Dealing with the formal analysis of Information Security policies through ontologies: a case study
暂无分享,去创建一个
Alexandre Rademaker | D. R. Vasconcelos | Edward Hermann Haeusler | Fernando Náufel do Amaral | Vítor Costa | G. M. H. da Silva | F. N. Amaral | C. Bazílio | Alexandre Rademaker | E. Haeusler | Vaston Gonçalves da Costa | D. Vasconcelos | G. M. H. D. Silva | C. Bazílio
[1] Thomas R. Gruber,et al. Toward principles for the design of ontologies used for knowledge sharing? , 1995, Int. J. Hum. Comput. Stud..
[2] R GruberThomas. Toward principles for the design of ontologies used for knowledge sharing , 1995 .
[3] Alberto Martelli,et al. Rule-based Policy Specification : State of the Art and Future Work , 2004 .
[4] Dragan Gasevic,et al. Vocabularies, ontologies and rules for the enterprise , 2009, 2009 13th Enterprise Distributed Object Computing Conference Workshops.
[5] Diego Calvanese,et al. The Description Logic Handbook , 2007 .
[6] Nicola Guarino,et al. Formal ontology, conceptual analysis and knowledge representation , 1995, Int. J. Hum. Comput. Stud..
[7] Anna Maria Di Sciullo,et al. Natural Language Understanding , 2009, SoMeT.
[8] Julia H. Allen,et al. Managing for Enterprise Security , 2004 .
[9] Carlos Bazílio,et al. An Ontology-based Approach to the Formalization of Information Security Policies , 2006, 2006 10th IEEE International Enterprise Distributed Object Computing Conference Workshops (EDOCW'06).
[10] James F. Allen. Natural language understanding (2nd ed.) , 1995 .
[11] L. Stein,et al. OWL Web Ontology Language - Reference , 2004 .
[12] Emily Gallup Fayen,et al. Guidelines for the construction, format, and management of monolingual controlled vocabularies : A revision of ANSI/NISO Z39.19 for the 21st century , 2007 .