[HTML][HTML] Seconto: Ontological Representation of Security Directives

G Castiglione, G Bella, DF Santamaria - Computers & Security, 2025 - Elsevier
The current digital landscape demands robust security requirements and, for doing so, the
institutions enact complex security directives to protect the citizens and the infrastructures …

An automated method for the ontological representation of security directives

G Bella, G Castiglione, DF Santamaria - arXiv preprint arXiv:2307.01211, 2023 - arxiv.org
Large documents written in juridical language are difficult to interpret, with long sentences
leading to intricate and intertwined relations between the nouns. The present paper frames …

[PDF][PDF] An Ontological Approach to Compliance Verification of the NIS 2 Directive.

G Bella, G Castiglione, DF Santamaria - JOWO, 2023 - ceur-ws.org
Cybersecurity, which notoriously concerns both human and technological aspects, is
becoming more and more regulated by a number of textual documents spanning several …

[图书][B] Legal ontology engineering: Methodologies, modelling trends, and the ontology of professional judicial knowledge

N Casellas - 2011 - books.google.com
Enabling information interoperability, fostering legal knowledge usability and reuse,
enhancing legal information search, in short, formalizing the complexity of legal knowledge …

[图书][B] Introduction: Theory and methodology in legal ontology engineering: Experiences and future directions

P Casanovas, G Sartor, MA Biasiotti… - 2011 - Springer
Ontologies have come of age in the legal field. A certain number of ontologies in different
domains are already available and have been used in various applications. However, as a …

An ontological approach to compliance verification of the NIS 2 directive

G Castiglione, DF Santamaria, G Bella - arXiv preprint arXiv:2306.17494, 2023 - arxiv.org
Cybersecurity, which notoriously concerns both human and technological aspects, is
becoming more and more regulated by a number of textual documents spanning several …

Legal ontologies and how to choose them: the investigationt tool

V Leone, L Di Caro, S Villata - CEUR WORKSHOP PROCEEDINGS, 2018 - cris.unibo.it
Legal ontologies aim to provide a structured representation of legal concepts and their
interconnections. These ontologies are then exploited to support information extraction and …

An ontology of information security

A Herzog, N Shahmehri, C Duma - International Journal of …, 2007 - igi-global.com
We present a publicly available, OWL-based ontology of information security which models
assets, threats, vulnerabilities, countermeasures and their relations. The ontology can be …

What are information security ontologies useful for?

MA Sicilia, E García-Barriocanal… - Metadata and Semantics …, 2015 - Springer
The engineering of ontologies in the information security domain have received some
degree of attention in past years. Concretely, the use of ontologies has been proposed as a …

Some ontological tools to support legal regulatory compliance, with a case study

A Gangemi, A Prisco, MT Sagri, G Steve… - … Conferences" On the …, 2003 - Springer
The increasing development of legal ontologies seems to offer satisfactory solutions to legal
knowledge formalization, which in past experiences lead to a limited exploitation of legal …