C. Blanco, J. Lasheras, R. Valencia-garcia, E. Fernandez-medina, A. Toval et al., A Systematic Review and Comparison of Security Ontologies, 2008 Third International Conference on Availability, Reliability and Security, 2008.
DOI : 10.1109/ARES.2008.33

B. Patrick, Management de la sécurité des SI, 2007.

H. Mouratidis, . Giorgini, and G. Manson, Towards the development of secure information systems: Security Reference Diagram and Security Attack Scenarios, Proceedings of the FORUM at International Conference on Advanced Information Systems, 2004.

:. Elahi, Security Requirements Engineering: State of the Art and Practice and Challenges, 2009.

A. Ekelhart, S. Fenz, M. Klemen, and E. Weippl, Security Ontologies: Improving Quantitative Risk Analysis, 2007 40th Annual Hawaii International Conference on System Sciences (HICSS'07), p.156, 2007.
DOI : 10.1109/HICSS.2007.478

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

T. R. Gruber, Toward principles for the design of ontologies used for knowledge sharing?, International Journal of Human-Computer Studies, vol.43, issue.5-6, pp.5-6, 1995.
DOI : 10.1006/ijhc.1995.1081

G. Dobson and S. Pete, Revisiting Ontology-Based Requirements Engineering in the age of the Semantic Web, Requirements Engineering, 2006.

M. Donner, Toward a Security Ontology, IEEE Security and Privacy, 2003.

G. Denker and D. Daml-+oil, Access Control and Data Integrity for, 2002.

S. Fenz and A. Ekelhart, Formalizing information security knowledge, Proceedings of the 4th International Symposium on Information, Computer, and Communications Security, ASIACCS '09, pp.183-194, 2009.
DOI : 10.1145/1533057.1533084

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

Y. Levy, E. , and T. J. , A Systems Approach to Conduct an Effective Literature Review in Support of Information Systems Research, Informing Science Journal, issue.9, pp.181-211, 2006.

S. J. Barnes, Assessing the value of IS journals, Communications of the ACM, vol.48, issue.1, pp.110-112, 2005.
DOI : 10.1145/1039539.1039573

R. K. Rainer and M. D. Miller, Examining differences across journal rankings, Communications of the ACM, vol.48, issue.2, pp.91-94, 2005.
DOI : 10.1145/1042091.1042096

M. Metcalfe, Metaphors for literature reviews (responses summary for ISWorld listserv email request), 2002.

L. Liu, E. Yu, and M. J. , Security and privacy requirements analysis within a social setting, Journal of Lightwave Technology, p.151, 2003.
DOI : 10.1109/ICRE.2003.1232746

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

G. Donald and . Firesmith, A Taxonomy of Safety-Related Requirements, RE'2004 Requirements for High Assurance Systems (RHAS)Workshop, 2003.

A. Kim, J. Luo, and M. Kang, Security Ontology for Annotating Resources, 4th International Conference on Ontologies, Databases, and Applications of Semantics (ODBASE'05, 2005.
DOI : 10.1007/11575801_34

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

J. Mylopoulos, M. Jarke, and M. Koubarakis, Telos ? a language for representing knowledge about information systems, ACM Trans. Information Systems, vol.8, issue.4, pp.327-362, 1990.

A. Avizienis, J. Laprie, B. Randell, and C. E. Landwehr, Basic concepts and taxonomy of dependable and secure computing, IEEE Transactions on Dependable and Secure Computing, vol.1, issue.1, pp.11-33, 2004.
DOI : 10.1109/TDSC.2004.2

:. C. 23, A. Bull, R. Mcdermott, J. P. , and C. W. , A taxonomy of computer program security flaws, ACM Comput. Surv, vol.26, issue.3, pp.211-254, 1994.

A. Herzog, N. Shahmehri, and C. Duma, An Ontology of Information Security, International Journal of Information Security, vol.14, pp.1-23, 2007.

M. Bishop, Computer security ? art and science, 2003.

J. Undercoffer, A. Joshi, and A. Pinkston, Modeling Computer Attacks: An Ontology for Intrusion Detection, Lecture Notes in Computer Science, pp.113-135, 2003.
DOI : 10.1007/978-3-540-45248-5_7

L. Viljanen, Towards an Ontology of Trust, Proceedings of the 2nd International Conference on Trust, Privacy and Security in Digital Business (TrustBus'05, 2005.
DOI : 10.1007/11537878_18

D. Geneiatakis and C. Lambrinoudakis, An ontology description for SIP security flaws, Computer Communications, vol.30, issue.6, 2006.
DOI : 10.1016/j.comcom.2006.12.023

A. Assali, A. Lenne, D. Debray, and B. , Ontology Development for Industrial Risk Analysis, 2008 3rd International Conference on Information and Communication Technologies: From Theory to Applications, 2008.
DOI : 10.1109/ICTTA.2008.4530312

G. Denker, L. Kagal, T. Finin, M. Paolucci, and K. Sycara, Security for DAML Web Services: Annotation and Matchmaking, Proc. of the 2nd International Semantic Web Conference (ISWC2003): Sanibel Island, 2003.
DOI : 10.1007/978-3-540-39718-2_22

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

G. Denker, S. Nguyen, and A. Ton, OWL-S Semantics of Security Web Services: a Case Study, 1st European Semantic Web Symposium, 2004.
DOI : 10.1007/978-3-540-25956-5_17

G. Denker, L. Kagal, and T. Finin, Security in the Semantic Web using OWL, Information Security Technical Report, vol.10, issue.1, pp.51-58, 2005.
DOI : 10.1016/j.istr.2004.11.002

A. Vorobiev and J. Han, Security Attack Ontology for Web Services, 2006 Semantics, Knowledge and Grid, Second International Conference on, p.42, 2006.
DOI : 10.1109/SKG.2006.85

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

B. Tsoumas and D. Gritzalis, Towards an Ontology-based Security Management, 20th International Conference on Advanced Information Networking and Applications, Volume 1 (AINA'06), pp.985-992, 2006.
DOI : 10.1109/AINA.2006.329

M. Karyda, An ontology for secure e-government applications, First International Conference on Availability, Reliability and Security (ARES'06), pp.1033-1037, 2006.
DOI : 10.1109/ARES.2006.28

H. Mouratidis, P. Giorgini, and G. Manson, An Ontology for Modeling Security: The Tropos Approach, in Knowledge-Based Intelligent Information and Engineering Systems, pp.1387-1394, 2003.

F. Massacci, J. Mylopoulos, F. Paci, . Tun, Y. Thein et al., An Extended Ontology for Security Requirements, In: International Workshop on Information Systems Security Engineering, vol.110, issue.2, pp.20-24, 2011.
DOI : 10.1007/978-3-540-45248-5_7

A. Herrmann, A. Morali, S. Etalle, and R. Wieringa, RiskREP: Risk-based Security Requirements Elicitation and Prioritization, BIR 2011, Associated Workshops and Doctorial Consortium, Latvia, pp.155-162, 2011.

N. Meyer, A. Rifaut, and E. Dubois, Towards a Risk-Based Security Requirements Engineering Frame-work, Proc. Of Internet. Workshop on Requirements Engineering for Software Quality, 2005.

V. Nguyen, Ontologies and Information Systems: A Literature Survey, 1947.