A Systematic Review and Comparison of Security Ontologies, 2008 Third International Conference on Availability, Reliability and Security, pp.813-820, 2008. ,
DOI : 10.1109/ARES.2008.33
Management de la sécurité des SI, 2007. ,
Towards the development of secure information systems: Security Reference Diagram and Security Attack Scenarios, Proceedings of the FORUM at International Conference on Advanced Information Systems, 2004. ,
Security Requirements Engineering: State of the Art and Practice and Challenges, 2009. ,
Introducing requirements engineering: how to make a cultural change happen in practice, Proceedings IEEE Joint International Conference on Requirements Engineering, 2002. ,
DOI : 10.1109/ICRE.2002.1048504
Engineering Requirements for System Reliability and Security, pp.196-238, 2007. ,
Analysing Security Requirements of information systems using, Tropos', on Enterprise Information Systems, 2006. ,
Security and privacy requirements analysis within a social setting, Journal of Lightwave Technology, 2003. ,
DOI : 10.1109/ICRE.2003.1232746
Toward principles for the design of ontologies used for knowledge sharing?, International Journal of Human-Computer Studies, vol.43, issue.5-6, 1995. ,
DOI : 10.1006/ijhc.1995.1081
Revisiting Ontology-Based Requirements Engineering in the age of the Semantic Web, ReqE, 2006. ,
Formalizing information security knowledge, Proceedings of the 4th International Symposium on Information, Computer, and Communications Security, ASIACCS '09, 2009. ,
DOI : 10.1145/1533057.1533084
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.205.9959
An Ontology of Information Security, International Journal of Information Security, 2007. ,
Using abuse case models for security requirements analysis, Proceedings 15th Annual Computer Security Applications Conference (ACSAC'99), pp.55-66, 1999. ,
DOI : 10.1109/CSAC.1999.816013
Eliciting security requirements with misuse cases, 2004. ,
DOI : 10.1007/s00766-004-0194-4
UMLsec: Extending UML for Secure Systems Development, Proceedings of the 5th International Conference on The Unified Modeling Language, 2002. ,
SecureUML: A UML-Based Modeling Language for Model-Driven Security, Proceedings of the 5th International Conference on The Unified Modeling Language, 2002. ,
DOI : 10.1007/3-540-45800-X_33
Security Use Cases, Journal of Object Technology, 2003. ,
RiskREP: Risk-Based Security Requirements Elicitation and Prioritization, 2010. ,
Towards a Risk-Based Security Requirements Engineering Framework, 2005. ,
Using Domain Ontology as Domain Knowledge for Requirements Elicitation, 2006. ,
Peng RongHeavyweight Semantic Inducement for Requirement Elicitation and analysis, Third International Conference on Semantics, Knowledge and Grid, 2007. ,
The Use of Ontologies in Requirements Engineering, Global Journal of Researches in Engineering, 2010. ,
Ontology-Based Reasoning in Requirements Elicitation, 2009 Seventh IEEE International Conference on Software Engineering and Formal Methods, 2009. ,
DOI : 10.1109/SEFM.2009.31
Ontologies for Security Requirements: A Literature Survey and Classification, 2nd International Workshop on Information Systems Security Engineering WISSE'12, 2012. ,
DOI : 10.1007/978-3-642-31069-0_5
URL : https://hal.archives-ouvertes.fr/hal-00709229