C. Blanco, J. Lasheras, R. Valencia-garcia, E. Fernandez-medina, A. Toval et al., A Systematic Review and Comparison of Security Ontologies, 2008 Third International Conference on Availability, Reliability and Security, pp.813-820, 2008.
DOI : 10.1109/ARES.2008.33

B. Patrick, Management de la sécurité des SI, 2007.

H. Mouratidis, . Giorgini, and G. Manson, Towards the development of secure information systems: Security Reference Diagram and Security Attack Scenarios, Proceedings of the FORUM at International Conference on Advanced Information Systems, 2004.

G. Elahi, Security Requirements Engineering: State of the Art and Practice and Challenges, 2009.

M. Kauppinen, S. Kujala, T. Aaltio, and L. Lehtola, Introducing requirements engineering: how to make a cultural change happen in practice, Proceedings IEEE Joint International Conference on Requirements Engineering, 2002.
DOI : 10.1109/ICRE.2002.1048504

. Lamsweerde, Engineering Requirements for System Reliability and Security, pp.196-238, 2007.

H. Mouratidis, Analysing Security Requirements of information systems using, Tropos', on Enterprise Information Systems, 2006.

L. Liu, E. Yu, and J. Mylopoulos, Security and privacy requirements analysis within a social setting, Journal of Lightwave Technology, 2003.
DOI : 10.1109/ICRE.2003.1232746

T. R. Gruber, Toward principles for the design of ontologies used for knowledge sharing?, International Journal of Human-Computer Studies, vol.43, issue.5-6, 1995.
DOI : 10.1006/ijhc.1995.1081

G. Dobson and P. Sawyer, Revisiting Ontology-Based Requirements Engineering in the age of the Semantic Web, ReqE, 2006.

S. Fenz and A. Ekelhart, Formalizing information security knowledge, Proceedings of the 4th International Symposium on Information, Computer, and Communications Security, ASIACCS '09, 2009.
DOI : 10.1145/1533057.1533084

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.205.9959

A. Herzog, N. Shahmehri, and C. Duma, An Ontology of Information Security, International Journal of Information Security, 2007.

J. Mcdermott and C. Fox, Using abuse case models for security requirements analysis, Proceedings 15th Annual Computer Security Applications Conference (ACSAC'99), pp.55-66, 1999.
DOI : 10.1109/CSAC.1999.816013

G. Sindre and A. L. Opdahl, Eliciting security requirements with misuse cases, 2004.
DOI : 10.1007/s00766-004-0194-4

J. Jan, UMLsec: Extending UML for Secure Systems Development, Proceedings of the 5th International Conference on The Unified Modeling Language, 2002.

T. Lodderstedt, D. Basin, and D. Jürgen, SecureUML: A UML-Based Modeling Language for Model-Driven Security, Proceedings of the 5th International Conference on The Unified Modeling Language, 2002.
DOI : 10.1007/3-540-45800-X_33

F. Donald, Security Use Cases, Journal of Object Technology, 2003.

A. Herrmann and A. Morali, RiskREP: Risk-Based Security Requirements Elicitation and Prioritization, 2010.

N. Mayer, A. Rifaut, and E. Dubois, Towards a Risk-Based Security Requirements Engineering Framework, 2005.

S. Motoshi and K. Haruhiko, Using Domain Ontology as Domain Knowledge for Requirements Elicitation, 2006.

L. Wei and ;. Jiang, Peng RongHeavyweight Semantic Inducement for Requirement Elicitation and analysis, Third International Conference on Semantics, Knowledge and Grid, 2007.

V. Castañeda1, L. Ballejos, L. Caliusco, and R. Galli, The Use of Ontologies in Requirements Engineering, Global Journal of Researches in Engineering, 2010.

D. Dzung and A. Ohnishi, Ontology-Based Reasoning in Requirements Elicitation, 2009 Seventh IEEE International Conference on Software Engineering and Formal Methods, 2009.
DOI : 10.1109/SEFM.2009.31

A. Souag, C. Salinesi, and I. Wattiau, Ontologies for Security Requirements: A Literature Survey and Classification, 2nd International Workshop on Information Systems Security Engineering WISSE'12, 2012.
DOI : 10.1007/978-3-642-31069-0_5

URL : https://hal.archives-ouvertes.fr/hal-00709229