Information Technology Reference
In-Depth Information
security controls database. Other issues include storage and retrieval issues of security
requirements, as well as development of a query-based system.
References
[1] Karygiannis Τ., Owens L., Wireless Network Security: 802.11, Bluetooth and Handheld
Devices, NIST Special Publication no. 800-48, US Dept. of Commerce, USA 2002.
[2] PAMPAS (“Pioneering Advanced Mobile Privacy and Security”) Project, EU-IST-2001-
37763, Final Roadmap, Deliverable D4, www.pampas.eu.org/, May 2003.
[3] DMTF CIM Policy Model v. 2.81, available at
http://www.dmtf.org/standards/published_documents.php (Feb. 2005).
[4] Clemente F., Perez G., Blaya J., Skarmeta A., Representing Security Policies in Web In-
formation Systems, Policy Management for the Web - WWW2005 Workshop, 14th In-
ternational World Wide Web Conference, May 2005, Chiba, Japan.
[5] Gruber T., “Toward principles for the design of ontologies used for knowledge sharing”.
In Formal Ontology in Conceptual Analysis and Knowledge Representation , Kluwer A-
cademic Publishers, 1993.
[6] Decker S., et al., “Ontobroker: Ontology based access to distributed and semi-structured
information”. In R. Meersman et al. (Eds.), DS-8: Semantic Issues in Multimedia Sys-
tems . Kluwer Academic Publishers, 1999.
[7] Damianou N. et al., “The Ponder Policy Specification Language”. In Workshop on Poli-
cies for Distributed Systems and Networks, Springer-Verlag LNCS 1995, 2001, pp. 18-39.
[8] ISO/IEC 17799 (2000-12-01), Information technology - Code of practice for information
security management, ISO.
[9] COBIT 3rd Edition Control Objectives, IT Governance Institute, 2000.
[10] BSI, IT Baseline Protection Manual, Germany available at
http://www.bsi.bund.de/english/index.htm (Mar. 2005).
[11] Cisco Security Advisories, http://www.cisco.com/go/psirt/ (Mar. 2005).
[12] SecurityFocus security portal, (http://www.securityfocus.com (Mar. 2005).
[13] Seclists. Org Security Mailing List Archive (http://seclists.org (Mar. 2005).
[14] Common Vulnerabilities and Exposures (http://www.cve.mitre.org/ (Mar. 2005).
[15] OVAL--Open Vulnerability Assessment Language (http://oval.mitre.org/) (Mar. 2005)
[16] Cunningham H., et al., “GATE: A Framework and Graphical Development Environment
for Robust NLP Tools and Applications”. Proc. of the 40th meeting of the Association for
Computational Linguistics (ACL'02). USA, July 2002.
[17] Bontcheva K., et al., Evolving GATE to Meet New Challenges in Language Engineering.
Natural Language Engineering (to appear).
[18] Dean M., et al., OWL Web Ontology Language Reference W3C Recommendation,
http://www.w3.org/TR/owl-ref/ (Mar. 2005)
[19] Noy N., McGuiness D., “Ontology Development 101: A Guide to Creating Your First
Ontology”, Stanford Knowledge Systems Laboratory Technical Report KSL-01-05 and
Stanford Medical Informatics Technical Report SMI-2001-0880, March 2001.
[20] Holsapple C., Joshi K., “A collaborative approach to ontology design”, Com. of the
ACM, 45(2):42-47, 2002.
[21] British Standard 7799, Part 2 (1999), Information Technology - Specification for Infor-
mation Security Management System, BSI.
[22] Standards Australia and Standards New Zealand, Australian/New Zealand Standard for
Risk Management 4360 (1999).
Search WWH ::




Custom Search