{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T21:51:52Z","timestamp":1730238712399,"version":"3.28.0"},"reference-count":21,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,8]]},"DOI":"10.1109\/icdim.2012.6360129","type":"proceedings-article","created":{"date-parts":[[2012,11,30]],"date-time":"2012-11-30T21:16:48Z","timestamp":1354310208000},"page":"245-252","source":"Crossref","is-referenced-by-count":0,"title":["Mapping of vulnerabilities in the public cloud with the use of foundational ontology: A perspective for service IaaS"],"prefix":"10.1109","author":[{"given":"Rita de Cassia C.","family":"Castro","sequence":"first","affiliation":[]},{"given":"Hedwio","family":"Carvalho e Silva","sequence":"additional","affiliation":[]},{"given":"Anilton Sales","family":"Gracia","sequence":"additional","affiliation":[]},{"given":"Marcos Jose Negreiros","family":"Gomes","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"year":"2009","author":"guizzardi","journal-title":"Foundational Ontology and Conceptual Modeling","key":"19"},{"year":"2010","author":"monteiro","journal-title":"A Proposal for A Semantic Service-Related Self-Management in Optical Transport Networks","key":"17"},{"year":"2005","author":"guizzardi","journal-title":"Ontological Foundations for Structural Conceptual Models","key":"18"},{"key":"15","article-title":"Towards a Methodology for Building Ontologies","author":"uschold","year":"1995","journal-title":"Proc IJCAI-95 Workshop Basic Ontological Issues in Knowledge Sharing"},{"year":"1995","author":"gru?ninger","journal-title":"Methodology for the design and evaluation of ontologies","key":"16"},{"year":"2001","author":"noy","journal-title":"Ontology Development 101 A Guide to Creating Your First Ontology","key":"13"},{"year":"1998","author":"falbo","journal-title":"Knowledge Integration in A Software Development Environment","key":"14"},{"year":"2004","author":"go?mez-pe?rez","journal-title":"Ontological Engineering","key":"11"},{"key":"12","first-page":"474","article-title":"Experiences in Using a Method for Building Domain Ontologies","author":"falbo","year":"2004","journal-title":"Proceedings of the 16th Conference on Software Engineering and Knowledge Engineering (SEKE)"},{"key":"21","article-title":"Well-Founded IT Architecture Ontology: An Approach from a Service Continuity Perspective","author":"carvalho","year":"2012","journal-title":"Fourth International Conference on Networked Digital Technologies"},{"key":"3","article-title":"On Ontology, ontologies, Conceptualizations, Modeling Languages, and (Meta) Models","author":"guizzardi","year":"2007","journal-title":"Frontiers in Artificial Intelligence and Applications Databases and Information Systems IV"},{"year":"2008","author":"costa","journal-title":"Modeling the Domain Processing Service Level Management ITIL Standard An Approach Using Foundational Ontology Reasoning and Its Application in Platform Infraware","key":"20"},{"year":"2009","author":"baio?co","journal-title":"Concept and Process Modeling a Configuration Management Approach Using a Foundational Ontology","key":"2"},{"key":"1","first-page":"7","article-title":"An overview about ontologies: Survey about definitions, types, applications, evaluation methods and construction","volume":"32","author":"almeida","year":"2003","journal-title":"Information Science"},{"key":"10","first-page":"155","volume":"20","author":"almeida","year":"2010","journal-title":"A Proposal for Domain Ontology for Information Security in Organizations Description of Stage Terminology"},{"year":"2010","author":"youseff","journal-title":"Toward a Unified Ontology of Cloud Computing","key":"7"},{"doi-asserted-by":"publisher","key":"6","DOI":"10.1109\/NCM.2009.218"},{"year":"2009","author":"jaeger","journal-title":"Cloud Computing and Information Policy Computing in a Policy Cloud?","key":"5"},{"doi-asserted-by":"publisher","key":"4","DOI":"10.1109\/MSP.2010.115"},{"year":"2009","journal-title":"Cloud Computing Benefits Risks and Recommendation for Information","key":"9"},{"year":"2008","author":"branda?o","journal-title":"Use of Ontology in Vulnerability Alerts","key":"8"}],"event":{"name":"2012 Seventh International Conference on Digital Information Management (ICDIM)","start":{"date-parts":[[2012,8,22]]},"location":"Macau, Macao","end":{"date-parts":[[2012,8,24]]}},"container-title":["Seventh International Conference on Digital Information Management (ICDIM 2012)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6341280\/6360086\/06360129.pdf?arnumber=6360129","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,21]],"date-time":"2017-03-21T17:52:27Z","timestamp":1490118747000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6360129\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,8]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/icdim.2012.6360129","relation":{},"subject":[],"published":{"date-parts":[[2012,8]]}}}