ACKNOWLEDGEMENTS
This work was financed by National Science Center.
REFERENCES
Anderson, R. (2005). In˙zynieria zabezpiecze´n.
Avizienis, A., Laprie, J., Randell, B., and Landwehr, C.
(2004). Basic concepts and taxonomy of dependable
and secure computing. Dependable and Secure Com-
puting, IEEE Transactions on, 1(1):11–33.
Boi´nski, T., Budnik, Ł., Jakowski, A., Mrozi´nski, J., and
Mazurkiewicz, K. (2009). OCS – Domain Oriented
Ontology Creation System. In SMI’09, 4th Interna-
tional Conference ’Congress of Young IT Scientists’.
HARD Olsztyn.
Boi´nski, T., Jaworska, A., Kleczkowski, R., Kunowski, P.,
and Szama´nski, J. (2010a). Zespołowa budowa on-
tologii z wykorzystaniem systemu OCS oraz edytora
Prot´eg´e. Zeszyty Naukowe Wydziału ETI Politechniki
Gda´nskiej, 19:101–105.
Boi´nski, T., Orłowski, P., Szpryngier, P., and Krawczyk, H.
(2010b). Influence and selection of basic concepts on
ontology design. In KEOD2010, pages 364–369.
Borgosz-Koczwara, M. and Herlender, K. (2008). Bez-
piecze´nstwo energetyczne a rozw´oj odnawialnych
´zr´odeł energii. Energetyka, pages 194–197.
De Nicola, A., Missikoff, M., and Navigli, R. (2009). A
software engineering approach to ontology building.
Information Systems, 34(2):258–275.
Donner, M. (2003). Toward a security ontology. IEEE Se-
curity and Privacy, pages 6–7.
Dubisz, S. (2008). Uniwersalny słownik je¸zyka polskiego.
Wydawnictwo Naukowe PWN.
ENISA (2006). Risk management: implementation princi-
ples and inventories for risk management/risk assess-
ment methods and tools. Technical report.
Enisa (2010). Enisa: a European Union
Agency - Glossary of Risk Management.
http://www.enisa.europa.eu/act/rm/cr/risk-
management-inventory/glossary.
Firesmith, D. (2005a). A Taxonomy of safety-related re-
quirements. In International Workshop on High As-
surance Systems (RHAS’05).
Firesmith, D. (2005b). A taxonomy of security-related re-
quirements. In International Workshop on High As-
surance Systems (RHAS’05). Citeseer.
Gennari, J. H., Musen, M. A., Fergerson, R. W., Grosso,
W. E., Crubzy, M., Eriksson, H., Noy, N. F., and Tu,
S. W. (2002). The evolution of Protege: An environ-
ment for knowledge-based systems development. Stan-
ford Medical Institute, Stanford.
Gruber, T. et al. (1993). A translation approach to
portable ontology specifications. Knowledge acqui-
sition, 5:199–199.
Herzog, A., Shahmehri, N., and Duma, C. (2009). An on-
tology of information security. International Journal
of Information Security.
Horridge, M. and Bechhofer, S. (2009). The OWL API:
a Java API for working with OWL 2 ontologies.
In Proc. of the 5th Int. Workshop on OWL: Experi-
ences and Directions (OWLED 2009), CEUR Work-
shop Proceedings, pages 23–24.
Jian, N., Hu, W., Cheng, G., and Qu, Y. (2005). Falcon-
AO: Aligning ontologies with Falcon. In Integrating
Ontologies Workshop Proceedings. Citeseer.
Kim, A., Luo, J., and Kang, M. (2005). Security ontology
for annotating resources. On the Move to Meaningful
Internet Systems 2005: CoopIS, DOA, and ODBASE,
pages 1483–1499.
Kissel, R. (2006). Glossary of key information security
terms. Glossary, National Institute of Standards and
Technology, US Department of Commerce.
Knublauch, H., Fergerson, R., Noy, N., and Musen, M.
(2004). The Prot´eg´e OWL plugin: An open develop-
ment environment for semantic web applications. The
Semantic Web–ISWC 2004, pages 229–243.
Krawczyk, H. (2007). Ontology engineering and its appli-
cations. Department of Computer System Architec-
ture, ETI Faculty, Gda´nsk University of Technology.
Nowakowski, Z. and Szafran, H. (2009). Bezpiecze´nstwo
w XXI wieku : strategie bezpiecze´nstwa narodowego
Polski i wybranych pa´nstw. Wydawnictwo Politech-
niki Rzeszowskiej.
Noy, N., McGuinness, D., et al. (2001). Ontology develop-
ment 101: A guide to creating your first ontology.
Noy, N. F., Fergerson, R. W., and Musen, M. A. (2000). The
knowledge model of Protege-2000: Combining inter-
operability and flexibility. In Lecture Notes in Com-
puter Science. Springer-Verlag.
ODP Portal (2011). Ontology Design Patterns.
http://ontologydesignpatterns.org/wiki/Main Page.
Schober, D., Kusnierczyk, W., Lewis, S., Lomax, J., et al.
(2007). Towards naming conventions for use in con-
trolled vocabulary and ontology engineering. Pro-
ceedings of BioOntologies SIG, ISMB07, pages 29–
32.
Sommerville, I. (2006). Software Engineering. 8th. Harlow,
UK: Addison-Wesley.
Su´arez-Figueroa, M. et al. (2009a). D5. 4.2: Revision
and extension of the neon methodology for build-
ing contextualized ontology networks. NeOn project.
http://www. neon-project. org.
Su´arez-Figueroa, M., G´omez-P´erez, A., and Villaz´on-
Terrazas, B. (2009b). How to write and use the On-
tology Requirements Specification Document. On the
Move to Meaningful Internet Systems: OTM 2009,
pages 966–982.
Sure, Y., Staab, S., and Studer, R. (2009). Handbook on
Ontologies. Springer.
Tartir, S. (2009). Ontology-driven Question Answering and
Ontology Quality Evaluation. PhD thesis, University
of Georgia.
˙
Zukrowska, K. and Gra¸cik, M. (2006). Bezpiecze´nstwo
mie¸dzynarodowe: teoria i praktyka. Szkoła Gł´owna
Handlowa w Warszawie.
KEOD 2011 - International Conference on Knowledge Engineering and Ontology Development
374