{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T11:55:57Z","timestamp":1725537357132},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642045899"},{"type":"electronic","value":"9783642045905"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-04590-5_17","type":"book-chapter","created":{"date-parts":[[2009,9,3]],"date-time":"2009-09-03T12:23:13Z","timestamp":1251980593000},"page":"183-192","source":"Crossref","is-referenced-by-count":13,"title":["An Ontology Based Approach to Information Security"],"prefix":"10.1007","author":[{"given":"Teresa","family":"Pereira","sequence":"first","affiliation":[]},{"given":"Henrique","family":"Santos","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"17_CR1","unstructured":"Berners-Lee, T.: Semantic Web on XML. Presentation from XML (2000)"},{"key":"17_CR2","unstructured":"Anderson, S.R.: Total Information Awareness and Beyond. The Dangers of Using Data Mining Technology to Prevent Terrorism. Technical report, BORDC Bill of Rights Defense Committee (2007), \n                    \n                      http:\/\/www.bordc.org\/threats\/data-mining.pdf"},{"key":"17_CR3","unstructured":"Brouwer, E.: Data Surveillance and border control in the EU: Balancing efficiency and legal protection of third country nationals. Technical report (2005), \n                    \n                      http:\/\/www.libertysecurity.org\/article289.html?var_recherche=Data%20Surveillance"},{"key":"17_CR4","unstructured":"Buckeridge, D.L., Graham, J., O\u00d5Connor, M.J., Choy, M.K., Tu, S.W., Musen, M.A.: Knowledge-Based Bioterrorism Surveillance. In: AMIA Annual Symposium, San Antonio, TX (2002), \n                    \n                      http:\/\/bmir.stanford.edu\/file_asset\/index.php\/1147\/SMI-2002-0946.pdf"},{"key":"17_CR5","unstructured":"ISO\/IEC FDIS 27001 Information technology \u2013 Security techniques \u2013 Information security management systems\u2013 Requirements, ISO copyright office. Geneva, Switzerland (2005)"},{"key":"17_CR6","unstructured":"Jonas, J., Harper, J.: Effective Counterterrorism and the Limited Role of Predictive Data Mining. Policy Analysis no 584, CATO Institute, December 11 (2006), \n                    \n                      http:\/\/www.cato.org\/pub_display.php?pub_id=6784"},{"key":"17_CR7","unstructured":"Martimiano, L., Moreira, E.: The evaluation process of a computer security incident ontology. In: 2nd Workshop on Ontologies and their Applications (WONTO 2006), S\u00e3o Paulo, Brazil (2006)"},{"key":"17_CR8","doi-asserted-by":"crossref","unstructured":"Maxwell, T.A.: Information Policy, Data Mining, and National Security: False Positives and Unidentified Negatives. In: Proceedings of the 38th Hawaii International Conference on System Sciences, Hawaii (2005)","DOI":"10.1109\/HICSS.2005.317"},{"key":"17_CR9","unstructured":"Noy, N.F., McGuinness, D.L.: Ontology Development 101: A Guide to Creating Your First Ontology. Technical Report SMI-2001-0880, Stanford Knowledge Systems Laboratory Technical Report KSL-01-05 and Stanford Medical Informatics (2001), \n                    \n                      http:\/\/www-ksl.stanford.edu\/people\/dlm\/papers\/ontology-tutorial-noy-mcguinness-abstract.html"},{"key":"17_CR10","doi-asserted-by":"crossref","unstructured":"Miller, R.R.: Information Management in the Aftermath of 9\/11. Communications of the ACM\u00a045(9) (2002)","DOI":"10.1145\/567498.567522"},{"issue":"2","key":"17_CR11","doi-asserted-by":"publisher","first-page":"150","DOI":"10.1108\/09685220810879627","volume":"16","author":"E.S. Moreira","year":"2008","unstructured":"Moreira, E.S., Martimiano, L.A., Brand\u00e3o, A.J.d.S., Bernardes, M.C.: Ontologies for information security management and governance. Information Management & Security\u00a016(2), 150\u2013165 (2008)","journal-title":"Information Management & Security"},{"key":"17_CR12","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1145\/508171.508180","volume-title":"Proceedings of the 2001 Workshop on New Security Paradigms","author":"V. Raskin","year":"2001","unstructured":"Raskin, V., Hempelmann, C.F., Triezenberg, K.E., Nirenburg, S.: Ontology in information security: a useful theoretical foundation and methodological tool. In: Proceedings of the 2001 Workshop on New Security Paradigms. NSPW 2001, pp. 53\u201359. ACM, New York (2001)"},{"key":"17_CR13","unstructured":"Smith, M.K., Welty, C., McGuinness, D.L.: OWL Web Ontology Language Guide. W3C Recommendation February 10, 2004. Technical report, W3C (2004), \n                    \n                      http:\/\/www.w3.org\/TR\/owl-guide\/"}],"container-title":["Communications in Computer and Information Science","Metadata and Semantic Research"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-04590-5_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,9]],"date-time":"2019-03-09T23:28:54Z","timestamp":1552174134000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-04590-5_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642045899","9783642045905"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-04590-5_17","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2009]]}}}