{"id":"https://openalex.org/W4391881141","doi":"https://doi.org/10.1007/s10270-024-01149-1","title":"Ontology-based security modeling in ArchiMate","display_name":"Ontology-based security modeling in ArchiMate","publication_year":2024,"publication_date":"2024-02-16","ids":{"openalex":"https://openalex.org/W4391881141","doi":"https://doi.org/10.1007/s10270-024-01149-1"},"language":"en","primary_location":{"id":"doi:10.1007/s10270-024-01149-1","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s10270-024-01149-1","pdf_url":"https://link.springer.com/content/pdf/10.1007/s10270-024-01149-1.pdf","source":{"id":"https://openalex.org/S64245694","display_name":"Software & Systems Modeling","issn_l":"1619-1366","issn":["1619-1366","1619-1374"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Software and Systems Modeling","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://link.springer.com/content/pdf/10.1007/s10270-024-01149-1.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5079913216","display_name":"\u00cdtalo Oliveira","orcid":"https://orcid.org/0000-0002-2384-3081"},"institutions":[{"id":"https://openalex.org/I94624287","display_name":"University of Twente","ror":"https://ror.org/006hf6230","country_code":"NL","type":"education","lineage":["https://openalex.org/I94624287"]},{"id":"https://openalex.org/I171543936","display_name":"Free University of Bozen-Bolzano","ror":"https://ror.org/012ajp527","country_code":"IT","type":"education","lineage":["https://openalex.org/I171543936"]}],"countries":["IT","NL"],"is_corresponding":true,"raw_author_name":"\u00cdtalo Oliveira","raw_affiliation_strings":["Conceptual and Cognitive Modeling Research Group (CORE), Free University of Bozen-Bolzano, Bolzano, Italy","Semantics, Cybersecurity and Services Group, University of Twente, Enschede, The Netherlands"],"affiliations":[{"raw_affiliation_string":"Conceptual and Cognitive Modeling Research Group (CORE), Free University of Bozen-Bolzano, Bolzano, Italy","institution_ids":["https://openalex.org/I171543936"]},{"raw_affiliation_string":"Semantics, Cybersecurity and Services Group, University of Twente, Enschede, The Netherlands","institution_ids":["https://openalex.org/I94624287"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5030998387","display_name":"Tiago Prince Sales","orcid":"https://orcid.org/0000-0002-5385-5761"},"institutions":[{"id":"https://openalex.org/I94624287","display_name":"University of Twente","ror":"https://ror.org/006hf6230","country_code":"NL","type":"education","lineage":["https://openalex.org/I94624287"]}],"countries":["NL"],"is_corresponding":false,"raw_author_name":"Tiago Prince Sales","raw_affiliation_strings":["Semantics, Cybersecurity and Services Group, University of Twente, Enschede, The Netherlands"],"affiliations":[{"raw_affiliation_string":"Semantics, Cybersecurity and Services Group, University of Twente, Enschede, The Netherlands","institution_ids":["https://openalex.org/I94624287"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5063817933","display_name":"Jo\u00e3o Paulo A. Almeida","orcid":"https://orcid.org/0000-0002-9819-3781"},"institutions":[{"id":"https://openalex.org/I51235708","display_name":"Universidade Federal do Esp\u00edrito Santo","ror":"https://ror.org/05sxf4h28","country_code":"BR","type":"education","lineage":["https://openalex.org/I51235708"]}],"countries":["BR"],"is_corresponding":false,"raw_author_name":"Jo\u00e3o Paulo A. Almeida","raw_affiliation_strings":["Ontology and Conceptual Modeling Research Group (NEMO), Federal University of Esp\u00edrito Santo, Vit\u00f3ria, Brazil"],"affiliations":[{"raw_affiliation_string":"Ontology and Conceptual Modeling Research Group (NEMO), Federal University of Esp\u00edrito Santo, Vit\u00f3ria, Brazil","institution_ids":["https://openalex.org/I51235708"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5009668861","display_name":"Riccardo Baratella","orcid":"https://orcid.org/0000-0002-4387-2912"},"institutions":[{"id":"https://openalex.org/I83816512","display_name":"University of Genoa","ror":"https://ror.org/0107c5v14","country_code":"IT","type":"education","lineage":["https://openalex.org/I83816512"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Riccardo Baratella","raw_affiliation_strings":["Dipartimento di Antichit\u00e0, Filosofia, Storia (DAFIST), University of Genoa, Genoa, Italy"],"affiliations":[{"raw_affiliation_string":"Dipartimento di Antichit\u00e0, Filosofia, Storia (DAFIST), University of Genoa, Genoa, Italy","institution_ids":["https://openalex.org/I83816512"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5012435036","display_name":"Mattia Fumagalli","orcid":"https://orcid.org/0000-0003-3385-4769"},"institutions":[{"id":"https://openalex.org/I171543936","display_name":"Free University of Bozen-Bolzano","ror":"https://ror.org/012ajp527","country_code":"IT","type":"education","lineage":["https://openalex.org/I171543936"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Mattia Fumagalli","raw_affiliation_strings":["Conceptual and Cognitive Modeling Research Group (CORE), Free University of Bozen-Bolzano, Bolzano, Italy"],"affiliations":[{"raw_affiliation_string":"Conceptual and Cognitive Modeling Research Group (CORE), Free University of Bozen-Bolzano, Bolzano, Italy","institution_ids":["https://openalex.org/I171543936"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5065297243","display_name":"Giancarlo Guizzardi","orcid":"https://orcid.org/0000-0002-3452-553X"},"institutions":[{"id":"https://openalex.org/I94624287","display_name":"University of Twente","ror":"https://ror.org/006hf6230","country_code":"NL","type":"education","lineage":["https://openalex.org/I94624287"]}],"countries":["NL"],"is_corresponding":false,"raw_author_name":"Giancarlo Guizzardi","raw_affiliation_strings":["Semantics, Cybersecurity and Services Group, University of Twente, Enschede, The Netherlands"],"affiliations":[{"raw_affiliation_string":"Semantics, Cybersecurity and Services Group, University of Twente, Enschede, The Netherlands","institution_ids":["https://openalex.org/I94624287"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5079913216"],"corresponding_institution_ids":["https://openalex.org/I171543936","https://openalex.org/I94624287"],"apc_list":{"value":2290,"currency":"EUR","value_usd":2890},"apc_paid":{"value":2290,"currency":"EUR","value_usd":2890},"fwci":4.7869,"has_fulltext":true,"cited_by_count":6,"citation_normalized_percentile":{"value":0.9486633,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":99},"biblio":{"volume":"23","issue":"4","first_page":"925","last_page":"952"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9961000084877014,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9961000084877014,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9926000237464905,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10679","display_name":"Service-Oriented Architecture and Web Services","score":0.9918000102043152,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8424457311630249},{"id":"https://openalex.org/keywords/ontology","display_name":"Ontology","score":0.6818693280220032},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.5486411452293396},{"id":"https://openalex.org/keywords/knowledge-management","display_name":"Knowledge management","score":0.3499426543712616},{"id":"https://openalex.org/keywords/epistemology","display_name":"Epistemology","score":0.10919180512428284}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8424457311630249},{"id":"https://openalex.org/C25810664","wikidata":"https://www.wikidata.org/wiki/Q44325","display_name":"Ontology","level":2,"score":0.6818693280220032},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.5486411452293396},{"id":"https://openalex.org/C56739046","wikidata":"https://www.wikidata.org/wiki/Q192060","display_name":"Knowledge management","level":1,"score":0.3499426543712616},{"id":"https://openalex.org/C111472728","wikidata":"https://www.wikidata.org/wiki/Q9471","display_name":"Epistemology","level":1,"score":0.10919180512428284},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1007/s10270-024-01149-1","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s10270-024-01149-1","pdf_url":"https://link.springer.com/content/pdf/10.1007/s10270-024-01149-1.pdf","source":{"id":"https://openalex.org/S64245694","display_name":"Software & Systems Modeling","issn_l":"1619-1366","issn":["1619-1366","1619-1374"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Software and Systems Modeling","raw_type":"journal-article"},{"id":"pmh:oai:ris.utwente.nl:openaire/04235efb-b56d-4cf0-944c-5df6ddd0078a","is_oa":true,"landing_page_url":"https://research.utwente.nl/en/publications/04235efb-b56d-4cf0-944c-5df6ddd0078a","pdf_url":"https://ris.utwente.nl/ws/files/358191509/s10270-024-01149-1.pdf","source":{"id":"https://openalex.org/S4406922991","display_name":"University of Twente Research Information","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Oliveira, \u00cd, Sales, T P, Almeida, J P A, Baratella, R, Fumagalli, M & Guizzardi, G 2024, 'Ontology-based security modeling in ArchiMate', Software and systems modeling, vol. 23, no. 4, pp. 925-952. https://doi.org/10.1007/s10270-024-01149-1","raw_type":"info:eu-repo/semantics/publishedVersion"},{"id":"pmh:oai:unibz.it:11322427020001241","is_oa":true,"landing_page_url":"https://bia.unibz.it/esploro/outputs/journalArticle/Ontology-based-security-modeling-in-ArchiMate/991006840393701241","pdf_url":null,"source":{"id":"https://openalex.org/S4210197018","display_name":"View","issn_l":"2688-268X","issn":["2688-268X","2688-3988"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310320595","host_organization_name":"Wiley","host_organization_lineage":["https://openalex.org/P4310320595"],"host_organization_lineage_names":["Wiley"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Article"}],"best_oa_location":{"id":"doi:10.1007/s10270-024-01149-1","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s10270-024-01149-1","pdf_url":"https://link.springer.com/content/pdf/10.1007/s10270-024-01149-1.pdf","source":{"id":"https://openalex.org/S64245694","display_name":"Software & Systems Modeling","issn_l":"1619-1366","issn":["1619-1366","1619-1374"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Software and Systems Modeling","raw_type":"journal-article"},"sustainable_development_goals":[{"score":0.5600000023841858,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[{"id":"https://openalex.org/F4320307894","display_name":"Accenture","ror":"https://ror.org/013g16z83"}],"has_content":{"pdf":true,"grobid_xml":false},"content_urls":{"pdf":"https://content.openalex.org/works/W4391881141.pdf"},"referenced_works_count":16,"referenced_works":["https://openalex.org/W224398829","https://openalex.org/W1547408571","https://openalex.org/W1602395689","https://openalex.org/W1853239675","https://openalex.org/W2042708274","https://openalex.org/W2108234081","https://openalex.org/W2149756969","https://openalex.org/W2515562531","https://openalex.org/W2967584873","https://openalex.org/W2989783909","https://openalex.org/W3094414364","https://openalex.org/W4245673212","https://openalex.org/W4247808167","https://openalex.org/W4285152686","https://openalex.org/W4296345985","https://openalex.org/W4312790328"],"related_works":["https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W2358668433","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W2382290278","https://openalex.org/W2478288626","https://openalex.org/W2350741829","https://openalex.org/W2530322880","https://openalex.org/W1596801655"],"abstract_inverted_index":{"Abstract":[0],"Enterprise":[1],"Risk":[2,37,98],"Management":[3],"involves":[4],"the":[5,16,20,36,58,84,88,92,111,118,128,139,154,158,170,173,181,190,200,204,216,227,235,247,251,258,261,332],"process":[6],"of":[7,42,47,60,87,95,106,120,124,127,157,172,184,199,203,208,215,234,246,250,253,260,264,272,275,287,290,297,302],"identification,":[8],"evaluation,":[9,303],"treatment,":[10],"and":[11,28,38,55,62,78,97,180,277],"communication":[12],"regarding":[13,219],"risks":[14],"throughout":[15],"enterprise.":[17],"To":[18],"support":[19],"tasks":[21],"associated":[22],"with":[23,169,195,325],"this":[24,48,104,209],"process,":[25],"several":[26],"frameworks":[27],"modeling":[29,281],"languages":[30],"have":[31,80],"been":[32,81],"proposed,":[33],"such":[34,146],"as":[35,73],"Security":[39,177],"Overlay":[40],"(RSO)":[41],"ArchiMate.":[43],"An":[44],"ontological":[45,122,143,182,197,232,262],"investigation":[46],"artifact":[49],"would":[50,116],"reveal":[51],"its":[52,294],"adequacy,":[53],"capabilities,":[54],"limitations":[56,240],"w.r.t.":[57],"domain":[59],"risk":[61,85,311],"security.":[63,298],"Based":[64],"on":[65],"that,":[66],"a":[67,74,223,269,300,326],"language":[68,218],"redesign":[69,79,153,214,271,291],"can":[70,132,151,309],"be":[71,117],"proposed":[72],"refinement.":[75],"Such":[76],"analysis":[77,123,148,198,233],"executed":[82],"for":[83,176],"elements":[86,126,156,274],"RSO":[89,140,159,236],"grounded":[90],"in":[91,138,161,255,266],"Common":[93],"Ontology":[94,175],"Value":[96],".":[99],"The":[100,206],"next":[101],"step":[102],"along":[103],"line":[105],"research":[107,113],"is":[108,149,211],"to":[109,163,293,315],"address":[110,189],"following":[112,228],"problems:":[114],"What":[115],"outcome":[119,207],"an":[121,142,147,165,196,212,231],"security-related":[125,201],"RSO?":[129],"That":[130],"is,":[131],"we":[133,152,188,225,304,323],"identify":[134],"other":[135],"semantic":[136],"deficiencies":[137],"through":[141],"analysis?":[144],"Once":[145],"provided,":[150],"security":[155,220,242,256,273,280],"accordingly,":[160],"order":[162],"produce":[164],"improved":[166],"artifact?":[167],"Here,":[168],"aid":[171],"Reference":[174],"Engineering":[178],"(ROSE)":[179],"theory":[183,263],"prevention":[185,254,265],"behind":[186],"it,":[187],"remaining":[191],"gap":[192],"by":[193],"proceeding":[194],"constructs":[202],"RSO.":[205],"assessment":[210],"ontology-based":[213,279],"ArchiMate":[217],"modeling.":[221],"In":[222],"nutshell,":[224],"report":[226],"contributions:":[229],"(1)":[230],"that":[237,283,306],"identifies":[238],"six":[239],"concerning":[241],"modeling;":[243],"(2)":[244],"because":[245],"key":[248],"role":[249],"notion":[252],"modeling,":[257],"introduction":[259],"ArchiMate;":[267,276],"(3)":[268],"well-founded":[270],"(4)":[278],"patterns":[282],"are":[284],"logical":[285],"consequences":[286],"our":[288,307],"proposal":[289,308],"due":[292],"underlying":[295],"ontology":[296],"As":[299],"form":[301],"show":[305],"describe":[310],"treatment":[312],"options,":[313],"according":[314],"ISO":[316],"31000.":[317],"Finally,":[318],"besides":[319],"presenting":[320],"multiple":[321],"examples,":[322],"proceed":[324],"real-world":[327],"illustrative":[328],"application":[329],"taken":[330],"from":[331],"cybersecurity":[333],"domain.":[334]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":2}],"updated_date":"2026-03-18T14:38:29.013473","created_date":"2025-10-10T00:00:00"}
