{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T20:35:27Z","timestamp":1725482127916},"publisher-location":"Boston, MA","reference-count":13,"publisher":"Springer US","isbn-type":[{"type":"print","value":"9780387370194"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-0-387-37022-4_30","type":"book-chapter","created":{"date-parts":[[2007,4,3]],"date-time":"2007-04-03T02:27:51Z","timestamp":1175567271000},"page":"841-863","source":"Crossref","is-referenced-by-count":0,"title":["Development of an Ontology-Based Smart Card System Reference Architecture"],"prefix":"10.1007","author":[{"given":"Istv\u00e1n","family":"Mezg\u00e1r","sequence":"first","affiliation":[]},{"given":"Zolt\u00e1n","family":"Kincses","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"30_CR1","doi-asserted-by":"crossref","unstructured":"Bruce Schneier: Attack Trees \u2014 Modeling security threats. Dr. Dobb\u2019s Journal, December 1999. pp. 318\u2013333, (February 17, 2005); http:\/\/www.schneier.com\/paper-attacktrees-ddjft.html.","DOI":"10.1002\/9781119183631.ch21"},{"key":"30_CR2","unstructured":"Denny Michael, Ontology Building: A Survey of Editing Tools, (February 17, 2005); http:\/\/www.xml.com\/pub\/a\/2002\/11\/06\/ontologies.html."},{"issue":"2","key":"30_CR3","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1006\/knac.1993.1008","volume":"5","author":"T. R. Gruber","year":"1993","unstructured":"Gruber, T. R., A translation approach to portable ontologies. Knowledge Acquisition, 5(2):199\u2013220, 1993.","journal-title":"Knowledge Acquisition"},{"key":"30_CR4","unstructured":"Jones, D., Bench-Capon, T., and Visser, P. Methodologies for ontology development, XV. IFIP World Computer Congress, Vienna\/Austria and Budapest\/Hungary, 31 August \u2014 4 September, 1998, CD-ROM Edition."},{"key":"30_CR5","unstructured":"KBSI 1994, The IDEF5 Ontology Description Capture Method Overview, KBSI Report, Texas."},{"key":"30_CR6","unstructured":"NICSS group, NICSS-Framework Scheme, (February 17, 2005); http:\/\/www.nicss.gr.jp\/."},{"key":"30_CR7","unstructured":"NIST, Government Smart Card Interoperability Specification (GSC-IS), Version 2.1, Interagency Report 6887 \u2014 2003 Edition, July 16, 2003, (February 17, 2005); http:\/\/www.incits.org\/tc_home\/m1htm\/docs\/m1030398.pdf."},{"key":"30_CR8","unstructured":"OilED, (February 17, 2005); http:\/\/oiled.man.ac.uk\/."},{"key":"30_CR9","unstructured":"OntoEdit, (February 17, 2005); http:\/\/www.ontoprise.com."},{"key":"30_CR10","unstructured":"Open Smart Card Infrastructure for Europe, V2, Volume 3: Global Interoperability Framework for identification, authentication and electronic signature (IAS) with smart cards, Part 1: Contextual and Conceptual Modeling, Authors: eESC GIF Expert Group, OSCIE Volume 3 Part 1 (March 2003), (February 17, 2005); http:\/\/www.eeuropesmartcards.org\/Download\/03-1.PDF."},{"key":"30_CR11","first-page":"33","volume":"XX","author":"T. R. Ingoldsby","year":"2004","unstructured":"Terrance R. Ingoldsby: Understanding Risk Through Attack Tree Analysis, CSI Computer Security Journal, Spring 2004, Volume XX, Number 2. pp 33\u201359, (February 17, 2005); http:\/\/www.amenaza.com\/request_methodology.html.","journal-title":"CSI Computer Security Journal"},{"key":"30_CR12","unstructured":"The Ontopia Knowledge Suite, (February 17, 2005); http:\/\/www.ontopia.net."},{"key":"30_CR13","unstructured":"University of Karlsruhe, Karlsruhe Ontology (KAON) Tool Suite, (February 17, 2005); http:\/\/kaon.semanticweb.org."}],"container-title":["Integrated Series in Information Systems","Ontologies"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-0-387-37022-4_30.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T21:54:52Z","timestamp":1605650092000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-0-387-37022-4_30"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9780387370194"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-0-387-37022-4_30","relation":{},"subject":[]}}