Security in the Semantic Web using OWL, Information Security Technical Report, vol.10, issue.1, pp.51-58, 2005. ,
DOI : 10.1016/j.istr.2004.11.002
Introducing requirements engineering: how to make a cultural change happen in practice, Proceedings IEEE Joint International Conference on Requirements Engineering, pp.43-51, 2002. ,
DOI : 10.1109/ICRE.2002.1048504
Security Requirements Engineering in the Wild: A Survey of Common Practices, 2011 IEEE 35th Annual Computer Software and Applications Conference, pp.314-319, 2011. ,
DOI : 10.1109/COMPSAC.2011.48
Toward a Security Ontology, IEEE Security and Privacy, vol.1, issue.3, pp.6-7, 2003. ,
Towards a new generation of security requirements definition methodology using ontologies, Proceedings of 24th International Conference on Advanced Information Systems Engineering, pp.1-8, 2012. ,
URL : https://hal.archives-ouvertes.fr/hal-00710425
Ontologies for Security Requirements: A Literature Survey and Classification, CAiSE Workshops 2012. LNBIP, pp.61-69, 2012. ,
DOI : 10.1007/978-3-642-31069-0_5
URL : https://hal.archives-ouvertes.fr/hal-00709229
A Systematic Review and Comparison of Security Ontologies, 2008 Third International Conference on Availability, Reliability and Security, pp.813-820, 2008. ,
DOI : 10.1109/ARES.2008.33
Using Security and Domain Ontologies for Security Requirements Analysis, IEEE 37th Annual Computer Software and Applications Conference Workshops (COMPSACW), pp.101-107, 2013. ,
URL : https://hal.archives-ouvertes.fr/hal-00864300
Using the RITA Threats Ontology to Guide Requirements Elicitation: an Empirical Experiment in the Banking Sector, 2008 First International Workshop on Managing Requirements Knowledge, pp.11-15, 2008. ,
DOI : 10.1109/MARK.2008.11
Ontology-Based Support for Security Requirements Specification Process, OTM- WS 2012, pp.194-206, 2012. ,
DOI : 10.1007/978-3-642-33618-8_28
Modelling Reusable Security Requirements Based on an Ontology Framework, Journal of Research and Practice in Information Technology, vol.41, issue.2, p.119, 2009. ,
A Knowledge-oriented Approach to Security Requirements for an E-Voting System, International Journal of Computer Applications, vol.49, issue.11, pp.21-25, 2012. ,
DOI : 10.5120/7671-0953
A knowledge-based approach to security requirements for e-health applications, Electronic Journal for E-Commerce Tools and Applications, 2006. ,
An ontology for secure socio-technical systems. Handbook of Ontologies for Business Interactions, IDEA Group, 2007. ,
Basis for an integrated security ontology according to a systematic review of existing proposals, Computer Standards & Interfaces, vol.33, issue.4, pp.372-388, 2011. ,
DOI : 10.1016/j.csi.2010.12.002
Modeling Computer Attacks: An Ontology for Intrusion Detection, The 6th International Symposium on Recent Advances in Intrusion Detection, pp.113-135, 2003. ,
DOI : 10.1007/978-3-540-45248-5_7
An ontology description for SIP security flaws, Computer Communications, vol.30, issue.6, pp.1367-1374, 2007. ,
DOI : 10.1016/j.comcom.2006.12.023
Security for DAML Web Services: Annotation and Matchmaking, ISWC 2003, pp.335-350, 2003. ,
DOI : 10.1007/978-3-540-39718-2_22
OWL-S Semantics of Security Web Services: a Case Study, ESWS 2004, pp.240-253, 2004. ,
DOI : 10.1007/978-3-540-25956-5_17
An ontology for secure e-government applications, First International Conference on Availability, Reliability and Security (ARES'06), p.5, 2006. ,
DOI : 10.1109/ARES.2006.28
Towards an Ontology-based Security Management, 20th International Conference on Advanced Information Networking and Applications, Volume 1 (AINA'06), pp.985-992, 2006. ,
DOI : 10.1109/AINA.2006.329
An Ontology of Information Security, International Journal of Information Security and Privacy, vol.1, issue.4, pp.1-23, 2007. ,
DOI : 10.4018/jisp.2007100101
Formalizing information security knowledge, Proceedings of the 4th International Symposium on Information, Computer, and Communications Security, ASIACCS '09, pp.183-194, 2009. ,
DOI : 10.1145/1533057.1533084
METHONTOLOGY: From Ontological Art Towards Ontological Engineering, Proceedings of the Ontological Engineering AAAI-97 Spring Symposium Series, 1997. ,
Methodologies For Ontology Development, Proceedings IT&KNOWS Conference of the 15th IFIP World Computer Congress, pp.62-75, 1998. ,
Model-based Management of Information System Security Risk, Presses universitaires de Namur, 2012. ,
URL : https://hal.archives-ouvertes.fr/tel-00402996
Information Security Guide, https://wiki.internet2 ,
Axioms are Objects, too ? Ontology Engineering beyond the Modeling of Concepts and Relations, Workshop on Applications of Ontologies and Problem-Solving Methods, 2000. ,
Construction d'une ontologie pour le domaine de la sécurité: application aux agents mobiles, 2009. ,
OntoEdit: Guiding Ontology Development by Methodology and Inferencing, ODBASE 2002, pp.1205-2011, 2002. ,
DOI : 10.1007/3-540-36124-3_76
The Ontolingua Server: a tool for collaborative ontology construction, International Journal of Human-Computer Studies, vol.46, issue.6, pp.707-727, 1997. ,
DOI : 10.1006/ijhc.1996.0121
A Practical Guide To Building OWL Ontologies Using The Protégé-OWL Plugin and CO-ODE Tools Edition 1.0, 2004. ,
SQWRL: A Query Language for OWL, In: OWLED, vol.529, 2009. ,
Ontologies: principles, methods and applications, The Knowledge Engineering Review, vol.11, issue.02, pp.93-136, 1996. ,
DOI : 10.1017/S0269888900007797
Preliminary guidelines for empirical research in software engineering, IEEE Transactions on Software Engineering, vol.28, issue.8, pp.721-734, 2002. ,
DOI : 10.1109/TSE.2002.1027796
SECURE TROPOS: A SECURITY-ORIENTED EXTENSION OF THE TROPOS METHODOLOGY, International Journal of Software Engineering and Knowledge Engineering, vol.17, issue.02, pp.285-309, 2007. ,
DOI : 10.1142/S0218194007003240
Security Ontology for Annotating Resources, Research Lab, NRL Memorandum Report, p.51, 2005. ,
DOI : 10.1007/11575801_34
An owl-based security incident ontology, Proceedings of the Eighth International Protege Conference, pp.43-44, 2005. ,
Experimental design and analysis in software engineering, Annals of Software Engineering, vol.1, issue.1, pp.219-253, 1995. ,
Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology, MIS Quarterly, vol.13, issue.3, pp.319-340, 1989. ,
DOI : 10.2307/249008