{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,21]],"date-time":"2025-05-21T05:53:01Z","timestamp":1747806781782,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":11,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642242694"},{"type":"electronic","value":"9783642242700"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-24270-0_34","type":"book-chapter","created":{"date-parts":[[2011,9,7]],"date-time":"2011-09-07T10:51:44Z","timestamp":1315392704000},"page":"467-479","source":"Crossref","is-referenced-by-count":14,"title":["On the Use of Semantic Technologies to Model and Control Security, Privacy and Dependability in Complex Systems"],"prefix":"10.1007","author":[{"given":"Andrea","family":"Fiaschetti","sequence":"first","affiliation":[]},{"given":"Francesco","family":"Lavorato","sequence":"additional","affiliation":[]},{"given":"Vincenzo","family":"Suraci","sequence":"additional","affiliation":[]},{"given":"Andi","family":"Palo","sequence":"additional","affiliation":[]},{"given":"Andrea","family":"Taglialatela","sequence":"additional","affiliation":[]},{"given":"Andrea","family":"Morgagni","sequence":"additional","affiliation":[]},{"given":"Renato","family":"Baldelli","sequence":"additional","affiliation":[]},{"given":"Francesco","family":"Flammini","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"unstructured":"Common Criteria for Information Technology Security Evaluation, v3.1 (July 2009)","key":"34_CR1"},{"key":"34_CR2","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1007\/978-0-387-37022-4_4","volume":"14","author":"L. Ding","year":"2007","unstructured":"Ding, L., Kolari, P., Ding, Z., Avancha, S.: Using Ontologies in the Semantic Web: A Survey. Ontologies\u00a014, 79\u2013113 (2007)","journal-title":"Ontologies"},{"issue":"5","key":"34_CR3","doi-asserted-by":"publisher","first-page":"609","DOI":"10.1109\/TKDE.2009.154","volume":"22","author":"V. Mascardi","year":"2010","unstructured":"Mascardi, V., Locoro, A., Rosso, P.: Automatic Ontology Matching via Upper Ontologies: A Systematic Evaluation. IEEE Transactions on Knowledge and Data Engineering\u00a022(5), 609\u2013623 (2010)","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"doi-asserted-by":"crossref","unstructured":"Henkel, J., Narayanan, V., Parameswaran, S., Ragel, R.: Security and Dependability of Embedded Systems: A Computer Architects\u2019 Perspective\u201d. In: 22nd International Conference on VLSI Design 2009, pp. 30\u201333 (2009), doi:10.1109\/VLSI.Design.2009.114","key":"34_CR4","DOI":"10.1109\/VLSI.Design.2009.114"},{"unstructured":"pSHIELD Technical Annex (June 2010)","key":"34_CR5"},{"unstructured":"Dean, M., Schreiber, G.: OWL Web Ontology Language Reference, http:\/\/www.w3.org\/TR\/2004\/REC-owl-ref-20040210\/","key":"34_CR6"},{"unstructured":"McGuinness, D.L., van Harmelen, F.: OWL Web Ontology Language Overview, http:\/\/www.w3.org\/TR\/owl-features\/","key":"34_CR7"},{"unstructured":"Compton, M., Henson, C., Lefort, L., Neuhaus, H., Sheth, A.: A Survey of the Semantic Specication of Sensors. In: Proc. Semantic Sensor Networks 2009, pp. 17\u201332 (2009)","key":"34_CR8"},{"issue":"1","key":"34_CR9","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1007\/BF01006412","volume":"1","author":"B. Gaines","year":"1992","unstructured":"Gaines, B., Shaw, M.: Integrated knowledge acquisition architectures. Journal of Intelligent Information Systems\u00a01(1), 9\u201334 (1992)","journal-title":"Journal of Intelligent Information Systems"},{"unstructured":"Grosso, E., Eriksson, H., Fergerson, R., Tu, S., Musen, M.: Knowledge modeling at the millennium \u2014 the design and evolution of Prot\u00e9g\u00e9-2000. In: Proceedings of KAW 1999, Banff, Canada (1999)","key":"34_CR10"},{"doi-asserted-by":"crossref","unstructured":"Staab, S., Schnurr, H.-P., Studer, R., Sure, Y.: Knowledge processes and ontologies. IEEE Intelligent Systems\u00a016(1) (2001)","key":"34_CR11","DOI":"10.1109\/5254.912382"}],"container-title":["Lecture Notes in Computer Science","Computer Safety, Reliability, and Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-24270-0_34","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,14]],"date-time":"2019-06-14T22:50:09Z","timestamp":1560552609000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-24270-0_34"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642242694","9783642242700"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-24270-0_34","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}