SecOnto: Ontological Representation of Security Directives

被引:0
|
作者
Castiglione, Gianpietro [1 ]
Bella, Giampaolo [1 ]
Santamaria, Daniele Francesco [1 ]
机构
[1] Univ Studi Catania, Catania, Italy
关键词
Semantic web; Reasoning; NIS; 2; GDPR; FRAMEWORK;
D O I
10.1016/j.cose.2024.104150
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The current digital landscape demands robust security requirements and, for doing so, the institutions enact complex security directives to protect the citizens and the infrastructures, particularly in the European Union. These directives aim to safeguard data and harmonise security across the European region, and institutions must navigate this evolving legal landscape in order to implement and keep up-to-date the prescribed security measures. However, understanding and implementing these directives towards full compliance can be difficult and expensive. Ontological representation can be employed to represent and operationalise such security directives, ultimately contributing to the effectiveness and efficiency of the compliance process. Ontologies in fact promote a structured approach to represent knowledge, making the applicable directives more simply understandable by humans and more readily processable by machines. This article introduces SecOnto, a novel methodology for representing security directives as ontologies. SecOnto breaks down the process of transforming the juridical language of modern security directives into full-fledged ontologies by means of five semi-automated steps: Preprocessing, Interpretation, Structuring, Representation and Verification. Each step is described and validated by means of operational examples based upon Directive 2022/2555 of the European Parliament and of the Council of the European Union on security of network and information systems, better known as NIS 2.
引用
收藏
页数:13
相关论文
共 50 条
  • [1] Ontological Representation of Healthcare Application Security Using Blockchain Technology
    Matulevicius, Raimundas
    Iqbal, Mubashar
    Elhadjamor, Emna Ammar
    Ghannouchi, Sonia Ayachi
    Bakhtina, Mariia
    Ghannouchi, Slaheddine
    INFORMATICA, 2022, 33 (02) : 365 - 397
  • [2] Icons and ontological (in)security
    Steele, Brent J.
    Subotic, Jelena
    EUROPEAN JOURNAL OF INTERNATIONAL SECURITY, 2024, 9 (02) : 143 - 159
  • [3] Van Gennep Meets Ontological (In)Security: A Processual Approach to Ontological Security in Migration
    Gazit, Orit
    INTERNATIONAL STUDIES REVIEW, 2019, 21 (04) : 572 - 597
  • [4] Deconstructing Cybersecurity: From Ontological Security to Ontological Insecurity
    Joque, Justin
    Haque, S. M. Taiabul
    NEW SECURITY PARADIGMS WORKSHOP (NSPW 2020), 2020, : 99 - 110
  • [5] ONTOLOGICAL CONCEPTUALIZATION OF COMBAT REPRESENTATION
    Rheault, Sylvain
    VOIX PLURIELLES, 2009, 6 (01):
  • [6] Lakota experiences of (in)security: cosmology and ontological security
    de Leon, Justin
    INTERNATIONAL FEMINIST JOURNAL OF POLITICS, 2020, 22 (01) : 33 - 62
  • [7] Ontological Representation of Academic Programs
    Hackelbusch, Richard
    INTERNATIONAL JOURNAL OF EMERGING TECHNOLOGIES IN LEARNING, 2006, 1 (03):
  • [8] Ontological Representation of Audio Features
    Allik, Alo
    Fazekas, Gyorgy
    Sandler, Mark
    SEMANTIC WEB - ISWC 2016, PT II, 2016, 9982 : 3 - 11
  • [9] ONTOLOGICAL ASSUMPTIONS IN KNOWLEDGE REPRESENTATION
    HIRST, G
    PROCEEDINGS OF THE FIRST CONFERENCE ON PRINCIPLES OF KNOWLEDGE REPRESENTATION AND REASONING, 1989, : 157 - 169
  • [10] Ontological tools for geographic representation
    Casati, R
    Smith, B
    Varzi, AC
    FORMAL ONTOLOGY IN INFORMATION SYSTEMS, 1998, 46 : 77 - 85