G. Denker, L. Kagal, and T. Finin, Security in the Semantic Web using OWL, Information Security Technical Report, vol.10, issue.1, pp.51-58, 2005.
DOI : 10.1016/j.istr.2004.11.002

M. Kauppinen, S. Kujala, T. Aaltio, and L. Lehtola, Introducing requirements engineering: how to make a cultural change happen in practice, Proceedings IEEE Joint International Conference on Requirements Engineering, pp.43-51, 2002.
DOI : 10.1109/ICRE.2002.1048504

G. Elahi, E. Yu, T. Li, and L. Liu, Security Requirements Engineering in the Wild: A Survey of Common Practices, 2011 IEEE 35th Annual Computer Software and Applications Conference, pp.314-319, 2011.
DOI : 10.1109/COMPSAC.2011.48

M. Donner, Toward a Security Ontology, IEEE Security and Privacy, vol.1, issue.3, pp.6-7, 2003.

A. Souag, Towards a new generation of security requirements definition methodology using ontologies, Proceedings of 24th International Conference on Advanced Information Systems Engineering, pp.1-8, 2012.
URL : https://hal.archives-ouvertes.fr/hal-00710425

A. Souag, C. Salinesi, and I. Comyn-wattiau, Ontologies for Security Requirements: A Literature Survey and Classification, CAiSE Workshops 2012. LNBIP, pp.61-69, 2012.
DOI : 10.1007/978-3-642-31069-0_5

URL : https://hal.archives-ouvertes.fr/hal-00709229

C. Blanco, J. Lasheras, R. Valencia-garcia, E. Fernandez-medina, A. Toval et al., A Systematic Review and Comparison of Security Ontologies, 2008 Third International Conference on Availability, Reliability and Security, pp.813-820, 2008.
DOI : 10.1109/ARES.2008.33

A. Souag, C. Salinesi, I. Wattiau, and H. Mouratidis, Using Security and Domain Ontologies for Security Requirements Analysis, IEEE 37th Annual Computer Software and Applications Conference Workshops (COMPSACW), pp.101-107, 2013.
URL : https://hal.archives-ouvertes.fr/hal-00864300

C. Salinesi, E. Ivankina, and W. Angole, Using the RITA Threats Ontology to Guide Requirements Elicitation: an Empirical Experiment in the Banking Sector, 2008 First International Workshop on Managing Requirements Knowledge, pp.11-15, 2008.
DOI : 10.1109/MARK.2008.11

O. Daramola, G. Sindre, and T. Moser, Ontology-Based Support for Security Requirements Specification Process, OTM- WS 2012, pp.194-206, 2012.
DOI : 10.1007/978-3-642-33618-8_28

J. L. Velasco, R. Valencia-garcia, J. T. Fernandez-breis, and T. , Modelling Reusable Security Requirements Based on an Ontology Framework, Journal of Research and Practice in Information Technology, vol.41, issue.2, p.119, 2009.

P. Salini and S. Kanmani, A Knowledge-oriented Approach to Security Requirements for an E-Voting System, International Journal of Computer Applications, vol.49, issue.11, pp.21-25, 2012.
DOI : 10.5120/7671-0953

S. Dritsas, L. Gymnopoulos, M. Karyda, T. Balopoulos, S. Kokolakis et al., A knowledge-based approach to security requirements for e-health applications, Electronic Journal for E-Commerce Tools and Applications, 2006.

F. Massacci, J. Mylopoulos, and N. Zannone, An ontology for secure socio-technical systems. Handbook of Ontologies for Business Interactions, IDEA Group, 2007.

C. Blanco, J. Lasheras, E. Fernández-medina, R. Valencia-garcía, and T. , Basis for an integrated security ontology according to a systematic review of existing proposals, Computer Standards & Interfaces, vol.33, issue.4, pp.372-388, 2011.
DOI : 10.1016/j.csi.2010.12.002

J. Undercoffer, A. Joshi, and J. Pinkston, Modeling Computer Attacks: An Ontology for Intrusion Detection, The 6th International Symposium on Recent Advances in Intrusion Detection, pp.113-135, 2003.
DOI : 10.1007/978-3-540-45248-5_7

D. Geneiatakis and C. Lambrinoudakis, An ontology description for SIP security flaws, Computer Communications, vol.30, issue.6, pp.1367-1374, 2007.
DOI : 10.1016/j.comcom.2006.12.023

G. Denker, L. Kagal, T. W. Finin, M. Paolucci, and K. Sycara, Security for DAML Web Services: Annotation and Matchmaking, ISWC 2003, pp.335-350, 2003.
DOI : 10.1007/978-3-540-39718-2_22

G. Denker, S. Nguyen, and A. Ton, OWL-S Semantics of Security Web Services: a Case Study, ESWS 2004, pp.240-253, 2004.
DOI : 10.1007/978-3-540-25956-5_17

M. Karyda, T. Balopoulos, S. Dritsas, L. Gymnopoulos, S. Kokolakis et al., An ontology for secure e-government applications, First International Conference on Availability, Reliability and Security (ARES'06), p.5, 2006.
DOI : 10.1109/ARES.2006.28

B. Tsoumas and D. Gritzalis, Towards an Ontology-based Security Management, 20th International Conference on Advanced Information Networking and Applications, Volume 1 (AINA'06), pp.985-992, 2006.
DOI : 10.1109/AINA.2006.329

A. Herzog, N. Shahmehri, and C. Duma, An Ontology of Information Security, International Journal of Information Security and Privacy, vol.1, issue.4, pp.1-23, 2007.
DOI : 10.4018/jisp.2007100101

S. Fenz and A. Ekelhart, Formalizing information security knowledge, Proceedings of the 4th International Symposium on Information, Computer, and Communications Security, ASIACCS '09, pp.183-194, 2009.
DOI : 10.1145/1533057.1533084

M. Fernández-lópez, A. Gómez-pérez, and N. Juristo, METHONTOLOGY: From Ontological Art Towards Ontological Engineering, Proceedings of the Ontological Engineering AAAI-97 Spring Symposium Series, 1997.

D. Jones, T. Bench-capon, and P. Visser, Methodologies For Ontology Development, Proceedings IT&KNOWS Conference of the 15th IFIP World Computer Congress, pp.62-75, 1998.

N. Mayer, Model-based Management of Information System Security Risk, Presses universitaires de Namur, 2012.
URL : https://hal.archives-ouvertes.fr/tel-00402996

V. Vogel, Information Security Guide, https://wiki.internet2

S. Staab and A. Maedche, Axioms are Objects, too ? Ontology Engineering beyond the Modeling of Concepts and Relations, Workshop on Applications of Ontologies and Problem-Solving Methods, 2000.

R. Lekhchine, Construction d'une ontologie pour le domaine de la sécurité: application aux agents mobiles, 2009.

Y. Sure, J. Angele, and S. Staab, OntoEdit: Guiding Ontology Development by Methodology and Inferencing, ODBASE 2002, pp.1205-2011, 2002.
DOI : 10.1007/3-540-36124-3_76

A. Farquhar, R. Fikes, and J. Rice, The Ontolingua Server: a tool for collaborative ontology construction, International Journal of Human-Computer Studies, vol.46, issue.6, pp.707-727, 1997.
DOI : 10.1006/ijhc.1996.0121

M. Horridge, H. Knublauch, A. Rector, R. Stevens, and C. Wroe, A Practical Guide To Building OWL Ontologies Using The Protégé-OWL Plugin and CO-ODE Tools Edition 1.0, 2004.

O. Connor, M. J. Das, and A. K. , SQWRL: A Query Language for OWL, In: OWLED, vol.529, 2009.

M. Uschold, M. Gruninger, M. Uschold, and M. Gruninger, Ontologies: principles, methods and applications, The Knowledge Engineering Review, vol.11, issue.02, pp.93-136, 1996.
DOI : 10.1017/S0269888900007797

B. A. Kitchenham, S. L. Pfleeger, L. M. Pickard, P. W. Jones, D. C. Hoaglin et al., Preliminary guidelines for empirical research in software engineering, IEEE Transactions on Software Engineering, vol.28, issue.8, pp.721-734, 2002.
DOI : 10.1109/TSE.2002.1027796

H. Mouratidis and P. Giorgini, SECURE TROPOS: A SECURITY-ORIENTED EXTENSION OF THE TROPOS METHODOLOGY, International Journal of Software Engineering and Knowledge Engineering, vol.17, issue.02, pp.285-309, 2007.
DOI : 10.1142/S0218194007003240

A. Kim, J. Luo, and M. Kang, Security Ontology for Annotating Resources, Research Lab, NRL Memorandum Report, p.51, 2005.
DOI : 10.1007/11575801_34

A. F. Martimiano and E. S. Moreira, An owl-based security incident ontology, Proceedings of the Eighth International Protege Conference, pp.43-44, 2005.

P. S. Lawrence, Experimental design and analysis in software engineering, Annals of Software Engineering, vol.1, issue.1, pp.219-253, 1995.

F. D. Davis, Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology, MIS Quarterly, vol.13, issue.3, pp.319-340, 1989.
DOI : 10.2307/249008