4Corradi A,Montanari R, Lupu E, et al. A Flexible Access Control Service for Java Mobile Code//IEEE Annual Computer Security Applications Conference. New Orleans, USA, 2000
5Jarnhour E. Distributed Security Management Using LDA PDirectories//The 21st International Conference of the Chilean Computer Science Society. Punta Arenas, Chile, 2001
6Tsoumas B, Gritzalis D. Towards an Ontology - based Security Management//The 20th IEEE International Conference on Advanced Information Networking and Applications. Vienna, Austria, 2006
7Tsoumas B,Dritsas S,Gritzalis D. An Ontology-Based Approach to Information Systems Security Management//Computer Network Security. Heidelberg: Springer Berlin, 2005 : 151-164
8Shin M,Moon H,Ryu K H, et al. Applying Data Mining Techniques to Analyze Alert Data//The 5th Asia-Pacific Web Conference. Xian, China, 2003
9Bidou R. Security Operation Center Concept & Implementation. http://www. ossim, net/docs, php
10Hyland P C, Sandhu R. Concentric Supervision of Security Applications: A New Security Management Paradigm// Annual Computer Security Application Conference. Phoenix, USA, 1998