OntoUML Guide
This page is a living working guide for OntoUML and its relevance to the Knowledge Ontology direction.
It is being built as a synthesis of source material, especially the thesis An Ontological Approach to Security Modeling by Ítalo Oliveira, so that Governance Foundation does not need to keep returning to the source thesis just to recover the main ideas.
This is intended to become a durable working reference, not just a loose summary. The aim is to preserve the strongest ideas, distinctions, patterns, and implications in practical language.
Why this page exists
OntoUML matters here because Governance Foundation is moving toward:
- an ontologically grounded canonical knowledge layer
- agents that can understand and persist knowledge into that layer
- ontology rules for testing consistency, completeness, and quality
- framework-independent storage with framework-specific views layered on top
That means we need more than a fashionable enterprise modeling notation. We need a grounded conceptual modeling approach.
What OntoUML is
OntoUML is an ontology-driven conceptual modeling language.
In simple terms, it is a way of modeling domains that tries to be careful about what kinds of things really exist, what makes them the kinds of things they are, and how they can validly relate and change.
It is:
- based on UML profiling/extending, not a completely separate visual world
- grounded in UFO, the Unified Foundational Ontology
- designed to express ontological distinctions explicitly
- useful when semantic precision matters more than diagram convenience alone
What OntoUML is not
OntoUML is not:
- the foundational ontology itself
- a finished enterprise architecture framework like TOGAF
- mainly a presentation notation for business stakeholders
- a guarantee that a model is good just because the boxes have the right stereotypes
The real stack is:
- UFO provides the foundational ontology
- OntoUML provides the ontology-driven conceptual modeling language
- reference/domain ontologies are built using that grounding
- framework views and application models sit above that layer
This matters because OntoUML is not itself the foundational ontology. It is the modeling language that carries foundational distinctions into conceptual models.
Why Governance Foundation cares
Governance Foundation is not trying to create diagrams for their own sake. It is trying to create:
- a canonical organisational ontology
- agent-usable semantics
- durable structured memory
- ontology-based validation and testing
- framework-independent continuity
That makes OntoUML relevant because it helps separate things that enterprise models often blur together, such as:
- kind vs role
- type vs state
- object vs relationship
- capability vs event
- quality vs disposition
- stable identity vs temporary condition
The stack, in simple terms
The thesis reinforces a layered stack:
- UFO provides the foundational ontology
- OntoUML provides the ontology-driven conceptual modeling language
- reference/domain ontologies are built using that grounding
- framework views and application models sit above that layer
A good working interpretation for Governance Foundation is:
- UFO-style foundational distinctions provide the grounding layer
- OntoUML provides the modeling discipline
- Knowledge Ontology becomes the canonical organisational ontology
- agent memory and persistence should be structured using those distinctions
- Knowledge Ontology Runtime Model should express those distinctions in machine-usable runtime form
- frameworks such as TOGAF, BMC, or other governance models should be treated as derived views or translations
Thesis chapter map
- Introduction
- A systematic mapping study of security ontologies
- Ontological foundations
- Understanding and modeling prevention
- An ontology of security from a risk treatment perspective
- Toward a phishing attack ontology
- An ontological analysis of D3FEND cybersecurity model
- Ontology-based security modeling in ArchiMate
- Final considerations
- Appendix A, Project Repositories
- Appendix B, Ontology Vocabulary
Reading batches
To keep synthesis manageable, this guide is being built in batches:
Batch 1
- Chapter 1, Introduction
- Chapter 2, Systematic mapping study of security ontologies
- Chapter 3, Ontological foundations
Batch 2
- Chapter 4, Understanding and modeling prevention
- Chapter 5, An ontology of security from a risk treatment perspective
Batch 3
- Chapter 6, Toward a phishing attack ontology
- Chapter 7, An ontological analysis of D3FEND cybersecurity model
- Chapter 8, Ontology-based security modeling in ArchiMate
Batch 4
- Chapter 9, Final considerations
- Appendix material
Core OntoUML and UFO concepts in plain English
This section is the working semantic core of the guide. For the machine-usable follow-through, see Knowledge Ontology Runtime Model.
Individual vs type
An individual is a particular thing. A type is the kind of thing something can be.
Examples:
- individual:
Max Barrass - type:
Person
Endurant vs perdurant
This is one of the most important distinctions.
- an endurant is something that is wholly present whenever it exists, such as a person, organisation, system, contract, or device
- a perdurant is something that unfolds in time, such as an event, process occurrence, deployment, hiring, or decision meeting
Very roughly:
- objects endure
- events happen
Substantial vs moment
A substantial is an entity that exists in its own right. A moment depends on something else.
Examples:
- substantial: person, organisation, system
- moment: colour, commitment, capability, vulnerability, obligation, trust level
This matters because many enterprise models incorrectly treat dependent properties as if they were standalone things.
Kind
A kind is a fundamental sort of thing that supplies identity and persistence.
Examples:
- Person
- Organisation
- System
- Contract, if modeled as a substantial social object
A kind is rigid, meaning if something is that thing, it is that thing in every situation in which it exists.
Subkind
A subkind is a more specific rigid type under a kind.
Examples:
- Human Person under Person
- Nonprofit Organisation under Organisation
Role
A role is a context-dependent type something can take on without changing what it fundamentally is.
Examples:
- Customer
- Employee
- Supplier
- Regulator
- Product Owner
A person can cease to be a Customer and still remain a Person. This is exactly why role distinctions matter.
Phase
A phase is a temporary condition of the same underlying thing.
Examples:
- Draft / Published
- Active / Suspended
- Child / Adult
A phase is not a new fundamental type. It is a temporary state-like classification.
Relator
A relator is one of the most useful OntoUML ideas. It is a thing that grounds or makes a relation real.
Examples:
- Employment
- Membership
- Contract
- Subscription
- Agreement
Instead of modeling Person works for Organisation as just a loose edge, OntoUML often wants you to model the underlying relation-making entity, such as Employment.
This is extremely relevant for Governance Foundation because many important organisational relationships are not just simple links. They are structured arrangements with conditions, obligations, rights, and time.
Quality
A quality is a dependent property that can vary and often has measurable values.
Examples:
- temperature
- latency
- reliability score
- risk score
- confidence level
Disposition
A disposition is a dependent property involving potentiality, tendency, power, capability, vulnerability, liability, or readiness to manifest in certain conditions.
Examples:
- capability
- vulnerability
- ability
- tendency
- fragility
- deterrent capability
This is one of the most important concepts in the thesis. The thesis treats dispositions as central to understanding how events happen and how prevention works.
Situation
A situation is a configuration of reality that can satisfy conditions, activate dispositions, or be brought about by events.
In the prevention theory, situations are critical because events can be prevented by bringing about situations incompatible with their activation conditions.
Event
An event is a perdurant, something that unfolds in time.
Examples:
- approval
- attack
- deployment
- breach
- policy enactment
- meeting
- incident
In the thesis, events are manifestations of dispositions under certain situations.
Intentional and social entities
UFO-C brings in intentional and social entities, which matters for organisations. This covers things like:
- goals
- intentions
- commitments
- obligations
- agents
- social roles
- normative structures
This is one reason UFO/OntoUML are interesting for Governance Foundation, because governance and organisations are full of social and normative reality, not just technical assets.
Why these distinctions matter so much
These distinctions stop the model from collapsing into a muddle.
They help prevent common mistakes such as:
- treating a role as if it were a kind
- treating a state as if it were a permanent type
- treating a relationship as a bare line when it is actually a structured relator
- treating a capability as if it were the same thing as an event
- treating a score as if it were the same thing as the risk itself
For agents, these distinctions are not academic. They determine whether the stored knowledge can be reasoned over coherently.
Batch 1 synthesis
What the thesis is trying to do
The thesis is trying to define an adequate conceptualization of the security domain. Its position is that modeling languages are only good if they reflect the actual ontology of the domain they are trying to represent.
So the aim is not just better diagrams. It is stronger conceptual grounding.
Why a reference ontology is needed
The thesis argues that risk and security modeling require:
- shared concepts
- shared vocabulary
- explicit ontological commitments
- application-independent semantics
This is why a reference ontology matters. Without it, models become inconsistent, tool-biased, or framework-biased.
Main gap identified in the literature
The literature review finds that many security ontologies exist, but they are often:
- fragmented
- narrow
- weakly reusable
- weakly interoperable
- not grounded in a foundational ontology
The field lacks a strong FAIR, well-grounded core ontology.
UFO and OntoUML in the stack
The thesis positions:
- UFO as the foundational ontology
- OntoUML as the conceptual modeling language that embeds many UFO distinctions
- COVER as a domain ontology for value and risk that can be extended
This is highly relevant to Governance Foundation because it reinforces a layered architecture rather than a framework-first one.
Key distinctions from the foundations chapter
The foundations material highlights distinctions such as:
- endurant vs perdurant
- substantial vs moment
- disposition vs quality
- kind vs sortal
- rigid vs non-rigid types
One especially important theme is the ontological seriousness of dispositions, including:
- capability
- ability
- function
- liability
- vulnerability
- capacity
These are not treated as casual labels. They are central to understanding how events happen.
Practical relevance of Batch 1
The main consequence of Batch 1 is this:
- a canonical ontology should be grounded below the framework layer
- OntoUML is a strong candidate language for expressing that ontology
- capability, vulnerability, role, event, and state should be treated as distinct ontological categories
Batch 2 synthesis
Prevention is the core operational concept
The thesis argues that prevention is not a vague practical term. It can be modeled ontologically.
Its core idea is:
prevention is about bringing about a situation that is incompatible with the conditions required for some event to occur.
This is one of the most useful ideas in the thesis.
Prevention works through dispositions, situations, and events
In the UFO grounding used by the thesis:
- events are manifestations of dispositions
- dispositions are activated in certain situations
- causal chains connect dispositions, manifestations, and downstream effects
So preventing an event means interfering with the dispositional setup that would have allowed that event to happen.
Type-level modeling matters
The thesis explicitly lifts the discussion to the level of types.
That means prevention should be modeled not only for a single concrete event but for:
- event types
- disposition types
- situation types
This is important because risk, likelihood, controls, and governance all operate at the type level.
Mutual Activation Partner (MAP)
A major concept introduced in the prevention analysis is the idea that a disposition often depends on the presence of other compatible dispositions in order to manifest.
This is captured as Mutual Activation Partner.
Examples include:
- flammability needing oxygen and ignition conditions
- a key's opening capability needing a lock's being-openable disposition
- vulnerabilities needing matching threat capabilities
This is highly relevant for a Knowledge Ontology because it suggests many important things should be modeled as activation dependencies rather than as isolated properties.
Main prevention patterns
The thesis shows that prevention can work by:
- removing the relevant disposition
- removing the bearer from the relevant situation
- removing a required mutual activation partner
- introducing an incompatible condition
This gives a reusable ontology pattern for interventions, safeguards, countermeasures, controls, and governance actions.
Direct and indirect prevention
The thesis distinguishes:
- direct prevention, where an event brings about a situation incompatible with the target event's activation conditions
- indirect prevention, where an intervention breaks a causal chain earlier upstream
This distinction is very important for modeling controls and interventions in organisational systems.
ROSE
The thesis then builds ROSE, the Reference Ontology for Security Engineering.
ROSE combines:
- COVER
- the prevention ontology
- UFO grounding
- OntoUML representation
The core framing is that security is understood as value created by systematically preventing risk events.
Security mechanisms are ontologically unpacked
ROSE treats a security mechanism as more than a loose control label. It is an object designed to bear control capabilities whose manifestations produce protection events that bring about controlled situations incompatible with risk event activation.
This matters because it keeps clearly separate:
- the object
- the capability
- the event
- the resulting situation
- the protected value context
That kind of separation is exactly what enterprise frameworks often blur.
Practical relevance of Batch 2
For Governance Foundation, Batch 2 strongly suggests that a good ontology should support:
- causal-intervention modeling
- control mechanisms as first-class structured entities
- activation conditions
- incompatible situations
- event-chain reasoning
- prevention patterns that agents can reason over
Batch 3 synthesis
What Batch 3 is doing overall
Batch 3 is where the thesis becomes very practical. The first two batches build the foundations. Batch 3 shows what those foundations are for.
The three chapters do different but closely related things:
- Chapter 6 shows how a domain ontology can be built by specializing the reference ontology into a concrete problem domain
- Chapter 7 shows how an existing operational ontology can be critiqued and improved through ontological analysis
- Chapter 8 shows how a major enterprise modeling language can be redesigned as a better view over the ontology
That combination is extremely relevant for Governance Foundation because it mirrors the actual architecture we want:
- canonical ontology underneath
- domain specializations above it
- framework overlays on top of that
- practical critique/redesign of existing artifacts rather than blind adoption
Chapter 6, PHATO and ontology specialization
The phishing chapter is not mainly interesting because phishing itself is the central Governance Foundation domain. It is interesting because it demonstrates the method.
The method is:
- start from a foundational ontology
- use a reference ontology for the broader domain
- specialize that into a more concrete domain ontology
- use the resulting ontology to reason about interventions and countermeasures
That is exactly the kind of pattern Governance Foundation needs for turning a canonical ontology into domain-specific working ontologies.
PHATO as a specialization of ROSE
The thesis proposes PHATO, a Phishing Attack Ontology, by specializing ROSE.
This is important because the phishing domain is shown not as a disconnected taxonomy but as a specialization of a richer ontology of value, risk, and security.
The model introduces entities such as:
- Scammer as a specialization of attacker/threat object
- Impersonated Reputable Agent
- Target as a risk subject
- Lure
- Hook
- Asset Catch as a loss event
- Phishing Enabler such as the target's email address, phone number, or reachable surface
- Target Fragilities such as ignorance, fear, greed, urgency, distraction, curiosity, and similar mental attitudes
The key point is not just the list. It is that these are ontologically differentiated. They are not all thrown into one flat class hierarchy.
Phishing is modeled as a causal-dispositional structure
The thesis models phishing in terms of:
- intentions
- capabilities
- vulnerabilities/fragilities
- triggering situations
- complex events
- resulting loss events
A phishing attack is not treated as a single blunt object. It is modeled as a chain involving:
- the scammer's intention to phish
- the scammer's impersonation capability
- exposure/enabling conditions
- the target's fragilities
- the phishing attack event itself
- subsequent asset-catch/loss events
This is a really strong pattern. It shows how social and technical factors can be represented together without collapsing them into one vague bucket.
Fragilities are first-class and matter operationally
One of the most useful ideas in this chapter is that many human factors are treated as fragilities that can participate in the causal setup of loss.
Examples include:
- ignorance
- fear
- complacency
- curiosity
- urgency
- distraction
- greed
- loneliness
This matters because it shows that human vulnerabilities can be modeled without hand-wavy psychology. They become part of the ontological structure of the domain.
For Governance Foundation, this is very interesting because organisational failure also often depends on human and social fragilities, not just technical gaps.
Countermeasures are modeled by what they change
PHATO is especially valuable because it does not stop at describing phishing. It shows how anti-phishing countermeasures can be modeled ontologically.
A phishing awareness program is treated as a social entity whose capabilities are manifested by training events that alter the target's fragilities or build relevant capabilities.
So the intervention is understood in terms of what it changes in the world:
- removing or attenuating fragilities
- building new competencies/capabilities
- preventing the situations that would otherwise trigger asset-catch events
That is exactly the kind of causal clarity Governance Foundation needs in governance and capability modeling.
Main lesson from Chapter 6
The big lesson is that a good ontology should support specialization into concrete domains without losing foundational discipline.
In other words:
- start from a strong core
- derive domain ontologies from it
- use them to reason about actual interventions
Chapter 7, D3FEND critique as ontology quality work
The D3FEND chapter is valuable because it shows what ontological analysis looks like when applied to a real industry artifact.
D3FEND is important in practice, but the thesis argues that practical popularity does not mean conceptual adequacy.
The key move here is not to dismiss D3FEND. It is to analyze it as a computational ontology and identify where lack of foundations created semantic problems.
This is exactly the attitude Governance Foundation should keep toward widely used frameworks, taxonomies, and knowledge graphs.
The three main classes of problems found in D3FEND
The thesis identifies recurring issues such as:
- ontological incompleteness
- construct overload
- under-specification
That is a very reusable evaluation lens.
In plain English:
- something important is missing
- one construct is trying to mean too many different things
- there are too few constraints, so unintended interpretations slip through
D3FEND mixes fundamentally different things
A major criticism is that D3FEND tends to blur:
- objects
- events
- intentions/tactics
- techniques
- capabilities
- digital artifacts
This is exactly the kind of collapse OntoUML/UFO are supposed to help prevent.
The thesis shows examples where the ontology does not cleanly enforce distinctions between digital artifacts, events, physical objects, locations, and other disjoint categories. That allows nonsensical inferences and unintended instances.
Missing constraints are not a minor detail
One of the strongest practical lessons from Chapter 7 is that lack of constraints is itself a semantic failure.
If an ontology permits something to be, at once, an event, an object, a tactic, a reference, a location, and so on, then the ontology is not doing enough semantic work.
This matters a lot for Governance Foundation because a canonical ontology for agents cannot just store terms. It has to exclude bad models, not just allow good-looking ones.
D3FEND lacks important security-domain concepts
Using ROSE as the reference, the thesis argues that D3FEND also misses important domain concepts, including:
- subjects
- attackers/threat objects
- vulnerabilities
- intentions
- triggering situations
- the richer structure of control mechanisms
In other words, even if the taxonomy is large, the semantic skeleton is still incomplete.
That is a good warning for Governance Foundation work. A large vocabulary is not the same as a good ontology.
Main lesson from Chapter 7
The big lesson is that ontological analysis is not abstract academic criticism. It is a practical method for improving real knowledge artifacts.
For Governance Foundation, this means the Knowledge Ontology should eventually be able to evaluate imported frameworks, taxonomies, and external models for:
- missing concepts
- overloaded concepts
- missing constraints
- invalid category mixing
- weak interoperability semantics
Chapter 8, ArchiMate as a framework view to redesign
This chapter is maybe the most directly relevant one for the broader Governance Foundation direction.
Why? Because it studies a major enterprise architecture language and shows that its security/risk overlay should be redesigned based on ontology.
This is very close to the Governance Foundation idea that frameworks are views over ontology, not the canonical ontology itself.
The thesis identifies six limitations in the ArchiMate risk/security overlay
The thesis identifies six limitations in the RSO, including:
- redundant or unclear intention-like constructs
- under-specified implemented control measures
- weak treatment of baseline versus target architecture and change over time
- missing subjects in the security domain
- missing triggering conditions of protection events
- weak representation of interdependence among risk capabilities
This is important because it shows in a very concrete way what a framework misses when it does not fully align with the ontology underneath.
Security elements in frameworks often blur means, ends, and realizations
One of the thesis's strongest points here is that constructs like:
- control objective
- security requirement
- control measure
- security principle
are not always cleanly distinguished in the framework.
Some are really different levels of intention, abstraction, or means-end relations. Some are partly redundant. Some are underspecified.
That is exactly the kind of thing Governance Foundation should expect when mapping external frameworks into a canonical ontology. The framework terms are often useful, but they are not automatically ontologically clean.
Prevention has to be represented in framework terms without losing the theory
A subtle but important point in Chapter 8 is that ArchiMate does not clearly distinguish the type level from the instance level. So representing the prevention theory inside it requires adaptation.
That is very relevant. It means a framework view may not be able to express the ontology perfectly. That is okay, but it strengthens the case for keeping the canonical ontology underneath and generating framework-aligned views from it.
Chapter 8 reinforces that security mechanisms need internal structure
The chapter keeps pushing the same very important pattern:
- security mechanism object
- control capability
- protection/control event
- protection trigger
- resulting controlled situation
- affected subject and intention
This is better than just saying "control X mitigates risk Y".
For Governance Foundation, this pattern generalizes well beyond cybersecurity. You can reuse it for:
- governance controls
- policy interventions
- change programs
- compliance mechanisms
- organisational capability design
Modeling change over time matters
A particularly useful lesson from the ArchiMate chapter is that it is not enough to model the steady-state relationship between a control and a vulnerability. The framework also needs to express change from baseline architecture to target architecture.
This is excellent for Governance Foundation because organisational ontology cannot stay purely static. It has to support:
- current state
- desired state
- intervention path
- migration/change plateaus
- before/after comparisons
Main lesson from Chapter 8
The big lesson is that enterprise architecture frameworks become much more useful when treated as semantically constrained views over a better ontology.
Not the other way around.
Practical relevance of Batch 3
Batch 3 strongly reinforces several Governance Foundation positions.
1. Domain ontologies should specialize a canonical core
PHATO shows how to derive a domain ontology from a better-founded reference ontology. This is a strong precedent for Knowledge Ontology -> domain specialization.
2. Imported external models should be audited ontologically
The D3FEND analysis shows that adopted industry artifacts should not be trusted just because they are popular. They should be tested for incompleteness, overload, and under-specification.
3. Frameworks should be treated as overlays/views
The ArchiMate chapter strongly supports the idea that enterprise frameworks are not the semantic foundation. They are better understood as views that may need redesign to align with ontology.
4. Canonical ontology must support intervention semantics
Batch 3 reinforces that the model should support:
- subjects
- intentions
- dispositions
- triggers
- events
- controlled situations
- change over time
- domain specialization
5. Human and social factors belong in the ontology
The phishing chapter especially reinforces that social, behavioural, and cognitive factors are not outside the model. They are part of the real causal structure.
Batch 4 synthesis
What the final batch adds
Batch 4 does not introduce another big domain case. Instead, it consolidates the whole thesis.
That matters because it makes explicit what the author thinks the real contribution is:
- not just a phishing ontology
- not just a security extension for ArchiMate
- not just criticism of D3FEND
- but a repeatable ontology engineering approach grounded in UFO and carried through OntoUML into domain and framework artifacts
Chapter 9 organizes the thesis around six research contributions
The final chapter is very useful because it restates the thesis as a progression of six contributions:
- a systematic mapping of the security ontology landscape
- a general ontology of prevention grounded in UFO
- ROSE as a reference ontology for security from a risk-treatment perspective
- PHATO as a specialization of ROSE for phishing
- ontological analysis of D3FEND as evaluation of a practical knowledge artifact
- ontological analysis and redesign of ArchiMate security modeling
This makes the structure of the work very clear. The thesis is cumulative. Each layer supports the next one.
The deepest contribution is probably the method, not only the artifacts
Reading the final chapter, the strongest overall takeaway is that the thesis is really arguing for a method:
- map the domain and expose the gaps
- ground the core semantics in a foundational ontology
- model central mechanisms carefully
- build a reference ontology
- specialize it into more concrete domains
- use it to critique and redesign existing languages and knowledge artifacts
That is a very strong fit for Governance Foundation. It is close to the method we need for Knowledge Ontology work.
Prevention remains the conceptual hinge of the whole thesis
Chapter 9 makes clear that prevention is the central bridge between abstract ontology and practical security modeling.
This is important because the thesis does not define security mainly as a bag of controls. It defines security around how designed interventions prevent or reduce the realization of risk events.
That point is very reusable outside cybersecurity. For Governance Foundation, many governance mechanisms can also be understood as structured prevention or structured intervention.
The thesis argues strongly for well-founded models as practical tools
The final chapter is also very explicit that the work is meant to help:
- enterprise modeling researchers
- ontology engineers
- enterprise architects
- practitioners designing real systems
This is worth noting because it pushes back against the idea that foundational ontology is only philosophical overhead. The thesis argues the opposite: without those foundations, large practical artifacts become semantically brittle.
A major practical warning: large taxonomies are not enough
By the end of the thesis, one clear lesson is that practical value does not come from having lots of terms. It comes from having:
- good ontological distinctions
- meaningful constraints
- clean specialization
- reusable patterns
- explicit semantics
This is exactly the kind of lesson Governance Foundation should keep front and center. A large organizational vocabulary without these properties will still produce muddle.
Relevance for researchers and practitioners
The final chapter says the work matters because it can help:
- improve modeling languages and enterprise tools
- improve knowledge-graph quality
- improve enterprise architecture representations of security and risk
- support the design of systems for defense, health, and national security
Translated into Governance Foundation terms, the lesson is simple:
- the ontology is not just for documentation
- it is infrastructure for reasoning, tooling, and design improvement
Limitations are also important and honest
The thesis is pretty clear about its own limitations. Two especially important ones are:
- the theory of prevention does not yet handle interference well
- the work does not cover the whole of risk management
That first point matters a lot. Prevention is modeled strongly, but mitigation/interference is still only partially handled. So if Governance Foundation reuses this line of thought, it should avoid pretending the prevention theory already covers every kind of partial dampening, weakening, or delay.
The second point matters because a full governance ontology will need more than just:
- assessment
- treatment
It will also need things like:
- monitoring
- reporting
- consultation
- review
- communication
- compliance and institutional process
Future perspectives are unusually relevant
The future work section is not filler. It points toward directions that are highly relevant for Governance Foundation.
1. Formal ontology of prevention
The thesis explicitly wants a stronger formalization of prevention and interference, including first-order logic formalization and modularization with UFO.
For Governance Foundation, that suggests a path from:
- narrative conceptual guidance
- to formal ontology modules
- to machine-checkable rules and tests
2. Object-event simulation
This is one of the most exciting parts. The thesis proposes object-event simulation for risk and security modeling.
That fits extremely well with the idea that ontology should not only classify reality but support:
- scenario analysis
- simulation
- reasoning about interventions
- before/after architectural comparisons
This feels very aligned with where a mature Knowledge Ontology Runtime Model could eventually go.
3. Continued PHATO validation
The author plans to keep validating PHATO through:
- more literature review
- expert validation sessions
- alignment with datasets
That is a strong practical reminder that ontology work is not done when the model is drawn. It needs iterative validation against evidence and operational usage.
4. Unified ontology of value, risk, and security
This is probably the most relevant future direction for Governance Foundation. The thesis explicitly points toward integrating COVER and ROSE into a unified ontology of value, risk, and security.
That strongly resonates with the Governance Foundation direction because organisational ontology also needs to connect:
- value
- risk
- intervention
- governance
- capability
- incident
- resilience
The thesis even notes a very interesting framing:
- incidents as actual prevention of value
- risks as possible prevention of value
- security as a form of double prevention
That is a really strong idea and worth preserving.
5. Better-founded threat intelligence models
The thesis proposes a future well-founded model combining D3FEND and ATT&CK.
The broad lesson for Governance Foundation is that imported operational taxonomies should eventually be reworked into a cleaner semantic substrate before being trusted as canonical machine knowledge.
6. Ontological analysis of FMEA
This is another useful signpost. It shows the method is portable beyond cybersecurity and into reliability/safety engineering.
That portability matters, because Governance Foundation should not treat OntoUML only as a cybersecurity lens. It is a way of engineering clearer conceptual models across domains.
Appendix A matters because the work is deliberately kept alive
Appendix A lists public project repositories and PURLs for the ontology artifacts:
- prevention ontology
- ROSE
- D3FEND analysis
- phishing ontology
- ArchiMate security modeling artifacts
That matters because the thesis treats ontology work as a living artifact, not a frozen PDF.
This is very aligned with what Max asked for in this chat. The OntoUML synthesis should stay living and updateable in the repo.
Appendix B is more important than it first looks
The vocabulary appendix is extremely useful. It provides compact definitions for the novel terms introduced across the thesis.
Some especially valuable terms to preserve are:
- Control Capability
- Control Event
- Control Chain Event
- Controlled Situation
- Countermeasure to
- Security Mechanism
- Security Designer
- Protected Subject
- Protection Trigger
- Mutual Activation Partnership
- Prevention
- Generic Intention
- Specific Intention
- phishing-specific terms like Scammer, Hook, Lure, Target, Target's Fragility, Phishing Enabler, Asset Catch, and Vulnerability Condition
This appendix is almost a seed dictionary for a reusable ontology engineering glossary.
Best lessons from the appendices
The appendices reinforce three things:
- ontology work should have stable public artifacts and identifiers
- vocabulary should be made explicit and maintained as a reference asset
- conceptual work is more reusable when its terms are kept crisp and versionable
Practical relevance of Batch 4
Batch 4 sharpens the Governance Foundation implications a lot.
1. The real reusable asset is the ontology engineering method
The thesis is not only a set of outputs. It is a method for building better conceptual infrastructure.
2. A runtime ontology should eventually support simulation and reasoning
The future-work emphasis on formalization and object-event simulation strongly supports a runtime-oriented direction, not just static docs.
3. Governance Foundation needs more than prevention alone
If we borrow heavily from this thesis, we should also consciously extend it into:
- interference/mitigation
- monitoring
- reporting
- review
- institutional communication
- governance process loops
4. Stable identifiers and living docs matter
Appendix A reinforces the value of persistent artifacts and public references. That is a good pattern for long-lived ontology assets in Governance Foundation.
5. Explicit glossary work is not optional
Appendix B makes it obvious that good ontology work eventually needs a maintained vocabulary layer, not just prose pages.
Strongest final interpretation for Governance Foundation
After all four batches, the most convincing reading of the thesis is:
- UFO provides the deep foundational distinctions
- OntoUML provides the discipline for building clear conceptual models
- reference ontologies such as COVER and ROSE provide reusable semantic cores
- domain ontologies specialize those cores into concrete problem areas
- frameworks and modeling languages should be treated as overlays or translations, not as semantic source-of-truth
- good ontology work must include constraints, vocabulary, specialization discipline, and living artifacts
- the next mature step is runtime semantics, including reasoning, validation, and possibly simulation
Best OntoUML ideas to carry forward
These are the strongest reusable ideas so far.
1. Model the world, not just the reporting framework
This is the deepest lesson. The model should aim to capture what is there, not just how one framework wants to talk about it.
2. Identity matters
The model has to distinguish what gives something its identity from the temporary contexts it enters. This is why kind, role, and phase distinctions matter.
3. Relationships often deserve ontological substance
Many important organisational relationships are not just lines. They are structured social or normative arrangements. This is why relators matter.
4. Capabilities, vulnerabilities, and liabilities are not the same as events
They are dispositions that may manifest under certain conditions. This gives a much better basis for reasoning about risk, opportunity, governance, and change.
5. Interventions should be modeled causally
Controls, policies, security mechanisms, and governance mechanisms should be modeled in terms of what they change in the causal and dispositional setup of the world.
6. Frameworks should be views over the ontology
This aligns strongly with the Governance Foundation position that TOGAF, BMC, and similar models should be layered as presentations/translations rather than treated as the canonical storage structure.
What this likely means for Knowledge Ontology
At this stage, the strongest working interpretation is:
Canonical ontology layer
The canonical layer should likely model things such as:
- organisations
- people
- teams
- roles
- capabilities
- services
- products
- applications
- data objects
- infrastructure elements
- decisions
- policies
- risks
- vulnerabilities
- dependencies
- controls
- workflows
- events
- evidence
- obligations
- agreements
Not all of these are the same ontological kind of thing
Some are likely:
- kinds
- roles
- phases
- relators
- qualities
- dispositions
- events
- situations
That is exactly why OntoUML is useful.
Agents should not just store notes
Agents should be able to persist knowledge into this ontology as:
- typed entities
- typed relationships
- structured relators
- dispositions and qualities
- event records
- state/phase changes
- evidence and provenance
- confidence and contradiction markers
Rules should follow ontological distinctions
Examples:
- a role should depend on an appropriate context
- a phase should not be modeled as a permanent kind
- a control should connect to what it is capable of preventing
- a risk score should not be confused with the risk event type itself
- a contract-like relation may need a relator rather than a bare link
Governance Foundation working heuristics
Until a fuller formal model exists, these are good working heuristics.
Treat these as likely different
Do not casually collapse:
- organisation vs organisational role
- capability vs process
- process vs event occurrence
- vulnerability vs incident
- control mechanism vs control event
- goal vs policy
- contract vs relationship line
- confidence score vs evidence
Prefer structure over convenience when it matters
If the ontology will be used by agents and rules, convenience modeling shortcuts become future problems.
Separate canonical semantics from presentation semantics
A framework may present:
- capability map
- value stream
- application inventory
- governance structure
But those presentations should be derived from the canonical ontology where possible.
Common modeling mistakes to watch for
These are exactly the kinds of problems OntoUML helps catch.
Role as kind mistake
Bad pattern:
- model
Customeras if it were a permanent kind of person
Better:
Personas kindCustomeras role
State as kind mistake
Bad pattern:
- model
Draft DocumentandPublished Documentas unrelated kinds
Better:
- underlying thing persists
- draft/published are phase-like distinctions
Relationship flattening mistake
Bad pattern:
Personlinked toOrganisationwith a simple line when the real thing is employment, appointment, membership, or contract
Better:
- model the underlying relator where the semantics matter
Event-disposition confusion
Bad pattern:
- capability treated as if it were the same thing as the behavior/event itself
Better:
- capability is a disposition
- event is its manifestation under certain conditions
Score-reality confusion
Bad pattern:
- risk score treated as if it were the same thing as the risk structure itself
Better:
- score is a quality/assessment artifact
- risk setup is a broader ontological configuration
What still needs to be synthesized
The thesis batch synthesis is now complete through Batch 4.
The next work should shift from thesis extraction to synthesis application:
- map current Knowledge Ontology concepts into OntoUML-style categories
- define a sharper Knowledge Ontology Runtime Model
- identify where Governance Foundation needs concepts beyond the thesis, especially around monitoring, reporting, review, and interference/mitigation
- start a maintained glossary or vocabulary page derived from the strongest terms in the guide
Current Governance Foundation implications
So far, the thesis reinforces these architectural positions:
- The canonical knowledge layer should sit below framework views
- OntoUML is useful because it carries foundational distinctions into conceptual models
- Frameworks should be views over the ontology, not the ontology itself
- Agents need access to ontological distinctions such as role, disposition, event, state, capability, and relationship
- Controls, interventions, and policies should be modeled as structured causal mechanisms, not just labels
Current synthesis status
This guide currently includes:
- thesis structure
- the grounding stack
- plain-English concept notes
- Batch 1 synthesis
- Batch 2 synthesis
- Batch 3 synthesis
- Batch 4 synthesis
- practical Governance Foundation interpretation
Still to be added:
- a more explicit mapping from current Knowledge Ontology concepts to OntoUML-style categories
- a first-cut OntoUML-informed runtime object model for agents
- a compact glossary/vocabulary artifact derived from the thesis and adapted for Governance Foundation use