Difference between revisions of "Security and Privacy Ontology"
(Security and Privacy Ontology Project) |
|||
Line 12: | Line 12: | ||
==Ontology Development Methodology== | ==Ontology Development Methodology== | ||
+ | This methodology has been derived from a [http://protege.stanford.edu/publications/ontology_development/ontology101-noy-mcguinness.html guide]used by the Protégé team and demonstrates a basic model development process that shares some steps with [http://gforge.hl7.org/gf/project/hdf/news/?action=NewsThreadView&id=38 HL7 HDF]. The draft was written from the standpoint of developing an ontology from scratch. | ||
==Use Cases== | ==Use Cases== | ||
Line 22: | Line 23: | ||
==Resources== | ==Resources== | ||
+ | [http://www.w3.org/TR/2009/REC-owl2-overview-20091027/ W3C OWL 2 Specification] |
Revision as of 16:29, 7 April 2010
Back to: Back to Security Main Page
Back to: Back to CBCC Main Page
Contents
Introduction
This page is intended to provide a focal point for the Security and Privacy Ontology Project; a hub for connecting to its artifacts, discussions, status and links to related projects and work groups. Most of the technical content for this project will be contained within its artifacts which will be linked to on this page and stored on GForge. This page will provide sufficient content for project and document organization.
Project Documentation
Approved Project Scope Statement
Ontology Development Methodology
This methodology has been derived from a guideused by the Protégé team and demonstrates a basic model development process that shares some steps with HL7 HDF. The draft was written from the standpoint of developing an ontology from scratch.
Use Cases
Tooling
Related Projects