共 29 条
- [1] Abou Assali A., 2008, ICTTA 2008 DAM SYR A
- [2] [Anonymous], 2004, 1 EUR SEM WEB S HER
- [3] Avizienis A., 2004, IEEE T DEPENDABLE SE
- [4] Barnes S.J., 2005, COMMUNICATIONS ACM
- [5] A systematic review and comparison of security ontologies [J]. ARES 2008: PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON AVAILABILITY, SECURITY AND RELIABILITY, 2008, : 813 - +
- [6] Denker G., 2005, Information Security Technical Report, V10, P51, DOI 10.1016/j.istr.2004.11.002
- [7] Denker G, 2003, LECT NOTES COMPUT SC, V2870, P335
- [8] Dobson G., 2006, REQUIREMENTS ENG
- [9] Donner M., 2003, IEEE SECURITY PRIVAC
- [10] Ekelhart A., 2007, HICSS 2007