References

  1. Sean Bechhofer (2009): OWL: Web ontology language. In: Encyclopedia of Database Systems. Springer, pp. 2008–2009, doi:10.1007/978-0-387-39940-9_1073.
  2. Seyit Ahmet Camtepe & Bülent Yener (2007): Modeling and detection of complex attacks. In: Third International Conference on Security and Privacy in Communications Networks and the Workshops (SecureComm 2007). IEEE, pp. 234–243, doi:10.1109/SECCOM.2007.4550338.
  3. A. Ekelhart, S. Fenz, M. Klemen & E. Weippl (2007): Security Ontologies: Improving Quantitative Risk Analysis. In: 40th Annual Hawaii International Conference on System Sciences, 40th Annual Hawaii International Conference on System Sciences (HICSS'07), pp. 156a, doi:10.1109/HICSS.2007.478.
  4. R. Fikes, P. Hayes & I. Horrocks (2004): OWL-QL – A language for deductive query answering on the Semantic Web. Journal Web Semantics: Science, Services and Agents on the World Wide Web, pp. 19–29, doi:10.1016/j.websem.2004.07.002.
  5. V. Haarslev & R. Moller (2003): RACER: An OWL Reasoning Agent for the Semantic Web. In: 1st International Workkshop on Applications, Products and Services of Web-based Support Systems (WCC'03), pp. 91–95.
  6. J. Holt & S. Perry (2007): SysML for System Engineering (Professional Applications of Computing) 7. IET.
  7. I. Horrocks, P. F. Patel-Schneider, H. Boley, S. Tabet, B. Grosof & M. Dean (2004): SWRL: A Semantic Web Rule Language Combining OWL and RuleML. Available at http://www.w3.org/Submission/2004/SUBM-SWRL-20040521/.
  8. M. Sabir Idrees, Y. Roudier, L. Apvrille & G. Pedroza (2011): Test Results. Technical Report D4.4.2. EVITA Project.
  9. M. Jackson (2001): Problem Frames: Analyzing and Structuring Software Development Problems. Addison-Wesley Professional.
  10. J. Jüerjens (2003): Secure Systems Development with UML. Springer, doi:10.1007/b137706.
  11. A. Kim, J. Luo & M. Kang (2005): Security Ontology for Annotating Resources. In: Proceedings of the 2005 OTM Confederated international conference on the Move to Meaningful Internet Systems (OTM'05), pp. 1483–1499, doi:10.1007/11575801_34.
  12. TELECOM ParisTech LabSoc: The TURTLE Toolkit - TTool. Available at http://labsoc.comelec.enst.fr/turtle/ttool.html.
  13. A. van Lamsweerde & E. Letier (2004): From Object Orientation to Goal Orientation: A Paradigm Shift for Requirements Engineering. In: 9th International Workshop on Radical Innovations of Software and System Engineering (RISSEF 2002), pp. 325–340, doi:10.1007/978-3-540-24626-8_23.
  14. L. Lin, B. Nuseibeh, D. Ince, M. Jackson & J. Moffett (2003): Introducing Abuse Frames for Analysing Security Requirements. In: Proceedings of the 11th IEEE International Conference on Requirements Engineering (RE'03), pp. 371–372, doi:10.1109/icre.2003.1232791.
  15. H. Mouratidis, P. Giorgini, G. Manson & I. Philp (2002): A Natural Extension of Tropos Methodology for Modelling Security. In: Proceedings of the Agent Oriented Methodologies Workshop (OOPSLA'02).
  16. M. J. O'Connor & A. K. Das (2009): SQWRL: A Query Language for OWL. In: Proceedings of the 5th International Workshop on OWL: Experiences and Directions, OWLED'09.
  17. E. Prud'hommeaux & A. Seaborne (2008): SPARQL Query Language for RDF. Available at http://www.w3.org/TR/2008/REC-rdf-sparql-query-20080115/.
  18. Yves Roudier, Muhammad Sabir Idrees & Ludovic Apvrille (2013): Towards the model-driven engineering of security requirements for embedded systems. In: International Workshop on Model-Driven Requirements Engineering (MODRE 2013), doi:10.1109/MoDRE.2013.6597264.
  19. A. Ruddle, D. Ward, B. Weyl, S. Idrees, Y. Roudier, M. Friedewald, T. Leimbach, A. Fuchs, S. Gürgens, O. Henniger, R. Rieke, M. Ritscher, H. Broberg, L. Apvrille, R. Pacalet & G. Pedroza (2009): Security requirements for automotive on-board networks based on dark-side scenarios. Technical Report Deliverable D2.3. EVITA Project.
  20. B. Schneier (1999): Attack trees. Dr. Dobb's journal 24(12), pp. 21–29.
  21. G. Sindre & A. L. Opdahl (2000): Eliciting Security Requirements by Misuse Cases. In: Proceedings of the 37th International Conference on Technology of Object-Oriented Languages and Systems, TOOLS-Pacific'00, pp. 120–131, doi:10.1109/TOOLS.2000.891363.
  22. J. Stefan & M. Schumacher (2002): Collaborative Attack Modeling. In: Proceedings of the 2002 ACM Symposium on Applied Computing, SAC'02, pp. 253–259, doi:10.1145/508832.508843.
  23. Stanford University: Protégé Ontology Editor and Knowledge-base Framework. Available at http://protege.stanford.edu/.
  24. A. van Lamsweerde (2007): Engineering Requirements for System Reliability and Security. In: Software System Reliability and Security, NATO Security through Science Series - Information and Communicarion Security, pp. 196–238.
  25. G. Vigna, S. Eckmann & R. Kemmerer (2000): Attack Languages. In: Proceedings of the IEEE Information Survivability Workshop, ISW'00, pp. 163–166.
  26. J. Whittle, D. Wijesekera & M. Hartong (2008): Executable misuse cases for modeling security concerns. In: Proceedings of the 30th international conference on Software engineering, ICSE'08, pp. 121–130, doi:10.1145/1368088.1368106.

Comments and questions to: eptcs@eptcs.org
For website issues: webmaster@eptcs.org