<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>A meta-ontological approach to securing the semantic web data</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Giampaolo Bella</string-name>
          <email>giampaolo.bella@unict.it</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Domenico Cantone</string-name>
          <email>domenico.cantone@unict.it</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Gianpietro Castiglione</string-name>
          <email>gianpietro.castiglione@phd.unict.it</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Marianna Nicolosi-Asmundo</string-name>
          <email>marianna.nicolosiasmundo@unict.it</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Daniele Francesco Santamaria</string-name>
          <email>daniele.santamaria@unict.it</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Department of Mathematics and Computer Science, University of Catania</institution>
          ,
          <addr-line>Viale Andrea Doria 6 - 95125 - Catania</addr-line>
          ,
          <country country="IT">Italy</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>The Semantic Web is a family of technologies that in the last decade increased its diffusion outside the academia, especially in business and industry contexts. As a natural consequence, the related security issues deriving from the adoption of such technologies has become urgent. However, even though the Semantic Web technological stack provides some layers to secure semantic-based applications, the proposed layers are only defined conceptually. Hence, providing to developers new approaches for defining security policies for accessing semantic data in a general and clear way becomes necessary, as demanded by the FAIR (Future Artificial Intelligence Research) principles. The work presented in this paper aims to preliminarily anticipate and define a general and verticalisable ontological meta-model for securing semantic data, and specifically for implementing security properties and policies. Such meta-model can be leveraged by knowledge engineers to establish at low level how software and users should consume data, in order to lighten the applications from the management of security risks.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;RDF</kwd>
        <kwd>Semantic Web</kwd>
        <kwd>Ontologies</kwd>
        <kwd>Security</kwd>
        <kwd>OWL</kwd>
        <kwd>SWRL</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>
        The Semantic Web is a disruptive technology with a huge impact on industry, thanks to its adoption in
Artificial Intelligence (AI) [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. The substantial expansion of the Semantic Web is driven by the innovative
approach of web ontologies in defining machine-intelligible, interconnected, and shared data. This data
can be feed to specific automatic theorem provers to infer new knowledge. Despite being an urgent issue
given its adoption in AI, data security in the Semantic Web has never received adequate attention. The
World Wide Web Consortium (W3C) proposed three security layers (Trust, Signature, and Encryption)
for the infrastructure of Semantic Web technologies. However, W3C has never provided clear guidelines
on their implementation. As a result, developers of the Semantic Web have adopted ad hoc strategies
for securing data, which are neither shareable nor general. This has led to the creation of back-end
software solutions that act as middle-ware for data access and modification. While these techniques may
be effective, they lack a general and reusable approach, resulting in a multitude of solutions, each with
its own set of advantages and disadvantages. Moreover, knowledge engineers should share the security
properties and policies adopted on their knowledge base, with other developers to build applications with
a higher level of granularity in the management of knowledge graphs. For instance, consider a knowledge
base describing citizens’ daily life, including topics such as car insurance, healthcare, and taxes. It would
be particularly meaningful if users could control how data are shared among authorities, such as allowing
only selected insurance companies access to car information. Developing applications with such a level
of control can turn into a nightmare. The approach proposed in this work-in-progress, once consolidated,
may enable knowledge engineers to make the pertinent decisions regarding the applications’ security
by defining data management policies at the ontologies’ design level. The compliance demonstration
of security policies can be achieved at ontological level via SPARQL queries, thus simplifying the
engineering and the subsequent development of the applications. As a consequence, the risk of systematic
errors or bugs derived from the implementation of security policies in Semantic Web application are
reduced. Moreover, the approach is sufficiently general to model and enforce security properties in
database management systems of different types, such as relational and NoSQL-based ones.
      </p>
      <p>
        In the context of relational databases, security policies are ensured at the back-end level by a family of
strategies known as (Multi-)Tenancy[
        <xref ref-type="bibr" rid="ref2">2</xref>
        ], aiming to group portions of data based on their adherence to
the same set of security policies. Considering this, the main goal of our work is to adapt the concept of
data-tenancy at a deeper level by defining security policies on ontological data. To do so, an approach
could consist in defining ontologies that describe who and how can manage ontological data, hence we
need ontologies describing application domains that are meta-ontologies. The proposed approach is
oriented towards designing meta-ontologies to define and implement security policies in such a way as
knowledge engineers can define how data is consumed with a higher level of abstraction.
      </p>
      <p>We propose MOSS - A Meta-Ontology for Securing the Semantic Web, a meta-ontology that aims
at applying standard approaches of data tenancy from relational databases to the realm of the Semantic
Web. This step is done through the definition and implementation of meta-models for web ontologies,
characterising security policies for the semantic data. The goal is to translate semantic data tenancy
strategies at the ontological level, going beyond the application back-end layer, thus allowing knowledge
engineers to define data security policies during the design phase. The policies defined by data engineers
are subsequently enforced by a semantic database management system (DBMS).Therefore, data tenancy,
especially at the ontological level, represents a further step towards the openness and automation of
security strategies, as they can be encoded through open and understandable formats for software agents,
specifically those of the Semantic Web.</p>
      <p>In the proposed approach, semantic data tenancy will be achieved by identifying the most relevant
security properties for accessing and modifying data, and by encoding the identified properties into an
ontological meta-model, constructed both by leveraging a combination of OWL annotations and axioms.</p>
    </sec>
    <sec id="sec-2">
      <title>2. Related Work</title>
      <p>
        The World Wide Web Consortium (W3C), namely the agency regulating Web standards, addressed
only superficially the problem of securing the architecture [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ], although it is evident, especially in what
concerns the definition of privacy/security properties and policies [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ]. The work by Thuraisingham [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ]
provided a general overview of the approaches on securing the Semantic Web. Through an analysis of
various current policy languages, the work by Olmedilla et al. [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ] offers an introduction to policy-based
security and privacy protection, demonstrating how these languages can be applied to various applications.
Halpin [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ] described semantic attackers that target inference processes and their alternatives: these include
the use of contemporary cryptography, which thwarts attacks by means of Transport Layer Security
(TLS), and the ways in which W3C standards like the Internet Engineering Task Force (IETF) OAuth and
W3C Web Cryptography Application Programming Interface (API) can address the use-cases required by
the Semantic Web.
      </p>
      <p>
        Some other works moved towards the principles of security in web ontologies. Denker et al. [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ]
summarised an ontological approach to enhancing the Semantic Web with security, providing an ontological
description of some security measures. Kirrane et al. [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ] noticed that Semantic Web technologies are
not being properly used in the context of security. Castiglione et al. [
        <xref ref-type="bibr" rid="ref10 ref11 ref12">10, 11, 12</xref>
        ] presented an ontology
mapping (automated and manual) for the legal language of security, particularly focusing on the European
Network and Information Security (NIS) 2 Directive. Kagal et al. [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ] presented a policy language
that allows properties and policies to be described in terms of deontic concepts and models speech acts.
Finally, Lima et al. [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ] investigated the adoption of the Semantic Web for securing health data.
      </p>
    </sec>
    <sec id="sec-3">
      <title>3. The MOSS approach</title>
      <p>MOSS aims at realising Semantic Web Data tenancy through the following steps.</p>
      <p>(a) Analyse the most prominent security properties and policies for accessing and modifying data, for
the subsequent ontological representation. The goal is to identify the security terminology and the
related semantic relationships, particularly the ones involving the terms adopted in the context of
securing web data.
(b) Encode the definitions of the identified security properties and policies into ontological
metamodels. The goal is to design the meta-models for security on the Semantic Web by way of a
suitable terminology.
(c) Implement the designed ontological meta-models through the Semantic Web standard languages.</p>
      <p>The goal is to build from the designed models effective OWL ontologies to be adopted.</p>
      <p>
        The purpose of building the MOSS ontology is to provide a set of semantic models to secure ontological
data (e.g., a crucial task for preventing the risks caused by data breaches) by following the security
properties and policies the knowledge engineers encode. Security properties and policies should be
designed at an ontological level and guaranteed by the overlying DBMS. This feature enables a general,
yet practical approach that simplifies the development of Semantic Web applications while ensuring
security and scalability. Thanks to (a) we ensure to adopt a standard terminology from the state of the art
that guarantees the meta-ontology results are compliant with the standard security terms; the goal of (b)
is to design the meta-models for the security properties and policies leveraging the standard language
pointed out in (a). Finally, with (c) we encode the developed meta-model by leveraging OWL annotations.
Even though RDF [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ] can be used to annotate OWL ontologies by leveraging reification, RDF reasoning
capabilities are extremely limited: for instance, SWRL [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ] does not support reification, hence it cannot
be adopted for this purpose. For this reason, it is feasible to foresee a suitable extension of SWRL to
include annotations both for RDF entities and, more conveniently, for RDF statements. As an alternative
to SWRL extension, it is feasible to adopt SPARQL Construct query form to generalise the application of
security policy: such solution is however more cumbersome than defining suitable SWRL rules.
      </p>
      <p>
        Once developers have defined the ontology specifying the data manipulation properties and policies,
these can be uploaded to the semantic DBMS (in our case, OpenLink Virtuoso [
        <xref ref-type="bibr" rid="ref17">17</xref>
        ]) as illustrated in
Figure 1(a). Security properties and policies are retrieved and uploaded into specific graphs by the DBMS.
They are ultimately ensured by the DBMS, which is purposefully extended either through ad hoc plugins
or Virtuoso/PL stored procedures (see Figure 1(b)). These extensions are dynamically applied at query
time before the results are returned to users. The development of these tools is one of the areas for
future work. Data are hence compliant with the ontology security properties and policies defined by the
knowledge engineers.
      </p>
      <p>
        From some of the most authoritative resources in the security field [
        <xref ref-type="bibr" rid="ref18 ref19 ref20">18, 19, 20</xref>
        ], we extract at least the
following security properties and policies:
      </p>
      <p>P1. Confidentiality . Confidentiality aims to preserve authorised restrictions on information access and
disclosure, including the protection of personal privacy and proprietary information. Therefore, a
loss of confidentiality results in the unauthorised disclosure of information.</p>
      <p>P2. Access Control. Access control implements a security policy that specifies who or what (e.g., in
the case of a process) is allowed to access each specific system resource and the type of access that
is permitted in each instance.</p>
      <p>P3. Authentication. Authentication refers to the property of being genuine, verifiable, and trustworthy.</p>
      <p>It involves having confidence in the validity of a transmission, message, or its originator. This
includes to verify that users are who they claim to be and that every input received by the system
originates from a trusted source.</p>
      <p>P4. Authorisation. Authorisation concerns the granting of a right or permission to an entity to access a
system resource. This function determines who is trusted for a given purpose.
Define domain</p>
      <p>ontology
Define policies in
meta-ontology
Upload data to
triplestore</p>
      <p>Retrieve policies
from meta-ontology
Store policies from
meta-ontology
Store domain</p>
      <p>ontology
(a) Defining security properties and policies in</p>
      <p>MOSS</p>
      <p>Perform query</p>
      <p>Verify compliancy of
queried data</p>
      <p>Are policies no
yes defined?
Apply policies to</p>
      <p>data
Accept Data</p>
      <p>Return compliant data
(b) Ensuring MOSS’s security properties and
policies at DBMS level</p>
      <p>P5. Privacy. Privacy assures that individuals control or influence what information related to them
may be collected and stored and by whom and to whom that information may be disclosed.
P6. Anonymity. Anonymity enables users to conceal or alter their identifying information, providing
privacy and protection for their identity. However, it also presents challenges in holding them
accountable for their actions and statements.</p>
      <p>P7. Availability. Availability ensures timely and reliable access to and use of information. Therefore, a
loss of availability is the disruption of access to or use of information or an information system.
P8. Integrity. Integrity involves the guarding against improper information modification or destruction,
including ensuring information non-repudiation and authenticity. Therefore, a loss of integrity is
the unauthorised modification or destruction of information.</p>
      <p>We can assume that P7 and P8 are guaranteed by DBMSs. The goal is to encode P1-P6 into ontological
models to be adopted for securing semantic data through properties and policies defined by knowledge
engineers. As an example1, we can consider the subset of data regarding a physical person, namely user_1
(see Figure 2), organised in three main tenancies. The first tenancy regards the medical information
about the person, including the medical history, whose access should be limited to the selected medical
insurance company. A second tenancy involves the car insurance information, limited to the selected car
insurance company selected by the person. A third tenancy concerns public information, such as the car
model and related plate number. Other information, such as the user’s personal data, can be anonymised
and limited to the owner user.</p>
      <p>To realise the mentioned tenancies, we first model the user’s data domain into OWL statements, then
the security properties and policies, and finally we connect them through specific OWL annotations.
For instance, concerning the considered case study in Figure 2, we can introduce the following OWL
statements describing a subset of user’s data:</p>
      <sec id="sec-3-1">
        <title>O1: user_1 hasLastName Doe.</title>
      </sec>
      <sec id="sec-3-2">
        <title>O2: user_1 hasMedicalInsuranceCompany med_company.</title>
      </sec>
      <sec id="sec-3-3">
        <title>O3: user_1 hasMedicalHistory user_1MH.</title>
      </sec>
      <sec id="sec-3-4">
        <title>O4: user_1MH hasMedicalCase xxyyzz_t.</title>
        <p>In statement O1, the user is identified by his/her last name; in O2, by a medical insurance company;
and in O3, by his/her medical history, which contains the specific case outlined in O4.
1The code of the example can be found in https://github.com/dfsantamaria/MOSS.git
medical history
registration
vehicle
Medical Insurance Company
user_1
id
name
surname
insurance_1
insurance_
company_1</p>
        <p>P
u
plate number l
b
i
c
sinister_1
sinister_2
Anonymous
Car Insurance Company</p>
        <p>We can now combine the defined statements within OWL annotations, for modelling the following
security policies (the remaining policies can be modelled in an analogous way):</p>
      </sec>
      <sec id="sec-3-5">
        <title>S1: O1 moss:securityPolicy p1. p1 rdf:type moss:Anonymity.</title>
      </sec>
      <sec id="sec-3-6">
        <title>S2: O1 moss:securityPolicy p2. p2 rdf:type moss:Authorisation; moss:authorised :user_1.</title>
        <p>In the previous OWL annotations, securityPolicy is an annotation property, Anonymity and Authorisation
are OWL classes, and p1, p2 are OWL named individuals. Figure 3 shows through the editor Protégé [21]
the definition of the security policies concerning O1.</p>
        <p>The statements in S1 guarantee the anonymity of statement O1, while those in S2 grant the access only
to user_1.</p>
        <p>SPARQL can be now exploited to generalise the application of security policies, for instance, limiting
to medical insurance companies the access to any subject of the object-property hasMedicalCase. In this
case, the construct query, which ensures that any medical insurance company is allowed to access every
medical cases, is the following:</p>
      </sec>
      <sec id="sec-3-7">
        <title>CONSTRUCT { ?p :authorized ?m } WHERE { ?x owl:annotatedProperty :hasMedicalCase. ?x securityPolicy ?p. ?p a :Anonymity. ?m a :InsuranceCompany. }</title>
        <p>However, it is more convenient to adopt SWRL to define this kind of rules, since it is tight integrated
with OWL in such a way as to allow semantic reasoners to conjoin their inference capabilities.
Nevertheless, a suitable extension of SWRL admitting RDF statements is required and it is one of the future
extension concerning the MOSS approach. Another advantage of utilising reified annotations is the
ability to use classes as objects of object-properties modelling security properties (e.g., authorized),
thereby extending the associated security policy to all instances of these classes.</p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>4. Conclusions and future work</title>
      <p>Despite the relevance of Semantic Web technologies in industry, securing data in such context is still an
open issue. Whenever Semantic Web applications are secured, this happens at back-end level by way
of ad hoc measures. On the contrary, security properties and policies should be defined at ontological
level by knowledge engineers, and applied by the overlying DBMS through general mechanisms; this
implies that front-end and back-end developers are relieved from the security concerns, thus delivering
more robust and reliable semantic applications. A Meta-Ontology for Securing the Semantic Web, in
short MOSS, moves towards achieving such goal. This is achieved by defining security policies at the
ontological level and applying them to the ontologies developed by knowledge engineers, who can now
specify how data should be accessed and utilized.</p>
      <p>Future goals are clearly stated. We shall finalise the ontology by modelling all the defined security
properties. Next, we need an extension of SWRL that admits RDF statements. Subsequently, we shall
provide OpenLink Virtuoso with all the means to apply the ontological policies defined by MOSS.
Moreover, MOSS will be extended so as to be included in the OASIS ontology [22, 23, 24, 25], thus
bringing MOSS’s approach security data in multi-agent systems. MOSS will be also applied to the case
study concerning ontologies for historical buildings [26] and for archaeological findings cataloguing [ 27].
Finally, representing MOSS through the decidable fragments of set-theory as in [28, 29, 30] is one of our
future commitments.</p>
    </sec>
    <sec id="sec-5">
      <title>Acknowledgments</title>
      <p>Giampaolo Bella acknowledges financial support from PNRR MUR project PE0000013-FAIR.</p>
      <p>Domenico Cantone acknowledges partial support from project “STORAGE–Università degli Studi
di Catania, Piano della Ricerca 2020/2022, Linea di intervento 2” and from the “Naples Dante Project”
funded by the MUR Progetti di Ricerca di Rilevante Interesse Nazionale (PRIN) Bando 2022, grant
2022ZJ4N9E. Domenico Cantone is member of the Gruppo Nazionale Calcolo Scientifico-Istituto
Nazionale di Alta Matematica (GNCS-INdAM).</p>
      <p>Gianpietro Castiglione acknowledges a studentship by Intrapresa S.r.l. and Italian “Ministero
dell’Università e della Ricerca” (D.M. n. 352/2022).</p>
      <p>Marianna Nicolosi Asmundo acknowledges partial support from project “STORAGE–Università
degli Studi di Catania, Piano della Ricerca 2020/2022, Linea di intervento 2”, from the “Naples Dante
Project” funded by the MUR Progetti di Ricerca di Rilevante Interesse Nazionale (PRIN) Bando 2022,
grant 2022ZJ4N9E, and from the “Contact-induced change and sociolinguistics: an experimental study
on the Gallo-Italic dialects of Sicily” by the MUR PRIN Piano Nazionale di Ripresa e Resilienza (PNRR),
Bando 2022, grant P2022YWS8T. Marianna Nicolosi Asmundo is member of the Gruppo Nazionale
Calcolo Scientifico-Istituto Nazionale di Alta Matematica (GNCS-INdAM).</p>
      <p>Daniele Francesco Santamaria acknowledges the Research Program PIAno di inCEntivi per la
Ricerca di Ateneo 2020/2022 — Linea di Intervento 3 “Starting Grant” - University of Catania.
[21] M. A. Musen, The protégé project: a look back and a look forward, AI Matters 1 (2015) 4–12.</p>
      <p>URL: https://doi.org/10.1145/2757001.2757003. doi:10.1145/2757001.2757003.
[22] G. Bella, D. Cantone, M. Nicolosi Asmundo, D. F. Santamaria, Towards a semantic blockchain: A
behaviouristic approach to modelling ethereum, Applied Ontology 19 (2024) 143 – 180. doi:10.
3233/AO-230010.
[23] G. Bella, G. Castiglione, D. F. Santamaria, A behaviouristic approach to representing processes
and procedures in the OASIS 2 ontology, in: Proceedings of the Joint Ontology Workshops 2023,
Episode IX: The Quebec Summer of Ontology, Sherbrooke, Québec, Canada, July 19–20, 2023,
volume 3637, CEUR Workshop Proceedings, 2023.
[24] G. Bella, D. Cantone, M. Nicolosi Asmundo, D. F. Santamaria, The ontology for agents, systems
and integration of services: recent advancements of OASIS, in: 23rd Workshop From Objects to
Agents, WOA 2022, Genova 1–3 September 2022, volume 3261, CEUR-WS, 2022, pp. 176 – 193.
[25] D. Cantone, C. F. Longo, M. Nicolosi-Asmundo, D. F. Santamaria, C. Santoro, Towards an
ontologybased framework for a behavior-oriented integration of the iot, in: 20th Workshop From Objects to
Agents, WOA 2019, Parma 26–28 June 2019, volume 2404, CEUR-WS, 2019, pp. 119 – 126.
[26] C. Cantale, D. Cantone, M. Nicolosi-Asmundo, D. F. Santamaria, Distant reading through ontologies:
The case study of Catania’s benedictines monastery, JLIS.it 8 (2017) 205 – 219. doi:10.4403/
jlis.it-12342.
[27] D. Cantone, M. Nicolosi-Asmundo, D. F. Santamaria, S. Cristofaro, D. Spampinato, F. Prado, An
EPIDOC ontological perspective: The epigraphs of the castello ursino civic museum of Catania via
CIDOC CRM, Archeologia e Calcolatori 30 (2019) 139 – 157. doi:10.19282/ac.30.2019.10.
[28] D. Cantone, M. Nicolosi-Asmundo, D. F. Santamaria, A set-theoretic approach to reasoning services
for the description logic D L 4D,× , Fundamenta Informaticae 176 (2020) 349 – 384. doi:10.3233/
FI-2020-1977.
[29] D. Cantone, M. Nicolosi-Asmundo, D. F. Santamaria, A set-based reasoner for the description logic
dl4,xd, in: 3rd International Workshop on Sets and Tools, SETS 2018, Southamptom, 5 June 2018,
volume 2199, 2018, pp. 52 – 66.
[30] D. Cantone, M. Nicolosi-Asmundo, D. F. Santamaria, Conjunctive query answering via a fragment
of set theory, in: 17th Italian Conference on Theoretical Computer Science, ICTCS 2016, Lecce,
7–9 September 2016, volume 1720, CEUR-WS, 2016, pp. 23–35.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>A.</given-names>
            <surname>Breit</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Waltersdorfer</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F. J.</given-names>
            <surname>Ekaputra</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Sabou</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Ekelhart</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Iana</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Paulheim</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Portisch</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Revenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. T.</given-names>
            <surname>Teije</surname>
          </string-name>
          ,
          <string-name>
            <surname>F. Van Harmelen,</surname>
          </string-name>
          <article-title>Combining machine learning and semantic web: A systematic mapping study</article-title>
          ,
          <source>ACM Comput. Surv</source>
          .
          <volume>55</volume>
          (
          <year>2023</year>
          ). doi:
          <volume>10</volume>
          .1145/3586163.
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>J.</given-names>
            <surname>Kabbedijk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.-P.</given-names>
            <surname>Bezemer</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Jansen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Zaidman</surname>
          </string-name>
          ,
          <article-title>Defining multi-tenancy: A systematic mapping study on the academic and the industrial perspective</article-title>
          ,
          <source>Journal of Systems and Software</source>
          <volume>100</volume>
          (
          <year>2014</year>
          ). doi:
          <volume>10</volume>
          .1016/j.jss.
          <year>2014</year>
          .
          <volume>10</volume>
          .034.
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <issue>W3C</issue>
          ,
          <article-title>The security of the semantic web - secrecy, trust</article-title>
          and rationality,
          <year>2003</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>S. A.</given-names>
            <surname>Azwari</surname>
          </string-name>
          ,
          <article-title>Privacy, security and policies of the semantic web: A review</article-title>
          ,
          <source>Journal of Advances in Information Technology</source>
          (
          <year>2022</year>
          ). URL: https://api.semanticscholar.org/CorpusID:247199940.
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>B.</given-names>
            <surname>Thuraisingham</surname>
          </string-name>
          ,
          <article-title>Security standards for the semantic web</article-title>
          ,
          <source>Computer Standard &amp; Interfaces</source>
          <volume>27</volume>
          (
          <year>2005</year>
          )
          <fpage>257</fpage>
          -
          <lpage>268</lpage>
          . doi:
          <volume>10</volume>
          .1016/j.csi.
          <year>2004</year>
          .
          <volume>07</volume>
          .002.
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>D.</given-names>
            <surname>Olmedilla</surname>
          </string-name>
          ,
          <article-title>Security and privacy on the semantic web</article-title>
          , in: Security, Privacy, and Trust in Modern Data Management,
          <year>2007</year>
          , pp.
          <fpage>399</fpage>
          -
          <lpage>415</lpage>
          . URL: https://api.semanticscholar.org/CorpusID:14132471.
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>H.</given-names>
            <surname>Halpin</surname>
          </string-name>
          ,
          <article-title>Semantic insecurity: Security and the semantic web</article-title>
          , in: International Workshop on Semantic Web Technologies,
          <year>2017</year>
          , pp.
          <fpage>187</fpage>
          -
          <lpage>202</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>G.</given-names>
            <surname>Denker</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Kagal</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Finin</surname>
          </string-name>
          ,
          <article-title>Security in the semantic web using owl</article-title>
          ,
          <source>Information Security Technical Report 10</source>
          (
          <year>2005</year>
          )
          <fpage>51</fpage>
          -
          <lpage>58</lpage>
          . doi:
          <volume>10</volume>
          .1016/j.istr.
          <year>2004</year>
          .
          <volume>11</volume>
          .002.
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>S.</given-names>
            <surname>Kirrane</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Villata</surname>
          </string-name>
          , M. d'Aquin, M. d'Aquin,
          <string-name>
            <given-names>S.</given-names>
            <surname>Kirrane</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Villata</surname>
          </string-name>
          ,
          <article-title>Privacy, security and policies: A review of problems and solutions with semantic web technologies</article-title>
          ,
          <source>Semant. Web</source>
          <volume>9</volume>
          (
          <year>2018</year>
          )
          <fpage>153</fpage>
          -
          <lpage>161</lpage>
          . doi:
          <volume>10</volume>
          .3233/SW-180289.
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>G.</given-names>
            <surname>Castiglione</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G.</given-names>
            <surname>Bella</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D. F.</given-names>
            <surname>Santamaria</surname>
          </string-name>
          ,
          <article-title>Towards grammatical tagging for the legal language of cybersecurity</article-title>
          ,
          <source>in: Proceedings of the 18th International Conference on Availability, Reliability and Security</source>
          , ARES '23,
          <string-name>
            <surname>Association</surname>
          </string-name>
          for Computing Machinery, New York, NY, USA,
          <year>2023</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>9</lpage>
          . doi:
          <volume>10</volume>
          .1145/3600160.3605069.
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>G.</given-names>
            <surname>Bella</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G.</given-names>
            <surname>Castiglione</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D. F.</given-names>
            <surname>Santamaria</surname>
          </string-name>
          ,
          <article-title>An automated method for the ontological representation of security directives</article-title>
          ,
          <source>in: Proceedings of the Joint Ontology Workshops</source>
          <year>2023</year>
          ,
          <string-name>
            <surname>Episode</surname>
            <given-names>IX</given-names>
          </string-name>
          :
          <article-title>The Quebec Summer of Ontology, co-located with the 13th</article-title>
          <source>International Conference on Formal Ontology in Information Systems (FOIS</source>
          <year>2023</year>
          ), Sherbrooke, Québec, Canada,
          <source>July 19-20</source>
          ,
          <year>2023</year>
          , volume
          <volume>3637</volume>
          , CEUR Workshop Proceedings,
          <year>2023</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>17</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>G.</given-names>
            <surname>Bella</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G.</given-names>
            <surname>Castiglione</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D. F.</given-names>
            <surname>Santamaria</surname>
          </string-name>
          ,
          <article-title>An ontological approach to compliance verification of the NIS 2 directive</article-title>
          , in
          <source>: Proceedings of the Joint Ontology Workshops</source>
          <year>2023</year>
          ,
          <string-name>
            <surname>Episode</surname>
            <given-names>IX</given-names>
          </string-name>
          :
          <article-title>The Quebec Summer of Ontology, Sherbrooke</article-title>
          , Québec, Canada,
          <source>July 19-20</source>
          ,
          <year>2023</year>
          , volume
          <volume>3637</volume>
          , CEUR Workshop Proceedings,
          <year>2023</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>12</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>L.</given-names>
            <surname>Kagal</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Finin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Joshi</surname>
          </string-name>
          ,
          <article-title>A policy based approach to security for the semantic web</article-title>
          , in: D.
          <string-name>
            <surname>Fensel</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          <string-name>
            <surname>Sycara</surname>
          </string-name>
          , J. Mylopoulos (Eds.),
          <source>The Semantic Web - ISWC 2003</source>
          , Springer Berlin Heidelberg, Berlin, Heidelberg,
          <year>2003</year>
          , pp.
          <fpage>402</fpage>
          -
          <lpage>418</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>V.</given-names>
            <surname>Lima</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Alves</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Bernardi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Rijo</surname>
          </string-name>
          ,
          <article-title>Security approaches for electronic health data handling through the semantic web: A scoping review</article-title>
          ,
          <source>Semantic Web</source>
          <volume>14</volume>
          (
          <year>2022</year>
          )
          <fpage>1</fpage>
          -
          <lpage>14</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>G.</given-names>
            <surname>Klyne</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J. J.</given-names>
            <surname>Carroll</surname>
          </string-name>
          ,
          <article-title>Resource description framework (rdf): Concepts and abstract syntax</article-title>
          ,
          <source>W3C Recommendation</source>
          ,
          <year>2004</year>
          . URL: http://www.w3.org/TR/2004/REC-rdf-concepts-
          <volume>20040210</volume>
          /.
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>I.</given-names>
            <surname>Horrocks</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P. F.</given-names>
            <surname>Patel-Schneider</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Boley</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Tabet</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Grosofand</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Dean</surname>
          </string-name>
          ,
          <string-name>
            <surname>SWRL:</surname>
          </string-name>
          <article-title>A semantic web rule language combining OWL and RuleML, 2004</article-title>
          . URL: http://www.w3.org/Submission/ SWRL/.
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <surname>OpenLink</surname>
          </string-name>
          , Virtuoso Universal Server,
          <year>2020</year>
          . Link: https://docs.openlinksw.com/virtuoso/.
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <given-names>W.</given-names>
            <surname>Stallings</surname>
          </string-name>
          , L. Brown, Computer Security: Principles and Practice, 3rd ed., Prentice Hall Press, USA,
          <year>2014</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [19]
          <string-name>
            <given-names>J.</given-names>
            <surname>Nin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Herranz</surname>
          </string-name>
          ,
          <source>Privacy and Anonymity in Information Management Systems: New Techniques for New Practical Problems</source>
          , Springer Publishing Company, Incorporated,
          <year>2012</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [20]
          <string-name>
            <given-names>N.</given-names>
            <surname>Ferguson</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Schneier</surname>
          </string-name>
          , T. Kohno,
          <source>The Context of Cryptography</source>
          , John Wiley &amp; Sons, Ltd,
          <year>2015</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>22</lpage>
          . doi:
          <volume>10</volume>
          .1002/9781118722367.ch1.
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>