共 50 条
- [42] Ontology-based Information Content Security Analysis [J]. FIFTH INTERNATIONAL CONFERENCE ON FUZZY SYSTEMS AND KNOWLEDGE DISCOVERY, VOL 5, PROCEEDINGS, 2008, : 479 - +
- [43] How to build a foundational ontology the object-centered high-level reference ontology OCHRE [J]. KI 2003: ADVANCES IN ARTIFICIAL INTELLIGENCE, 2003, 2821 : 120 - 134
- [44] An ontology-based framework for modelling security requirements [J]. WOSIS 2008: SECURITY IN INFORMATION SYSTEMS, PROCEEDINGS, 2008, : 78 - 88
- [45] Ontology-based Negotiation of Security Requirements in Cloud [J]. 2012 FOURTH INTERNATIONAL CONFERENCE ON COMPUTATIONAL ASPECTS OF SOCIAL NETWORKS (CASON), 2012, : 192 - 197
- [46] aletheia. Unified Hermeneutic Ontology [J]. BAJO PALABRA-JOURNAL OF PHILOSOPHY, 2015, 2 (10) : 331 - 333
- [47] An Ontology Based Information Security Requirements Engineering Framework [J]. SECURE AND TRUST COMPUTING, DATA MANAGEMENT, AND APPLICATIONS, 2011, 186 : 139 - +
- [48] Modelling Reusable Security Requirements based on an Ontology Framework [J]. JOURNAL OF RESEARCH AND PRACTICE IN INFORMATION TECHNOLOGY, 2009, 41 (02): : 119 - 133
- [49] Towards an Ontology-based Content Security Scheme [J]. FIFTH INTERNATIONAL CONFERENCE ON FUZZY SYSTEMS AND KNOWLEDGE DISCOVERY, VOL 4, PROCEEDINGS, 2008, : 385 - 390
- [50] Toward a Unified Ontology of Cloud Computing [J]. GCE: 2008 GRID COMPUTING ENVIRONMENTS WORKSHOP, 2008, : 42 - +