{"@context":{"rdf":"http://www.w3.org/1999/02/22-rdf-syntax-ns#","voaf":"http://purl.org/vocommons/voaf#","owl":"http://www.w3.org/2002/07/owl#","dc":"http://purl.org/dc/elements/1.1/","vann":"http://purl.org/vocab/vann/","rdfs":"http://www.w3.org/2000/01/rdf-schema#","dct":"http://purl.org/dc/terms/","ns0":"http://www.w3.org/2003/06/sw-vocab-status/ns#"},"@id":"http://securitytoolbox.appspot.com/stac#","@type":["voaf:Vocabulary","owl:NamedIndividual","owl:Ontology"],"dc:creator":"Amelie Gyrard. Eurecom","vann:preferredNamespacePrefix":"stac","vann:preferredNamespaceUri":"http://securitytoolbox.appspot.com/stac#","rdfs:comment":{"@language":"en","@value":""},"dct:modified":{"@type":"http://www.w3.org/2001/XMLSchema#date","@value":"2013-06-02"},"ns0:term_status":"Work in progress","owl:versionInfo":{"@type":"http://www.w3.org/2001/XMLSchema#decimal","@value":"0.2"},"dc:description":{"@language":"en","@value":"A vocabulary to describe main security and cryptographic concepts: attacks, security mechanisms, OSI model, security protocols, security tools in numerous technologies: Web applications, network management, Sensor networks, Cellular (2G, 3G, 4G) and Wireless (Wifi), etc. "},"dc:title":{"@language":"en","@value":"The STAC Ontology (Security Toolbox : Attacks and Countermeasures)"},"dct:issued":{"@type":"http://www.w3.org/2001/XMLSchema#date","@value":"2013-04-30"},"rdfs:seeAlso":["This work has been inspired for the cryptographic concepts and security properties by \"An ontology of Information Security\" [Herzog et al. 2007]","This work has been inspired for the cryptographic concepts and security properties by \"Construction d'une ontologie pour le domaine de la securite\" [Lekhchine et al. 2009]","This work has been inspired for the cryptographic concepts and security properties by \"Security in the Semantic Web using OWL\" [Denker et al. 2005]","This work has been inspired for the cryptographic concepts and security properties by \"Security Ontology for Annotating resources\" [Kim et al. 2005]"]}
{"@context":{"rdf":"http://www.w3.org/1999/02/22-rdf-syntax-ns#","voaf":"http://purl.org/vocommons/voaf#","owl":"http://www.w3.org/2002/07/owl#","dc":"http://purl.org/dc/elements/1.1/","vann":"http://purl.org/vocab/vann/","rdfs":"http://www.w3.org/2000/01/rdf-schema#","dct":"http://purl.org/dc/terms/","ns0":"http://www.w3.org/2003/06/sw-vocab-status/ns#"},"@id":"http://securitytoolbox.appspot.com/stac#","@type":["voaf:Vocabulary","owl:NamedIndividual","owl:Ontology"],"dc:creator":"Amelie Gyrard. Eurecom","vann:preferredNamespacePrefix":"stac","vann:preferredNamespaceUri":"http://securitytoolbox.appspot.com/stac#","rdfs:comment":{"@language":"en","@value":""},"dct:modified":{"@type":"http://www.w3.org/2001/XMLSchema#date","@value":"2013-06-02"},"ns0:term_status":"Work in progress","owl:versionInfo":{"@type":"http://www.w3.org/2001/XMLSchema#decimal","@value":"0.2"},"dc:description":{"@language":"en","@value":"A vocabulary to describe main security and cryptographic concepts: attacks, security mechanisms, OSI model, security protocols, security tools in numerous technologies: Web applications, network management, Sensor networks, Cellular (2G, 3G, 4G) and Wireless (Wifi), etc. "},"dc:title":{"@language":"en","@value":"The STAC Ontology (Security Toolbox : Attacks and Countermeasures)"},"dct:issued":{"@type":"http://www.w3.org/2001/XMLSchema#date","@value":"2013-04-30"},"rdfs:seeAlso":["This work has been inspired for the cryptographic concepts and security properties by \"An ontology of Information Security\" [Herzog et al. 2007]","This work has been inspired for the cryptographic concepts and security properties by \"Construction d'une ontologie pour le domaine de la securite\" [Lekhchine et al. 2009]","This work has been inspired for the cryptographic concepts and security properties by \"Security in the Semantic Web using OWL\" [Denker et al. 2005]","This work has been inspired for the cryptographic concepts and security properties by \"Security Ontology for Annotating resources\" [Kim et al. 2005]"]}