Enterprise Distributed Object Computing Conference
Workshops (EDOCW'06). doi:
10.1109/edocw.2006.21
Evesti, A., Savola, R., Ovaska, E. and Kuusijärvi, J., 2011.
The design instantiation and usage of information
security measuring ontology. In: MOPAS 2011 The
Second International Conference on Models and
Ontology-based Design of Protocols Architectures and
Services. pp.1-9.
Fenz, S., & Ekelhart, A. (2009). Formalizing Information
Security Knowledge. In Proceedings of the 4th
International Symposium on Information, Computer,
and Communications Security (pp. 183-194).
Girardi, R. (2010). Guiding Ontology Learning and
Population by Knowledge System Goals.
In Proceedings of the International Conference on
Knowledge Engineering and Ontology
Development (pp. 480-484). KEOD.
Gruber, T., 1993. A translation approach to portable
ontology specifications. Knowledge Acquisition, 5(2),
pp.199-220.
Gruber, T. (1995). Toward principles for the design of
ontologies used for knowledge sharing?. International
Journal Of Human-Computer Studies, 43(5-6), 907-
928. doi: 10.1006/ijhc.1995.1081
Guarino, N. (1998). Formal Ontology and Information
Systems. In 1st International Conference on Formal
Ontology in Information Systems (pp. 3-15).
Amsterdam: IOS Press.
Hayes, P. (1996). A Catalog of Temporal Theories.
University of Illinois at Urbana-Champaign.
Herzog, A., Shahmehri, N., & Duma, C. (2007). An
Ontology of Information Security. International Journal
Of Information Security And Privacy, 1(4), 1-23. doi:
10.4018/jisp.2007100101
Jain, V., & Singh, M. (2013). Ontology Development and
Query Retrieval using Protégé Tool. International
Journal Of Intelligent Systems And Applications, 5(9),
67-75. doi: 10.5815/ijisa.2013.09.08
LeClair, A., Khedri, R. and Marinache, A., 2019. Toward
Measuring Knowledge Loss due to Ontology
Modularization. In: Proceedings of the 11th
International Joint Conference on Knowledge
Discovery, Knowledge Engineering and Knowledge
Management (IC3K 2019). SCITEPRESS – Science
and Technology Publications, Lda., pp.174-184.doi:
10.5220/0008169301740184
Maedche, A., & Staab, S. (2001). Ontology learning for the
Semantic Web. IEEE Intelligent Systems, 16(2), 72-79.
doi: 10.1109/5254.920602
Mandal, D., & Mazumdar, C. (2018). Automating
Information Security Policy Compliance
Checking. 2018 Fifth International Conference On
Emerging Applications Of Information Technology
(EAIT). doi: 10.1109/eait.2018.8470420
Mishra, S., Malik, S., Jain, N., & Jain, S. (2015). A Realist
Framework for Ontologies and the Semantic
Web. Procedia Computer Science, 70, 483-490. doi:
10.1016/j.procs.2015.10.087
Musen, M., 1992. Dimensions of knowledge sharing and
reuse. Computers and Biomedical Research, 25(5),
pp.435-467.
Noy, N. and McGuinness, D., 2001. “Ontology
Development 101: A Guide To Creating Your First
Ontology. Stanford University, Stanford, CA, Tech.
Rep.
Obrst, L., Chase, P., & Markeloff, R. (2012). Developing
an Ontology of the Cyber Security Domain. Da Costa,
P.C.G. And Laskey, K.B. (Eds.) STIDS., 49–56.
Oltramari, A., Cranor, L., Walls, R., & McDaniel, P.
(2014). Building an Ontology of Cyber Security. CEUR
Workshop Proceedings, 1304(1613-0073), 54-61.
Peltier, T. (2004). Information security policies and
procedures. Boca Raton, FL: Auerbach Publications.
Peltier, T. Information security policies, procedures, and
standards (p. 21).
Policy Analysis. (2020). Retrieved 5 October 2020, from
https://www.cdc.gov/policy/polaris/policyprocess/poli
cy_analysis.html
Ressler, J., Dean, M., & Kolas, D. (2010). Geospatial
Ontology Trade Study. In T. Janssen & W. Leo
Obrst, Ontologies and Semantic Technologies for
Intelligence (pp. 179-212). Amsterdam, Berlin, Tokyo,
Washington D.C.: IOOS Press.
Souag, A., Salinesi, C., Mazo, R. and Comyn-Wattiau, I.,
2015. A Security Ontology for Security Requirements
Elicitation. Lecture Notes in Computer Science,
pp.157-177.
Von Wright, G. (1951). Deontic Logic. Mind, 60(237), 1-
15. Retrieved from
http://www.jstor.org/stable/2251395
Tsoumas, B. and Gritzalis, D., 2006. Towards an ontology-
based security management. In: 20th International
Conference on Advanced Information Networking and
Applications. pp.985-992.
Uszok, A., Bradshaw, J., Johnson, M., Jeffers, R., Tate, A.,
Dalton, J. and Aitken, S., 2004. KAoS policy
management for semantic Web services. IEEE
Intelligent Systems, 19(4), pp.32-41.
Wache, H., Vögele, T., Visser, U., Stuckenschmidt, H.,
Schuster, G., Neumann, H. and Hübner, S., 2001.
Ontology-based Integration of Information - A Survey
of Existing Approaches. In: Proceedings of IJCAI-01
Workshop: Ontologies and Information Sharing.
pp.108 - 117.