: In Proceedings
of the 6th Nordic Workshop on Secure IT Systems (NordSec 2001), pages 100-107)
19. Hazelhurst, S.: A Proposal for Dynamic Access Lists for TCP/IP Packet Filtering. South
African Computer Journal, Vol. 33 (2004)
20. Marmorstein, R., Kearns, P.: A Tool for Automated iptables Firewall Analysis. (USENIX
Annual Technical Conference, FREENIX Track)
21. Golnabi, K., Min, R., Khan, L., Al-Shaer, E.: Analysis of Firewall Policy Rule Using Data
Mining Techniques. In the 10th IEEE/IFIP Network Operations and Management Sympo-
sium, (NOMS) (2006)
37