{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,26]],"date-time":"2026-01-26T04:04:53Z","timestamp":1769400293128,"version":"3.49.0"},"reference-count":47,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,11]]},"DOI":"10.23919\/fruct.2018.8588107","type":"proceedings-article","created":{"date-parts":[[2018,12,27]],"date-time":"2018-12-27T23:05:23Z","timestamp":1545951923000},"page":"416-424","source":"Crossref","is-referenced-by-count":3,"title":["An Ontology-Based Context Model for Managing Security Knowledge in Software Development"],"prefix":"10.23919","author":[{"given":"Shao-Fang","family":"Wen","sequence":"first","affiliation":[]},{"given":"Basel","family":"Katt","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","article-title":"An ontology-based approach to model common vulnerabilities and exposures in information security","author":"guo","year":"2009","journal-title":"ASEE Southest Section Conference"},{"key":"ref38","article-title":"An ontological approach to mitigate risk in web applications","author":"marques","year":"2014","journal-title":"Proc of SBSE"},{"key":"ref33","article-title":"Ontology: applications and design","volume":"45","author":"gruninger","year":"2002","journal-title":"Commun ACM"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2004.1321026"},{"key":"ref31","article-title":"Ontology development 101: A guide to creating your first ontology","author":"noy","year":"2001","journal-title":"Stanford knowledge systems laboratory technical report KSL-01-05 and Stanford medical informatics technical report SMI-2001-0880 Stanford CA"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1017\/S0269888900007797"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/CyberC.2013.20"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/2487788.2487869"},{"key":"ref35","first-page":"233","article-title":"An Ontology for Secure Web Applications","volume":"9","author":"busch","year":"2015","journal-title":"Int J Software and Informatics"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1504\/IJITST.2013.058295"},{"key":"ref10","article-title":"Why do programmers make security errors?","author":"xie","year":"2011","journal-title":"Visual Languages and Human-Centric Computing (VL\/HCC)"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/CSNT.2013.131"},{"key":"ref11","author":"graff","year":"2003","journal-title":"Secure Coding Principles and Practices"},{"key":"ref12","first-page":"212","article-title":"How large multi-nationals manage their knowledge","volume":"4","author":"birkenkrahe","year":"2002","journal-title":"Business Review"},{"key":"ref13","article-title":"Making context explicit in communicating objects","author":"br\u00e9zillon","year":"2003","journal-title":"Communicating with Smart Objects Developing Technology for Usable Pervasive Computing Systems"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.3166\/ria.19.537-556"},{"key":"ref15","article-title":"Context Framework-an Open Approach to Enhance Organisational Memory Systems with Context Modelling Techniques","author":"klemke","year":"2000","journal-title":"PAKM"},{"key":"ref16","article-title":"Modeling and using context: Past, present and future","author":"br\u00e9zillon","year":"2002","journal-title":"Rapport de recherche interne LIP6 Paris"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1108\/03055720810870897"},{"key":"ref18","first-page":"223","article-title":"Contextual knowledge sharing and cooperation in intelligent assistant systems","author":"br\u00e9zillon","year":"1999","journal-title":"Le Travail Humain"},{"key":"ref19","article-title":"Contextual knowledge analysis-understanding knowledge and its relations to action and communication","author":"goldkuhl","year":"2001","journal-title":"Proceedings of the Second European Conference on Knowledge Management"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/331983.331989"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2000.854063"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1006\/knac.1993.1008"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1049\/sej.1991.0032"},{"key":"ref6","author":"davies","year":"2003","journal-title":"Towards the Semantic Web Ontology-Driven Knowledge Management"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1006\/ijhc.1995.1081"},{"key":"ref5","article-title":"Context Models for managing collaborative software development knowledge","author":"de araujo","year":"2004","journal-title":"Workshop on Modeling and Retrieval of Context"},{"key":"ref8","volume":"1","author":"mcgraw","year":"2006","journal-title":"Software Security Building Security In"},{"key":"ref7","author":"mead","year":"2004","journal-title":"Software Security Engineering A Guide for Project Managers"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2002.1003450"},{"key":"ref9","author":"viega","year":"2001","journal-title":"Building Secure Software How to Avoid Security Problems the Right Way"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2010.62"},{"key":"ref46","year":"0","journal-title":"OWASP Top 10 Application Security Risks - 2017"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-39850-9_26"},{"key":"ref45","author":"shema","year":"2012","journal-title":"Hacking Web Apps Detecting and Preventing Web Application Security Problems"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1111\/j.1365-2929.2005.02205.x"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1023\/A:1013132527007"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1177\/0091552111416227"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.3233\/SW-2012-0057"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2005.103"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2014.05.005"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/1368088.1368130"},{"key":"ref44","author":"powers","year":"2003","journal-title":"Practical RDF solving problems with the resource description framework"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1023\/A:1008679010073"},{"key":"ref43","article-title":"Owl web ontology language guide","author":"welty","year":"2004","journal-title":"W3C Recommendation W3C"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/50087.50089"}],"event":{"name":"2018 23rd Conference of Open Innovations Association (FRUCT)","location":"Bologna","start":{"date-parts":[[2018,11,13]]},"end":{"date-parts":[[2018,11,16]]}},"container-title":["2018 23rd Conference of Open Innovations Association (FRUCT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8570178\/8587913\/08588107.pdf?arnumber=8588107","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,27]],"date-time":"2022-01-27T12:40:10Z","timestamp":1643287210000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8588107\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,11]]},"references-count":47,"URL":"https:\/\/doi.org\/10.23919\/fruct.2018.8588107","relation":{},"subject":[],"published":{"date-parts":[[2018,11]]}}}