{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:31:40Z","timestamp":1750307500548,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":26,"publisher":"ACM","license":[{"start":{"date-parts":[[2008,9,10]],"date-time":"2008-09-10T00:00:00Z","timestamp":1221004800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2008,9,10]]},"DOI":"10.1145\/1621087.1621100","type":"proceedings-article","created":{"date-parts":[[2009,10,6]],"date-time":"2009-10-06T18:23:22Z","timestamp":1254853402000},"page":"1-7","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["CoreSec"],"prefix":"10.1145","author":[{"given":"Ryan Ribeiro","family":"de Azevedo","sequence":"first","affiliation":[{"name":"CIN-UFPE, Cidade Universit\u00e1ria - Recife-PE -- Brasil"}]},{"given":"Fred","family":"Freitas","sequence":"additional","affiliation":[{"name":"CIN-UFPE, Cidade Universit\u00e1ria - Recife-PE -- Brasil"}]},{"given":"Silas Cardoso","family":"de Almeida","sequence":"additional","affiliation":[{"name":"FASETE, Centro -- Paulo Afonso-BA -- Brasil"}]},{"given":"Marcelo Jos\u00e9 S. C.","family":"Almeida","sequence":"additional","affiliation":[{"name":"CIN-UFPE, Cidade Universit\u00e1ria - Recife-PE -- Brasil"}]},{"given":"Edson C.","family":"de Barros C. Filho","sequence":"additional","affiliation":[{"name":"CIN-UFPE, Cidade Universit\u00e1ria - Recife-PE -- Brasil"}]},{"given":"Wendell Campos","family":"Veras","sequence":"additional","affiliation":[{"name":"CIN-UFPE, Cidade Universit\u00e1ria - Recife-PE -- Brasil"}]}],"member":"320","published-online":{"date-parts":[[2008,9,10]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Anderson R. Hunstad A. Hallberg J. Evolution of the Security of Components in Distributed Information Systems. Swedish Defence Reaserch Agency. Scientific report 2003. 63p.  Anderson R. Hunstad A. Hallberg J. Evolution of the Security of Components in Distributed Information Systems . Swedish Defence Reaserch Agency. Scientific report 2003. 63p."},{"volume-title":"S\u00e3o Paulo: Atlas","year":"2005","author":"Beal","key":"e_1_3_2_1_2_1"},{"key":"e_1_3_2_1_3_1","unstructured":"Boran Sean. IT Security CookBook. 1996--2003.  Boran Sean. IT Security CookBook . 1996--2003."},{"key":"e_1_3_2_1_4_1","unstructured":"Chang E. etal (2005) \"Information engineering of a software engineering ontology\" in Proceedings of the 3 rd IEEE International Conference on Industrial Informatics (INDIN). Perth Australia. 2005. pp 366--371.  Chang E. et al (2005) \"Information engineering of a software engineering ontology\" in Proceedings of the 3 rd IEEE International Conference on Industrial Informatics (INDIN). Perth Australia. 2005. pp 366--371."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"crossref","unstructured":"Donner M. Toward a Security Ontology. IEEE Security&amp;Privacy Magazine v. 1 n. 3 p. 6--7 2003.   Donner M. Toward a Security Ontology . IEEE Security&amp;Privacy Magazine v. 1 n. 3 p. 6--7 2003.","DOI":"10.1109\/MSP.2009.16"},{"key":"e_1_3_2_1_6_1","first-page":"33","volume-title":"Proceedings of the AAAI Spring Symposium Series","author":"Fern\u00e1ndez M. A.","year":"1997"},{"volume-title":"Renata Vieira","year":"2003","author":"Freitas F.","key":"e_1_3_2_1_7_1"},{"volume-title":"FIRST INTERNATIONAL CONFERENCE (FOIS), 1","year":"1998","author":"Guarino N.","key":"e_1_3_2_1_8_1"},{"key":"e_1_3_2_1_9_1","unstructured":"Guizzardi. G. \"Uma abordagem metodol\u00f3gica de desenvolvimento para e com reuso baseada em ontologias formais de dom\u00ednio.\" Disserta\u00e7\u00e3o de Mestrado. Universidade Federal do Esp\u00edrito Santo. 2000.  Guizzardi. G. \"Uma abordagem metodol\u00f3gica de desenvolvimento para e com reuso baseada em ontologias formais de dom\u00ednio.\" Disserta\u00e7\u00e3o de Mestrado. Universidade Federal do Esp\u00edrito Santo. 2000."},{"key":"e_1_3_2_1_10_1","unstructured":"JENA 2 Ontology API. Dispon\u00edvel em: http:\/\/jena.sourceforge.net\/ontology\/ 2003.  JENA 2 Ontology API. Dispon\u00edvel em: http:\/\/jena.sourceforge.net\/ontology\/ 2003."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1006\/ijhc.1995.1081"},{"volume-title":"IEEE Computing Society","year":"1996","author":"IEEE","key":"e_1_3_2_1_12_1"},{"key":"e_1_3_2_1_13_1","unstructured":"ISO\/IEC 15.408. Information technology - Security techniques - Evaluation criteria for IT security. 1999 222p.  ISO\/IEC 15.408. Information technology - Security techniques - Evaluation criteria for IT security . 1999 222p."},{"key":"e_1_3_2_1_14_1","unstructured":"ISO\/IEC 17799 (2001) \"Information technology - Code of pratice for information security management\". 2001 56p.  ISO\/IEC 17799 (2001) \"Information technology - Code of pratice for information security management\". 2001 56p."},{"key":"e_1_3_2_1_15_1","unstructured":"Jenz Dieter E. Ontology-Based Business Process Management the vision statement. Strategic White Paper Draft http:\/\/www.bptrends.com\/ (2003) Germany.  Jenz Dieter E. Ontology-Based Business Process Management the vision statement . Strategic White Paper Draft http:\/\/www.bptrends.com\/ (2003) Germany."},{"key":"e_1_3_2_1_16_1","unstructured":"Martimiano L. A. F. Sobre a estrutura\u00e7\u00e3o de informa\u00e7\u00e3o de seguran\u00e7a computacional: o uso de ontologia. 163 p. Tese (Doutorado em Ci\u00eancias de Computa\u00e7\u00e3o e Matem\u00e1tica Computacional) -- Instituto de Ci\u00eancias Matem\u00e1ticas e de Computa\u00e7\u00e3o -- ICMC Universidade de S\u00e3o Paulo - USP S\u00e3o Carlos 2006.  Martimiano L. A. F. Sobre a estrutura\u00e7\u00e3o de informa\u00e7\u00e3o de seguran\u00e7a computacional: o uso de ontologia . 163 p. Tese (Doutorado em Ci\u00eancias de Computa\u00e7\u00e3o e Matem\u00e1tica Computacional) -- Instituto de Ci\u00eancias Matem\u00e1ticas e de Computa\u00e7\u00e3o -- ICMC Universidade de S\u00e3o Paulo - USP S\u00e3o Carlos 2006."},{"key":"e_1_3_2_1_17_1","unstructured":"NIST. National Vulnerability Database. http:\/\/nvd.nist.gov\/ (2007)  NIST. National Vulnerability Database. http:\/\/nvd.nist.gov\/ (2007)"},{"key":"e_1_3_2_1_18_1","unstructured":"Noy N. F.; McGuiness D. L. Ontology development 101: A Guide to Creating Your First Ontology. Knowledge Systems Laboratory -- Stanford University TR KSL-01-05 2001.  Noy N. F.; McGuiness D. L. Ontology development 101: A Guide to Creating Your First Ontology . Knowledge Systems Laboratory -- Stanford University TR KSL-01-05 2001."},{"key":"e_1_3_2_1_19_1","unstructured":"OWL. Web ontology language overview - w3c;. {Online}. Dispon\u00edvel: http:\/\/www.w3.org\/TR\/owl-features\/ Acessado em: Out. 2006.  OWL. Web ontology language overview - w3c;. {Online}. Dispon\u00edvel: http:\/\/www.w3.org\/TR\/owl-features\/ Acessado em: Out. 2006."},{"key":"e_1_3_2_1_20_1","unstructured":"PMI - Project Management Institute. (2004) A Guide to the Project Management Body of Knowledge. -- ANSI\/PMI 99-01 2004. Project Management Institute. Four Campus Boulevard. Newtown Square. USA.  PMI - Project Management Institute. (2004) A Guide to the Project Management Body of Knowledge . -- ANSI\/PMI 99-01 2004. Project Management Institute. Four Campus Boulevard. Newtown Square. USA."},{"key":"e_1_3_2_1_21_1","unstructured":"Prot\u00e9g\u00e9. Prot\u00e9g\u00e9 ontology editor. {Online}. Dispon\u00edvel: http:\/\/protege.stanford.edu\/doc\/users.html Acessado em: Out. 2006.  Prot\u00e9g\u00e9. Prot\u00e9g\u00e9 ontology editor. {Online}. Dispon\u00edvel: http:\/\/protege.stanford.edu\/doc\/users.html Acessado em: Out. 2006 ."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/508171.508180"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/b11930"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1038\/scientificamerican0501-34"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"crossref","unstructured":"Uschold M Gr\u00fcninger M. Ontologies: Principles Methods and Applications. Knowledge Engineering Review. Vol. 11 N\u00b0 02. June. 1996.  Uschold M Gr\u00fcninger M. Ontologies: Principles Methods and Applications . Knowledge Engineering Review. Vol. 11 N\u00b0 02. June. 1996.","DOI":"10.1017\/S0269888900007797"},{"volume-title":"Proceedings of the KAW-96","year":"1996","author":"Valente A.","key":"e_1_3_2_1_26_1"}],"event":{"name":"EATIS08: Euro American Conference on Telematics and Information Systems","sponsor":["SIGAPP ACM Special Interest Group on Applied Computing","SIGGRAPH ACM Special Interest Group on Computer Graphics and Interactive Techniques","SIGMM ACM Special Interest Group on Multimedia"],"location":"Aracaju Brazil","acronym":"EATIS08"},"container-title":["Proceedings of the 2008 Euro American Conference on Telematics and Information Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1621087.1621100","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1621087.1621100","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T12:17:46Z","timestamp":1750249066000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1621087.1621100"}},"subtitle":["an ontology of security aplied to the business process of management"],"short-title":[],"issued":{"date-parts":[[2008,9,10]]},"references-count":26,"alternative-id":["10.1145\/1621087.1621100","10.1145\/1621087"],"URL":"https:\/\/doi.org\/10.1145\/1621087.1621100","relation":{},"subject":[],"published":{"date-parts":[[2008,9,10]]},"assertion":[{"value":"2008-09-10","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}