<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>An integrative security modelling environment ⋆</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Avi Shaked</string-name>
          <email>avi.shaked@cs.ox.ac.uk</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>University of Oxford</institution>
          ,
          <addr-line>Oxford OX1 3QD</addr-line>
          ,
          <country country="UK">UK</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>1942</year>
      </pub-date>
      <fpage>0000</fpage>
      <lpage>0001</lpage>
      <abstract>
        <p>Through reflection on two published articles and our ongoing work, we provide a dedicated reflection which is uniquely tailored for the Semantic Shields workshop. We focus on: (a) the effort to unveil the domain ontology. Specifically, we emphasise the importance of functionality-driven ontology discovery and demonstrate different tactics for ontology elicitation and extraction. By reflecting on the two published papers as well as additional scenarios for TRADES, we demonstrate how a domain ontology can gradually unfold in tandem with our understanding of the domain within specific contexts and for addressing specific challenges.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;Security modelling</kwd>
        <kwd>domain ontology</kwd>
        <kwd>metamodelling 1</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>(c) the design of the security modelling environment’s user experience (UX). Specifically,
we emphasise the importance of providing users an interface that is natural to them, for
viewing and for constructing the models.</p>
    </sec>
    <sec id="sec-2">
      <title>2. Abstracts of published articles</title>
      <p>
        Abstract of [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]: addressing cybersecurity aspects while designing systems is challenging. As our
systems increasingly rely on digital technology to perform, security and resilience aspects need
to be considered during the system design process. However, the integration of pertinent
information into the systems engineering lifecycle is not trivial, as it is characterized by
following verbose guidelines and documentation, and has no practical, model-based
methodology to support threat-aware design of systems. In this article, we address this gap by
presenting an integrative, model-based methodology to support the design and assessment of
systems' security aspects. We discuss the methodology's design, specifically with respect to
system development scenarios, and detail industrial case studies demonstrating the applicability
of the methodology.
      </p>
      <p>
        Abstract of [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ]: security threat and risk assessment of systems requires the integrated use of
information from multiple knowledge bases. Such use is typically carried out ad-hoc by security
experts in an unstructured manner. Also, this ad-hoc use of information often lacks foundations
that allow for rigorous, disciplined applications of policy enforcement and the establishment of
a well-integrated body of knowledge. This hinders organisational learning as well as the
maturation of the threat modelling discipline. In this article, we uncover a newly developed
extension of a state-of-the-art modelling tool that allows users to integrate and curate
securityrelated information from multiple knowledge bases. Specifically, we provide catalogues of
threats and security controls based on information from CAPEC, ATT&amp;CK, and NIST
SP80053. We demonstrate the ability to curate security information using the designed solution. We
highlight the contribution to improving the communication of security information, including
the systematic mapping between user-defined security guidance and information derived from
knowledge bases. The solution is open source and relies on model-to-model transformations
and extendable threat and security control catalogues. Accordingly, the solution allows
prospective users to adapt the modelling environment to their needs as well as keep it current
with respect to evolving knowledge bases.
      </p>
    </sec>
    <sec id="sec-3">
      <title>Acknowledgements</title>
      <p>This research was funded by Innovate UK, grant number 75243.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <surname>Shaked</surname>
          </string-name>
          , Avi. ”
          <article-title>A model-based methodology to support systems security design and assessment</article-title>
          .
          <source>” Journal of Industrial Information Integration</source>
          <volume>33</volume>
          (
          <year>2023</year>
          ):
          <fpage>100465</fpage>
          . https://doi.org/10.1016/j.jii.
          <year>2023</year>
          .
          <volume>100465</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <surname>Shaked</surname>
          </string-name>
          , Avi. ”
          <article-title>Facilitating the Integrative Use of Security Knowledge Bases within a Modelling Environment</article-title>
          .
          <source>” Journal of Cybersecurity and Privacy</source>
          <volume>4</volume>
          (
          <year>2024</year>
          ). https://doi.org/10.3390/jcp4020013.
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>