Skip to main content

OntoCyrene: Towards Ontology-Enhanced Asset Modelling for Supply Chains in the Context of Cyber Security

  • Conference paper
  • First Online:
Computer Security. ESORICS 2022 International Workshops (ESORICS 2022)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 13785))

Included in the following conference series:

Abstract

A Supply chain in the era of the Internet of Industrial Things faces new challenges in terms of modelling. The challenges stem from a number of characteristics like scalability, dependency and dynamism. In this paper, we introduce an ontology-enhanced method for modelling assets and their dependency in the context of supply chains. This method enables us to infer new insights from the domain. It also provides a dynamic knowledge representation and reasoning by capturing all aspects of supply chains from three different perspectives including business, asset, and sector. The results show that the proposed method can address the challenges by utilizing ontology and synching three relevant perspectives. Moreover, the developed ontology (OntoCyrene) is rich enough to bring light to the dark angles of the modelled scenarios. The theme chosen for this work is cyber security and we used real-world scenarios derived from the Cyrene (Cyrene EU H2020 Project is available at: https://www.cyrene.eu.) project to populate and evaluate the ontology.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 79.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 99.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    https://www.omg.org/spec/BPMN/2.0.

  2. 2.

    The Rule Mark-up Initiative can be accessible at: www.ruleml.org.

  3. 3.

    Semantic web Rule Language accessible at: www.w3.org/Submission/SWRL.

  4. 4.

    SPARQL is accessible at: https://www.w3.org/TR/rdf-sparql-query/.

  5. 5.

    Available at: https://www.protege.stanford.edu

  6. 6.

    Centro Ricerche Fiat (CRF) is one of the main private research centre in Italy. Available at: https://www.crf.it/

References

  1. Annane, A., Aussenac-Gilles, N., Kamel, M.: BBO: BPMN 2.0 based ontology for business process representation. In: 20th European Conference on Knowledge Management (2019)

    Google Scholar 

  2. Rocha, A.P., Steels, L., van den Herik, J. (eds.): ICAART 2020. LNCS (LNAI), vol. 12613. Springer, Cham (2021). https://doi.org/10.1007/978-3-030-71158-0

    Book  Google Scholar 

  3. Hinkelmann, K., Fanesi, D., Cacciagrano, D.: semantic business process representation to enhance the degree of BPM mechanization - an ontology (2015)

    Google Scholar 

  4. Sanfilippo, E., Borgo, S., Masolo, C.: Events and activities: is there an ontology behind BPMN? Frontiers in AI and its applications (2014)

    Google Scholar 

  5. Adamo, G., Borgo, S., Di Francescomarino, C., Ghidini C., Guarino, N., Sanfilippo, E.M.: Business processes and their participants: an ontological perspective. Lecture Notes in Computer Science, vol 10640 (2017)

    Google Scholar 

  6. Doynikova, E., Fedorchenko, A., Kotenko, I.: Ontology of metrics for cyber security assessment. In: ARES 2019: Proceedings of the 14th International Conference on Availability, Reliability and Security (2019)

    Google Scholar 

  7. Alfaify, Y.: Ontology development methodology, a systematic review and case study. In: International Conference on Computing and Information Technology (ICCIT), (2022)

    Google Scholar 

  8. Grüninger, M., Fox, M.S.: Methodology for the design and evaluation of ontologies. In: IJCIA, Montreal (1995)

    Google Scholar 

  9. Uschold, M., King, M.: Towards a metho dology for building ontologies. In: IJCAI (1995)

    Google Scholar 

  10. Fernández-López, M., Juristo, N.: Methontology: from ontological art towards ontological engineering (1997)

    Google Scholar 

  11. Noy, N.F., McGuinness, D.L.: Ontology development 101: a guide to creating your first ontology. Stanford University, Stanford (2000)

    Google Scholar 

  12. Staab, S., Studer, R., Schnurr, H.-P., Sure, Y.: Knowledge processes and ontologies. IEEE Intelligent Systems 16(1), 26–34 (2001)

    Article  Google Scholar 

  13. Gómez-Pérez, A., Rojas-Amaya, M.: Ontological reengineering for reuse. In: Proceeding of the 11th European Workshop on Knowledge Acquisition, Modeling and Management (1999)

    Google Scholar 

  14. Groninger, M., Fox, M.S.: The role of competency questions in enterprise engineering. In: Benchmarking—Theory and Practice (1995)

    Google Scholar 

  15. Tartir, S., Arpinar, I.B., Sheth, A.P.: Ontological evaluation and validation. In: Theory and Applications of Ontology: Computer Applications (2010)

    Google Scholar 

  16. Sicilia, M.A., Rodrígueza, D., García-Barriocanal, E., Sánchez-Alonso, S.: Empirical findings on ontology metrics. Expert Syst. Appl. 39(8), 6706–6711 (2012)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mohammad Heydari .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Heydari, M., Mouratidis, H., Tafreshi, V.H.F. (2023). OntoCyrene: Towards Ontology-Enhanced Asset Modelling for Supply Chains in the Context of Cyber Security. In: Katsikas, S., et al. Computer Security. ESORICS 2022 International Workshops. ESORICS 2022. Lecture Notes in Computer Science, vol 13785. Springer, Cham. https://doi.org/10.1007/978-3-031-25460-4_9

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-25460-4_9

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-25459-8

  • Online ISBN: 978-3-031-25460-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics