1. Balopoulos, T., Dritsas, S., Gymnopoulos, L., Karyda, M., Kokolakis, S., Gritzalis, S.: Incorporating Security Requirements into the Software Development Process. In: Proceedings of the 4th European Conference On Information Warfare And Security (ECIW 2005), University of Glamorgan, UK (July 2005)
2. Dritsas, S., Gymnopoulos, L., Karyda, M., Balopoulos, T., Kokolakis, S., Lambrinoudakis, C., Gritzalis, S.: Employing Ontologies for the Development of Security Critical Applications: The Secure e-Poll Paradigm. In: Proceedings of the IFIP I3E International Conference on eBusiness, eCommerce, and eGovernement, Poznan, Poland, October 2005. Springer, Heidelberg (2005)
3. Karyda, M., Balopoulos, T., Dritsas, S., Gymnopoulos, L., Kokolakis, S., Lambrinoudakis, C., Gritzalis, S.: Using Security Ontologies for the development of secure e-Government applications. In: Tjoa, A., Schweighofer, E. (eds.) Proceedings of the DeSeGov 2006 Workshop on Dependability and Security in eGovernment (in conjunction with the 1st International Conference on Availability, Reliability, and Security), Vienna, Austria. IEEE Computer Society Press, Los Alamitos (2006)
4. Gymnopoulos, L., Karyda, M., Balopoulos, T., Dritsas, S., Kokolakis, S., Lambrinoudakis, C., Gritzalis, S.: Developing a Security Patterns Repository for Secure Applications De-sign. In: Proceedings of the 5th European Conference on Information Warfare and Security (ECIW 2006), Helsinki, Finland (2006)
5. Lecture Notes in Computer Science;J. Jürjens,2001