1. do Amaral, F.N., Bazílio, C., da Silva, G.M.H., Rademaker, A., Haeusler, E.H.: An ontology-based approach to the formalization of information security policies. EDOCW 0, 1 (2006)
2. Borgida, A., Franconi, E., Horrocks, I., McGuinness, D., Patel-Schneider, P.: Explaining $${\cal {ALC}}$$ subsumption. In: Proceedings of the International Workshop on Description Logics, pp. 33–36 (1999)
3. Borgida, A., Franconi, E., Horrocks, I., McGuinness, D.L., Patel-Schneider, P.F.: Explaining ALC subsumption. In: Lambrix, P., Borgida, A., Lenzerini, M., Möller, R., Patel-Schneider, P.F. (eds.) Proceedings of the 1999 International Workshop on Description Logics 1999, vol. 22. Linköping, Sweden (1999). http://SunSITE.Informatik.RWTH-Aachen.DE/Publications/CEUR-WS/Vol-22/borgida.ps
4. Brachman, R., McGuiness, D.L., Patel-Schneider, P.F., Resnick, L.A., Borgida, A.: Living with classic: when and how to use a kl-one-like language. In: Sowa, J. (ed.) Principles of Semantic Networks: Explorations in the Representation of Knowledge, pp. 401–456. Morgan Kaufmann, San Mateo (1991)
5. Brachman, R.J., Fikes, R.E., Levesque, H.J.: Krypton: A functional approach to knowledge representation. IEEE Comput. 16, 67–73 (1983)