<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Ítalo Oliveira</string-name>
          <email>i.j.dasilvaoliveira@utwente.nl</email>
          <xref ref-type="aff" rid="aff3">3</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Stefano M. Nicoletti</string-name>
          <email>s.m.nicoletti@utwente.nl</email>
          <xref ref-type="aff" rid="aff3">3</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Mattia Fumagalli</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Gal Engelberg</string-name>
          <email>gal.engelberg@accenture.com</email>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Giancarlo Guizzardi</string-name>
          <email>g.guizzardi@utwente.nl</email>
          <xref ref-type="aff" rid="aff3">3</xref>
        </contrib>
        <contrib contrib-type="editor">
          <string-name>Ontology-driven conceptual modeling, Risk Management, Semantic Interoperability, Common Ontology of Value</string-name>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Accenture, The Center of Advanced AI</institution>
          ,
          <addr-line>EMEA</addr-line>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Free University of Bozen-Bolzano - Faculty of Engineering</institution>
          ,
          <addr-line>via Bruno Buozzi 1, 39100, Bozen-Bolzano</addr-line>
          ,
          <country country="IT">Italy</country>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>University of Haifa</institution>
          ,
          <addr-line>Abba Khoushy Ave 199, Haifa</addr-line>
          ,
          <country country="IL">Israel</country>
        </aff>
        <aff id="aff3">
          <label>3</label>
          <institution>University of Twente</institution>
          ,
          <addr-line>Drienerlolaan 5, 7522 NB, Enschede</addr-line>
          ,
          <country country="NL">The Netherlands</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2025</year>
      </pub-date>
      <abstract>
        <p>According to ISO 31000, the risk management process comprises communication, risk assessment, risk treatment, monitoring, and reporting. Numerous techniques address these aspects, particularly risk assessment and treatment, such as attack trees, fault trees, risk matrix, etc. These approaches implicitly or explicitly require a conceptualization of the risk management domain, that is, a reference domain ontology as a background theory. However, because these techniques are not grounded in ontological analyses and well-founded reference ontologies, they sufer from several limitations and semantic confusion, such as ambiguity, little to no modeling guidance, and lack of semantic integration. Existing well-founded reference ontologies of value, risk, security, and related topics, can support a full-fledge ontologically sound risk management framework capable of solving those semantic issues. Nevertheless, such a comprehensive approach to risk management is yet to be seen. To cover this gap, we present a research proposal integrating these ontologies and associated services into a domain-specific modeling language for risk management. First, we establish a risk management ontology network, including value, risk, incident, security, monitoring, trust, and resilience concepts. We will employ them to ground ontological analyses of those important risk management techniques to identify their shortcomings. This analysis will support redesigns of these techniques to overcome the limitations. We will design a domain-specific modeling language interpreted by the ontology network and served by the redesigned versions of those techniques. By doing so, we expect to address semantic interoperability problems among risk management approaches and data sources.</p>
      </abstract>
      <kwd-group>
        <kwd>and Risk</kwd>
        <kwd>Reference Ontology for Security Engineering</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>
        According to ISO 31000 [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ], the risk management process comprises communication and consultation,
risk assessment (risk identification, analysis, and evaluation), risk treatment, monitoring and review, and
recording and reporting, as shown in Figure 1. Numerous techniques address these aspects, particularly
risk assessment and treatment, as listed in the ISO 31010 [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ], such as Attack Trees, Fault Trees, Risk
others. These techniques are employed for two important tasks:
      </p>
      <p>For example, a qualitative assessment of how attackers can perform attack steps to achieve their
goals.
https://italojsoliveira.github.io (Í. Oliveira); https://stefanonicoletti.com (S. M. Nicoletti); https://www.mattspace.net</p>
      <p>CEUR
Workshop</p>
      <p>ISSN1613-0073</p>
      <p>2. The computation of quantitative metrics, such as the likelihood and impact of risk events, based
on that conceptual insight.</p>
      <p>
        The modeling task implicitly or explicitly assumes a conceptualization of the risk management
domain. Metrics calculation is only meaningful through the lens of the conceptual model that says
how they should be interpreted. This means those techniques require a reference domain ontology as a
background theory to assign meaning to their symbols. For example, Bow-tie diagrams assume a theory
of causation relating threat events on the diagram’s left-hand side to loss events on the right-hand
side [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ]. The risk matrix supposes the notions of risk likelihood, impact severity, and event types [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ].
FMEA, widely used in reliability and safety engineering, includes the concepts of failure, failure efect,
detection, mitigation, and others [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ].
      </p>
      <p>
        However, none of these techniques are ontologically grounded in the sense of relying on explicit
ontological analyses of the domain. This means they combine an informal domain conceptualization
with a degree of mathematical formality to calculate metrics. Consequently, they sufer from several
limitations and semantic confusion: (a) Ambiguous syntactical terms that can be interpreted in various
ways, such as the nodes of attack trees that can be understood as goals, situations, events, event types,
or even propositions [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ]. (b) Little to no modeling guidance. For example, nothing in the attack tree
language tells users how to construct an attack tree and find the basic attack steps. And (c) lack of
semantic integration as each technique is designed to be a stand-alone framework. In real-world cases,
this is a problem because we need to apply diferent methods to obtain diferent perspectives while
relying on the same data or data from various sources. To do that, we need to answer questions such
as “How should this data point be interpreted in an attack tree?” and “How should these attack tree
elements be interpreted in terms of a Bayesian network?”. This is exactly the type of problem addressed
by ontological analyses because having explicit ontological commitments helps us connect diferent
worldviews embedded in the datasets and techniques [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ].
      </p>
      <p>
        In recent years, based on the Unified Foundational Ontology [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ], researchers have built well-founded
reference ontologies of value and risk [9], security [10], trust [11], resilience [12], and related topics.
They can support a full-fledge ontologically sound risk management framework capable of solving those
semantic issues. Nevertheless, such a comprehensive approach to risk management is yet to be seen.
To cover this gap, we present a research proposal integrating these ontologies and associated services
into a domain-specific modeling language for risk management. First, we establish a risk management
ontology network, including value, risk, incident, security, monitoring, trust, and resilience concepts. We
will employ them to ground ontological analyses of those risk management techniques to identify their
shortcomings. This analysis will support the redesign and integration of these techniques to overcome
the limitations. We will design a domain-specific modeling language interpreted by the ontology network
and served by those techniques. By doing so, we expect to address semantic interoperability problems
among risk management approaches and data sources.
      </p>
      <p>In what follows, Section 2 discusses some related works, namely, domain-specific modeling languages
for risk management. Section 3 presents an overview of our research proposal. Section 4 discusses
the theoretical and practical implications of this research project. Section 5 concludes with final
considerations.</p>
    </sec>
    <sec id="sec-2">
      <title>2. Related work</title>
      <p>Diagrammatic representations of scenarios or systems are crucial for risk management since they help
with problem-solving, documentation, communication, complexity management, and computation of
relevant tasks and metrics (simulation, risk analysis, risk propagation, security efectiveness assessment,
etc.). This is why there are many domain-specific language tools for this purpose, commercial or free
open-source products, such as securiCAD1, ThreatModeler2, IriusRisk3, OWASP Threat Dragon4, and
Microsoft Threat Modeling Tool 5. We will discuss three major ontology research-backed modeling
approaches: (a) the CORAS language [13]; (b) the ArchiMate’s Risk and Security Overlay [14]; and (c)
an approach implemented by the open-source Spyderisk project [15].</p>
      <p>CORAS6 is an approach to risk analysis based on ISO 31000 [13]. It consists of a modeling language
specification, a tool implementing this specification, and a method for risk and security modeling.
The metamodel of the language comprises a domain ontology defining the terminology. The CORAS
concrete syntax was designed to facilitate the description of risk models and communication between
people of heterogeneous backgrounds.</p>
      <p>The ArchiMate’s Risk and Security Overlay [14], developed by The Open Group ArchiMate Forum
and The Open Group Security Forum, intends to introduce risk and security modeling concepts into
ArchiMate language through the customization mechanisms (specialization and stereotypes). This
ArchiMate extension has been extensively investigated by ontological analyses of its risk and security
layers [16, 17]. Based on the Common Ontology of Value and Risk (COVER) [9] and the Reference
Ontology for Security Engineering (ROSE) [10], researchers have found numerous semantic deficiencies,
such as ambiguities and underspecification, and proposed a well-founded language redesign [ 16, 17].</p>
      <p>Phillips et al [15] describe a modeling approach for automated risk assessment of cyber-physical
systems following ISO 27005 (“Information security risk management”). They present an ontology
represented through the UML class diagram to define the necessary terminology. The Spyderisk 7
ontology is designed to support a cause-and-efect approach to risk modeling. Spyderisk can compute
the threats to a system, ordered by risk level, where the risk level combines the business impact of a
consequence and the computed likelihood.</p>
      <p>
        Although these three approaches rely on defining a risk management ontology to assign meaning
to their respective domain-specific modeling language, they do not leverage an ontological approach.
They do not employ a foundational ontology and well-founded reference domain ontologies to ground
their definitions. The problems with this absence have been shown by the studies of ArchiMate’s Risk
and Security Overlay [16, 17]. In particular, it is harder to integrate diferent risk management modeling
approaches and data from diferent sources without an explicit heavyweight ontology underneath.
Semantic interoperability requires ontologies as meaning contracts capturing the conceptualizations
represented in information artifacts, backed by Ontology, as a discipline proposing formal methods
1https://www.bitcyber.com.sg/foreseeti-securicad
2https://www.threatmodeler.com
3https://www.iriusrisk.com
4https://owasp.org/www-project-threat-dragon
5https://www.microsoft.com/en-us/securityengineering/sdl/threatmodeling
6https://coras.sourceforge.net/index.html
7https://github.com/Spyderisk
and theories for clarifying these conceptualizations and articulating their representations [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ]. This is
exactly the approach we propose.
      </p>
    </sec>
    <sec id="sec-3">
      <title>3. Ontology-based modeling for risk management</title>
      <p>Foundational and well-founded reference domain ontologies are information artifacts embodying formal
ontological theories of the world. By distinguishing concepts like objects, intrinsic properties,
propositions, higher-order types, events, situations, and diferent types of relations (formal relation, historical
dependence, external dependence, generic dependence, etc.), they provide fine-grained conceptual
modeling capabilities. Our modeling approach proposal for risk management is “ontology-based” in
this sense, instead of merely describing important domain concepts from scratch. We will leverage
UFO-based ontologies connected to the risk management domain to build an ontology network that
will support ontological analyses and the redesign of several risk management approaches. We will
design a domain-specific modeling language whose metamodel will correspond to concepts taken
from the ontology network. Moreover, as we carry out the ontological analyses and redesign, we can
incrementally provide services around the language ecosystem. The project overview is described in
Figure 2. Let us consider each major block of this project.</p>
      <p>1. Risk Management Ontology Network. The UFO-based Common Ontology of Value and
Risk (COVER) [9], the Reference Ontology for Security Engineering (ROSE) [10], the Reference
Ontology of Trust (ROT) [11], the Resilience Core Ontology (ResiliOnt) [12] will definitely
be part of our ontology network. Still, if needed, we intend to refine them or build novel
ontologies, for example for monitoring and detection concepts. They will be the cornerstones
of the ontological analysis and modeling language. These ontologies are to be represented in
OntoUML modeling language and OWL complying with gUFO [18] (UFO OWL implementation).
The goal of establishing this ontology network is to have a complete explicit characterization of
the risk management domain. It is a network because it is composed of interconnected individual
ontologies about intertwined domains (value, risk, security, etc.).
2. An Ontological Analysis denotes a well-known methodology summarized in Figure 3. An
ontological analysis is “the evaluation of a modeling grammar, from the viewpoint of a predefined
and well-established ontology” [19]. According to Rosemann et al. [19], the modeling grammars
should be isomorphic to their underlying ontology, that is, the interpretation from the modeling
constructs to the ontology concepts should be bijective. This is a desirable characteristic because
it prevents the following problems that jeopardize the modeling capability of the language: (a)</p>
      <p>ontological incompleteness (or construct deficit ), which is the lack of a grammatical construct for an
existing ontological concept; (b) construct overload, which occurs when one grammatical construct
represents more than one ontological construct; (c) construct redundancy, which happens when
more than one grammatical construct represents the same ontological construct; (d) construct
excess, when there is a grammatical construct that does not map to any ontological construct
[19]. In the context of our project, we will investigate the underlying ontology of attack trees,
fault trees, FMECA, Bayesian Networks, risk matrix, and other risk management techniques,
to identify their semantic limitations and propose a better version of the respective technique.
This approach has been successfully employed throughout the years, such as in the ArchiMate
example [16, 17]. An underexplored implication of this sort of ontological analysis is to set up
an environment for interoperating those techniques. This happens because explicit ontological
commitments allow us to identify corresponding notions crossing techniques and datasets. For
example, if a given node in an attack tree denotes an event, we can find the same data point in
diferent datasets or even as a node in a Bayesian network or a fault tree.
3. A Domain-Specific Modeling Language for Risk Management will embody the risk
management ontology network. It shall allow typical threat modeling activities, representing identified
risk sources, and how everything hangs together meaningfully. The resulting models shall have
a precise formal specification (say, as OWL serialized in TTL). The language shall be capable
of representing types and individuals to distinguish between risk scenarios (possible events)
and incidents (past concrete occurrences). This feature is important because it allows the use of
databases containing, for instance, cybersecurity incidents to populate the model. The language
can be built incrementally and be served by capabilities (automated reasoning, simulation, risk
propagation, root cause analysis, etc.) provided by the redesigned version of risk management
techniques (attack trees, fault trees, etc.). For example, a model created by this language can
specify threats to a given cloud-based system, how risks emerge and propagate from these threats, how
risk events afect stakeholders’ goals, and this representation can enable computer simulations
based on Bayesian networks. We conceive that the language and its services can be integrated
with established datasets and knowledge bases, such as CVE8, CWE9, CAPEC10, ATT&amp;CK11,
D3FEND12, and others. Finally, the language shall support textual and graphical editing.</p>
      <sec id="sec-3-1">
        <title>8https://cve.mitre.org</title>
        <p>9https://cwe.mitre.org
10https://capec.mitre.org
11https://attack.mitre.org
12https://d3fend.mitre.org</p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>4. Theoretical and practical implications</title>
      <p>This project has major theoretical and practical implications because it involves theoretical and applied
research, plus a ready-to-use tool. We summarize the projected implications, as follows:
Theoretical implications
• Building an ontology network for risk management requires combining diferent ontologies. This
involves a conceptual clarification efort toward the very risk management domain. A similar
elucidative outcome will follow from constructing some of the related domain ontologies since
not all the necessary ones are available (for example, monitoring and detection concepts). This
semantic elucidation might have unforeseen consequences for understanding the risk management
domain.
• The ontological analyses revealing semantic issues of risk management techniques, such as
attack trees and fault trees, will directly impact how these techniques are interpreted today. New
formalisms might emerge from these novel interpretations.</p>
      <p>Practical implications
• The integration of those risk management techniques has the potential to nourish the rise of new
tools. Our proposed domain-specific language is just one of them.
• Our domain-specific language is expected to improve the modeling practice necessary for risk
management tasks because of its domain adequacy. This results from employing a well-founded
ontology network as the language metamodel. This enhanced modeling capability will leverage a
data-driven approach to compute relevant metrics. In summary, we expect to contribute to the two
important tasks presented in the Introduction.</p>
    </sec>
    <sec id="sec-5">
      <title>5. Conclusion</title>
      <p>We have presented a research proposal to address major semantic interoperability problems among risk
management approaches and data sources. Our approach relies on heavyweight ontological foundations
going from the UFO upper ontology and UFO-based reference domain ontologies to ontological analyses
and a diagrammatic domain-specific modeling language for risk management. The project involves
theoretical and practical outcomes and manifold contributions.</p>
    </sec>
    <sec id="sec-6">
      <title>Declaration on Generative AI</title>
      <sec id="sec-6-1">
        <title>The authors have not employed any Generative AI tools.</title>
        <p>[9] T. P. Sales, F. Baião, G. Guizzardi, J. P. A. Almeida, N. Guarino, J. Mylopoulos, The common
ontology of value and risk, in: Conceptual Modeling. ER 2018, volume 11157, Springer, 2018, pp.
121–135.
[10] Í. Oliveira, T. P. Sales, R. Baratella, M. Fumagalli, G. Guizzardi, An ontology of security from a risk
treatment perspective, in: Conceptual Modeling. ER 2022, volume 13607, Springer, Cham, 2022,
pp. 365–379. doi:10.1007/978- 3- 031- 17995- 2_26.
[11] G. Amaral, T. P. Sales, G. Guizzardi, D. Porello, Towards a reference ontology of trust, in: On
the Move to Meaningful Internet Systems: OTM 2019 Conferences: Confederated International
Conferences: CoopIS, ODBASE, C&amp;TC 2019, Rhodes, Greece, October 21–25, 2019, Proceedings,
Springer, 2019, pp. 3–21.
[12] P. P. F. Barcelos, R. F. Calhau, Í. Oliveira, T. Prince Sales, F. Gailly, G. Poels, G. Guizzardi, Ontological
foundations of resilience, in: International Conference on Conceptual Modeling, Springer, 2024,
pp. 396–416.
[13] M. Lund, et al., Model-driven risk analysis: the CORAS approach, Springer Science &amp; Business</p>
        <p>Media, 2010.
[14] I. Band, W. Engelsman, C. Feltus, S. G. Paredes, J. Hietala, H. Jonkers, P. de Koning, S. Massart,
How to Model Enterprise Risk Management and Security with the ArchiMate Language, Technical
Report W172, The Open Group, 2019.
[15] S. C. Phillips, S. Taylor, M. Boniface, S. Modaferi, M. Surridge, Automated knowledge-based
cybersecurity risk assessment of cyber-physical systems, IEEE Access (2024).
[16] T. P. Sales, J. P. A. Almeida, S. Santini, F. Baião, G. Guizzardi, Ontological analysis and redesign
of risk modeling in ArchiMate, in: 2018 IEEE 22nd International Enterprise Distributed Object
Computing Conference (EDOC), 2018, pp. 154–163. doi:10.1109/EDOC.2018.00028.
[17] Í. Oliveira, T. P. Sales, J. P. A. Almeida, R. Baratella, M. Fumagalli, G. Guizzardi, Ontology-based
security modeling in archimate, Software and Systems Modeling (2024) 1–28.
[18] J. P. A. Almeida, G. Guizzardi, T. P. Sales, R. A. Falbo, gUFO: A lightweight implementation of the
unified foundational ontology (UFO), 2019. URL: http://purl.org/nemo/doc/gufo.
[19] M. Rosemann, P. Green, M. Indulska, A reference methodology for conducting ontological analyses,
in: Conceptual Modeling. ER 2004, volume 3288, Springer, Berlin, Heidelberg, 2004, pp. 110–121.
[20] C. L. Azevedo, M.-E. Iacob, J. P. A. Almeida, M. van Sinderen, L. F. Pires, G. Guizzardi, Modeling
resources and capabilities in enterprise architecture: A well-founded ontology-based proposal for
archimate, Information systems 54 (2015) 235–262.</p>
      </sec>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <surname>ISO</surname>
          </string-name>
          , ISO
          <volume>31000</volume>
          :
          <fpage>2018</fpage>
          - Risk management - Guidelines,
          <year>2018</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2] ISO/IEC, ISO/IEC 31010:
          <fpage>2019</fpage>
          - Risk management - Risk
          <source>Assessment Techniques</source>
          ,
          <year>2019</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <surname>A. de Ruijter</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          <string-name>
            <surname>Guldenmund</surname>
          </string-name>
          ,
          <article-title>The bowtie method: A review</article-title>
          ,
          <source>Safety science 88</source>
          (
          <year>2016</year>
          )
          <fpage>211</fpage>
          -
          <lpage>218</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>L.</given-names>
            <surname>Anthony (Tony) Cox</surname>
          </string-name>
          Jr,
          <article-title>What's wrong with risk matrices?</article-title>
          ,
          <source>Risk Analysis: An International Journal</source>
          <volume>28</volume>
          (
          <year>2008</year>
          )
          <fpage>497</fpage>
          -
          <lpage>512</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>R. J.</given-names>
            <surname>Mikulak</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>McDermott</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Beauregard</surname>
          </string-name>
          ,
          <article-title>The basics of FMEA</article-title>
          , CRC press,
          <year>2017</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>B.</given-names>
            <surname>Schneier</surname>
          </string-name>
          ,
          <article-title>Attack trees</article-title>
          ,
          <source>Dr. Dobb's journal 24</source>
          (
          <year>1999</year>
          )
          <fpage>21</fpage>
          -
          <lpage>29</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>G.</given-names>
            <surname>Guizzardi</surname>
          </string-name>
          , Ontology, ontologies and the ”I”
          <string-name>
            <surname>of</surname>
            <given-names>FAIR</given-names>
          </string-name>
          ,
          <source>Data Intelligence</source>
          <volume>2</volume>
          (
          <year>2020</year>
          )
          <fpage>181</fpage>
          -
          <lpage>191</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>G.</given-names>
            <surname>Guizzardi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. Botti</given-names>
            <surname>Benevides</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C. M.</given-names>
            <surname>Fonseca</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Porello</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J. P. A.</given-names>
            <surname>Almeida</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T. P.</given-names>
            <surname>Sales</surname>
          </string-name>
          , Ufo: Unified foundational ontology,
          <source>Applied ontology 17</source>
          (
          <year>2022</year>
          )
          <fpage>1</fpage>
          -
          <lpage>44</lpage>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>