<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>A Broker Framework for Secure and Cost-E ective Business Process Deployment on Multiple Clouds</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Elio Goettelmann</string-name>
          <email>elio.goettelmann@tudor.lu</email>
          <xref ref-type="aff" rid="aff1">1</xref>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Karim Dahman</string-name>
          <email>k.dahman@bluage.com</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Benjamin Gateau</string-name>
          <email>benjamin.gateau@tudor.lu</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Claude Godart</string-name>
          <email>claude.godart@loria.fr</email>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Blu Age - Netfective Technology</institution>
          ,
          <addr-line>Pessac</addr-line>
          ,
          <country country="FR">France</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>CRP Henri Tudor</institution>
          ,
          <addr-line>Kirchberg</addr-line>
          ,
          <country country="LU">Luxembourg</country>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>LORIA - INRIA Grand Est, Universite de Lorraine</institution>
          ,
          <addr-line>Nancy</addr-line>
          ,
          <country country="FR">France</country>
        </aff>
      </contrib-group>
      <fpage>49</fpage>
      <lpage>56</lpage>
      <abstract>
        <p>Security risk management on information systems provides security guarantees while controlling costs. But security risk assessments can be very complex, especially in a cloud context where data is distributed over multiple environments. To prevent costs from becoming the only cloud selection factor, while disregarding security, we propose a method for performing multiple cloud security risk assessments. In this paper we present a broker framework for balancing costs against security risks. Our framework selects cloud o ers and generates deployment-ready business processes in a multi-cloud environment.</p>
      </abstract>
      <kwd-group>
        <kwd>Business Process</kwd>
        <kwd>Security Risk Management</kwd>
        <kwd>Cloud</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>Introduction</title>
      <p>The Cloud business model proposes a multitude of di erent services, at di erent
prices, and with various quality levels. While the use of cloud computing can
reduce costs, the selection of a solution is time consuming. For this purpose,
cloud brokers have emerged; they can help cloud consumers to select adequate
solutions, by comparing existing o ers, essentially against their prices.</p>
      <p>
        But security is still an important factor for a cloud selection process. As cloud
computing presents new kinds of security risks ([
        <xref ref-type="bibr" rid="ref3">3</xref>
        ], [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ]), they need to be treated
before wider adoption. Novel methods have to be de ned in order to prevent
these potential losses on companies.
      </p>
      <p>In turn, distributing software over multiple locations increases the complexity
of gathering sensitive business information. In this paper, we propose a
framework for cloud brokers which helps them analyze the security levels of di erent
cloud o ers, following standard risk assessment methodologies, with respect to
cloud o ers.</p>
      <p>The paper is organized as follows. Section 2 presents a motivating example
used to demonstrate the purpose and the scope of our framework. Section 3
describes our tool, its implementation on the motivating example and experimental
results. Section 4 and Section 5 discuss respectively related and future work.
2</p>
    </sec>
    <sec id="sec-2">
      <title>Motivating Example and Overview</title>
      <p>In this section, we introduce a motivating example to illustrate our framework.
Then we give an overview of our approach for selecting clouds when deploying
business processes.</p>
      <p>e
c
n
a
r
u
s
n
I</p>
      <p>Initiate
Claim
Account</p>
      <p>Claim</p>
      <p>HospOitbatlaRineport</p>
      <p>Medical Report</p>
      <p>Obtain
Incident Details Hospital Details Hospital Report</p>
      <p>Obtain</p>
      <p>Expert Report
Incident Details</p>
      <p>Obtain
Police Report</p>
      <p>Police Report</p>
      <p>Send
Reimbursement</p>
      <p>Decision
Expert Report
Amount</p>
      <p>Validate
Reimbursement</p>
      <p>
        Consider an insurance claim recovery chain [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ] as a BPMN business process
model depicted in Fig. 1. This process is initiated when an insurance company
receives a claim recovery declaration from a bene ciary. To obtain details about
the incident, the emergency service is invoked. The hospital and police reports
are required by the expert to decide if the reimbursement will be accepted or
not. If so, the bank is requested and a noti cation is sent to the bene ciary.
      </p>
      <p>Now suppose that the insurance company wants to outsource the software
supporting this process to the cloud to reduce costs. It has not necessarily the
knowledge of moving it e ectively on its own. A cloud broker could support the
company by evaluating the security risks of a cloud outsourcing, selecting
the adequate o ers and decomposing the process to deploy it on multiple
clouds. These three tasks are detailed below.</p>
      <p>Our tool consists in a design-time framework for producing secure and
coste ective business processes on multiple cloud. It is illustrated in Fig.2.</p>
      <sec id="sec-2-1">
        <title>Cloud Consumer</title>
      </sec>
      <sec id="sec-2-2">
        <title>Cloud Broker</title>
      </sec>
      <sec id="sec-2-3">
        <title>Cloud Provider</title>
        <p>Security Needs</p>
      </sec>
      <sec id="sec-2-4">
        <title>Risk</title>
      </sec>
      <sec id="sec-2-5">
        <title>Assessment</title>
        <p>Business
processes</p>
      </sec>
      <sec id="sec-2-6">
        <title>Cloud</title>
      </sec>
      <sec id="sec-2-7">
        <title>Selection</title>
        <p>Cloud Offers</p>
      </sec>
      <sec id="sec-2-8">
        <title>Decomposition</title>
        <p>Configuration</p>
        <p>First, a cloud broker requests the security needs as non-functional
requirements from the cloud consumer and analyzes the cloud o ers from the cloud
provider to realize a risk assessment.</p>
        <p>Second, the broker uses the business processes from the cloud consumer to
select the adapted cloud o ers based on the functional requirements, the costs
and the previously calculated risk.</p>
        <p>
          Third, the broker decomposes the business process into smaller parts, as
each task can be enacted on a di erent cloud o er. The generated con guration
is the assignment of these process fragments to cloud o ers. The decomposition
itself has already been addressed in [
          <xref ref-type="bibr" rid="ref8">8</xref>
          ].
3
        </p>
        <p>Implementation, experimentation and evaluation
To demonstrate the feasibility of the approach, we illustrate on our motivating
example the three previously de ned steps of the broker tool.
3.1</p>
        <sec id="sec-2-8-1">
          <title>Risk Assessment</title>
          <p>The risk assessment is threefold: security needs de nition, risk evaluation and
cloud provider exclusion.</p>
          <p>Security needs de nition Our framework uses the ve CIANA objectives
(Con dentiality, Integrity, Availability, Non-Repudiation, Authenticity) to de ne
the security need of each data object of the process (Fig. 1). If the data object
needs the objective, the value is equal to 1, otherwise to 0 (see Table 1). Typically,
these security needs are negotiated by a risk manager with the cloud consumer.</p>
          <p>As business process deployment is task-centric, these values need to be
translated into security needs on tasks. We use the maximum values of the input and
output objects of a task. For example, Obtain Incident Details is associated to
the data objects Claim, Incident Details and Hospital Details. So, by taking the
maximum of each data object's need we get the need of Obtain Incident
Details: f0, 1, 1, 1, 1g for respectively fConf identiality, Integrity, Availability,
N on-Repudiation, Authenticityg.</p>
          <p>
            Risk evaluation for each provider In this paper we take into account ve
cloud security threats given by the CSA [
            <xref ref-type="bibr" rid="ref3">3</xref>
            ] to evaluate the risk. These threats
are each related to the 5 CIANA objectives:
{ Data Breaches = fCon dentialityg
{ Data Loss = fAvailability, Non-Repudiationg
{ Account Hijacking = fCon dentiality, Integrity, Availability, Non-Repudiation,
          </p>
          <p>Authenticityg
{ Insecure Interfaces = fCon dentiality, Integrity, Authenticityg
{ Denial of Service = fAvailabilityg
Harm - We combine these relations with the security needs of each data object
to obtain a so-called harm. The harm is de ned on each data object, for each
threat through the sum of the a ected security needs. For example, the Insecure
Interfaces threat (t) has the following harm on Obtain Incident Details (ta):
Harm(t; ta) = (1 0) + (1 1) + (0 1) + (0 1) + (1 1) = 3
The rst value of each bracket is equal to 1 if the threat is related to the objective,
0 otherwise, and the second value is the need calculated previously. Notice that
the harm value is in this case always between 0 and 5. The result for all tasks
of the process can be seen in Table 2.</p>
          <p>
            Coverage - Now that we have the harm of a threat on each task of the process, we
need to determine the response to these threats for each cloud provider. For this
information we use the STAR Registry and the matrix de ned by the CSA [
            <xref ref-type="bibr" rid="ref3">3</xref>
            ].
          </p>
          <p>The CSA matrix de nes a list of security controls a cloud provider should
implement to reduce security risks. Each of these controls can be related to
one or multiple threats. For example, the control "IS-19.4 - Do you maintain
key management procedures ?" mitigates the Data Breaches threat. This matrix
de nes a total of 197 controls to implement in order to respond to all threats in
the best possible way.</p>
          <p>The STAR Registry publishes the list of implemented controls for providers
willing to follow these recommendations. These lists are freely accessible and can
help to check if a control has been put in place by a speci c provider or not.</p>
          <p>In our case, we use these two information as binary values (a control mitigates
a threat or not / a control is implemented by a provider or not) to calculate
a so-called coverage score, which indicates the response of a provider to a
given threat. This value is a percentage, if the provider implements all controls
mitigating a threat, it gets a coverage for this threat of 100%. In our case, this
percentage is brought to a score on a scale of 0 to 5 (with 5 equivalent to 100%).
We took 5 providers from the registry and calculated their coverage score, it is
available in Table 2.</p>
          <p>Too risky provider exclusion Usually, the vulnerability is assessed and used to
calculate a risk value of an information system. But in a cloud context, providers
may be tempted to conceal their vulnerabilities for security reasons. This is why
we use the coverage based on the security controls. By using the maximum
possible coverage value Covgmax (in our case 5), it is possible to get an equivalent
to the vulnerabilities. Therefore, by combining this value with the harm we can
de ne the following risk formula for a threat t, a task ta and a provider p:
Risk(t; ta; p) = Harm(t; ta) + (Covgmax Covg(p; t))
Table 3 shows the maximum risk value for the ve CSA threats, for the tasks
of our motivating example, on ve di erent providers (Softlayer4, CloudSigma5,
FireHost6, SHI Int.7 and Terremark8).</p>
          <p>In accordance with the consumer, the broker de nes the level of acceptable
risk (referred to as threshold). For a given task, this threshold de nes the
providers with a too high risk value and excludes these deployment options. In
our example, we set the threshold to 5, the cells of eliminated providers are
grayed out in Table 3. Respectively a white cell means that the task can be
deployed on the provider.
3.2</p>
        </sec>
        <sec id="sec-2-8-2">
          <title>Cloud Selection</title>
          <p>We select the target cloud environments in two stages: di erent con gurations
evaluation and nal clouds selection.</p>
          <p>Con gurations evaluation We need to evaluate the di erent possible
deployment con gurations. To do this, we introduce a cost model which will allow us
to balance the risks against the costs.</p>
          <p>Cost model - Our cost model takes into account three types of costs:
{ Usage costs, the CPU power needed to execute the process ($/GHz/month).</p>
          <p>The need is annotated on the tasks of the process.
{ Storage costs, the space needed by the data of the process ($/GB/month).</p>
          <p>The size is annotated on the data objects of the process.
{ Transfer costs, the amount of incoming/outgoing messages ($/GB). This
size is calculated with the data exchanged between the process fragments.
4 http://www.softlayer.com
5 http://www.cloudsigma.com
6 http://www.firehost.com
7 http://www.shi.com
8 http://www.terremark.com</p>
          <p>Softlayer
CloudSigma AG
FireHost
SHI International, Corp.</p>
          <p>Terremark</p>
          <p>We can notice that the transfer costs conduct to a regrouping of the tasks
on one main o er to restrain the global costs.
The process is deployed on the target environments in two steps: process
decomposition and fragments deployment.</p>
          <p>
            Secure and Cost-E ective BP Deployment on Multiple Clouds 55
Process decomposition According to the selected con guration, the process
is decomposed in multiple process fragments. A fragment is an autonomic
business process enacted on one cloud and includes additional synchronization tasks.
These additional tasks support the collaboration with the remote fragments to
guarantee the control ow of the initial process. More details can be accessed
in [
            <xref ref-type="bibr" rid="ref7">7</xref>
            ] and in [
            <xref ref-type="bibr" rid="ref8">8</xref>
            ].
          </p>
          <p>The decomposed motivating example according to the selected con guration
is depicted in Fig.3 (grey activities are synchronization tasks).</p>
          <p>a
m
g
i
S
d
u
o
l
C
It.I
n
H
S</p>
          <p>
            Deployment in clouds The last step of our approach consists in deploying this
con guration on the selected cloud o ers. In [
            <xref ref-type="bibr" rid="ref8">8</xref>
            ] we presented how we deploy such
service composition as BPEL programs on remote service orchestration engines
(e.g., Apache ODE9).
4
          </p>
        </sec>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>Related Work</title>
      <p>
        In [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ] the authors present methods to distribute applications on di erent cloud
environments. However security aspects are not considered. The authors of [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ]
are adapting processes through risk-reduction patterns, and in [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ] processes are
analyzed to decide if they are ready for a cloud deployment or not. But these
two methods do not show the calculation of the risk value and do not consider
process fragmentation.
      </p>
      <p>
        In opposition to our proposal, [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ] provides a risk-prediction algorithm to
help users to take decisions during the execution of the process. We focus on
design-time rather than on runtime, which changes slightly the kind of treated
risks.
      </p>
      <p>
        The model presented in [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ] allows to evaluate security vulnerabilities in a
Service Oriented Architecture, but does not take into account the cloud context.
Our coverage approach based on security controls given in di erent standards
([
        <xref ref-type="bibr" rid="ref1">1</xref>
        ], [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ]) seems to be more adapted to such a context.
      </p>
      <p>
        Watson [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ] decomposes work ows and deploys them on multiple clouds
according to a cost model, but he de nes arbitrary security levels for each provider.
A more complete cost model is presented in [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ], but it is not easily adaptable
in the business process context for an automated treatment as it is done in our
approach.
9 http://ode.apache.org/
5
      </p>
    </sec>
    <sec id="sec-4">
      <title>Conclusion and Future Work</title>
      <p>In this paper we have presented a cloud broker framework for assessing security
risks in a multiple-cloud context. We assess security risks of cloud providers
using standard-based and industry accepted security controls and risk listings. We
focus on one business process to illustrate how these risk values, in combination
with costs, can help a cloud broker to take decisions for the cloud provider
selection. The paper demonstrates the feasibility of our approach with a motivating
example and real cloud providers.</p>
      <p>Some limitations are not addressed in this paper. First, the shortage of
empirical evaluation on real use cases, which will be realized in future works with
domain experts and industrial partners. Another point is that our approach takes
place at design-time, but as the Cloud is a very dynamic context, extending our
framework to con guration at run-time would be an interesting improvement.
Finally, the binary values for the security needs, mitigations and control
implementation could be replaced with more complete scales, as some security controls
\better" mitigate threats than others.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1. ISO/IEC 27017,
          <string-name>
            <surname>Information</surname>
            <given-names>tech.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Security</surname>
            <given-names>techniques</given-names>
          </string-name>
          ,
          <article-title>Code of practice for information security controls for cloud computing services based on ISO/IEC 27002</article-title>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <given-names>O.</given-names>
            <surname>Altuhhova</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Matulevicius</surname>
          </string-name>
          , and
          <string-name>
            <given-names>N.</given-names>
            <surname>Ahmed</surname>
          </string-name>
          .
          <article-title>Towards de nition of secure business processes</article-title>
          .
          <source>In CAiSE Workshops</source>
          , pages
          <volume>1</volume>
          {
          <fpage>15</fpage>
          ,
          <year>2012</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <given-names>Cloud</given-names>
            <surname>Security Alliance. Cloud</surname>
          </string-name>
          Control Matrix / Security, Trust &amp; Assurance Registry / Consensus Assessments Initiative Questionnaire.
          <source>Technical report.</source>
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <given-names>R.</given-names>
            <surname>Conforti</surname>
          </string-name>
          , M. de Leoni,
          <string-name>
            <given-names>M. L.</given-names>
            <surname>Rosa</surname>
          </string-name>
          , and W. M. van der Aalst.
          <article-title>Supporting riskinformed decisions during business process execution</article-title>
          .
          <source>In CAiSE'13</source>
          , pages
          <fpage>116</fpage>
          {
          <fpage>132</fpage>
          ,
          <string-name>
            <surname>Valencia</surname>
          </string-name>
          , Spain,
          <year>2013</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <given-names>European</given-names>
            <surname>Network</surname>
          </string-name>
          and Information Security Agency.
          <article-title>Bene ts, risks and recommendations for information security</article-title>
          .
          <source>Technical report</source>
          ,
          <year>2009</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <given-names>W.</given-names>
            <surname>Fdhila</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Dumas</surname>
          </string-name>
          , and
          <string-name>
            <given-names>C.</given-names>
            <surname>Godart</surname>
          </string-name>
          .
          <article-title>Optimized decentralization of composite web services</article-title>
          .
          <source>In CollaborateCom'10</source>
          , pages
          <fpage>1</fpage>
          {
          <fpage>10</fpage>
          ,
          <year>2010</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <given-names>W.</given-names>
            <surname>Fdhila</surname>
          </string-name>
          ,
          <string-name>
            <given-names>U.</given-names>
            <surname>Yildiz</surname>
          </string-name>
          , and
          <string-name>
            <given-names>C.</given-names>
            <surname>Godart</surname>
          </string-name>
          .
          <article-title>A exible approach for automatic process decentralization using dependency tables</article-title>
          .
          <source>In ICWS '09</source>
          , pages
          <fpage>847</fpage>
          {
          <fpage>855</fpage>
          , Washington, DC, USA, 09. IEEE Computer Society.
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <given-names>E.</given-names>
            <surname>Goettelmann</surname>
          </string-name>
          ,
          <string-name>
            <given-names>W.</given-names>
            <surname>Fdhila</surname>
          </string-name>
          , and
          <string-name>
            <given-names>C.</given-names>
            <surname>Godart</surname>
          </string-name>
          .
          <article-title>Partitioning and cloud deployment of composite web services under security constraints</article-title>
          .
          <source>In IC2E'13</source>
          ,
          <year>2013</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <given-names>F.</given-names>
            <surname>Leymann</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Fehling</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Mietzner</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Nowak</surname>
          </string-name>
          , and
          <string-name>
            <given-names>S.</given-names>
            <surname>Dustdar</surname>
          </string-name>
          .
          <article-title>Moving applications to the cloud: an approach based on application model enrichment</article-title>
          .
          <source>IJCIS</source>
          ,
          <volume>20</volume>
          (
          <issue>3</issue>
          ):
          <volume>307</volume>
          {
          <fpage>356</fpage>
          ,
          <year>2011</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <given-names>B.</given-names>
            <surname>Martens</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Walterbusch</surname>
          </string-name>
          , and
          <string-name>
            <given-names>F.</given-names>
            <surname>Teuteberg</surname>
          </string-name>
          .
          <article-title>Costing of cloud computing services: A total cost of ownership approach</article-title>
          .
          <source>In ICSS'12</source>
          , pages
          <fpage>1563</fpage>
          {
          <fpage>1572</fpage>
          ,
          <year>2012</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <given-names>S.</given-names>
            <surname>Sackmann</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Lowis</surname>
          </string-name>
          , and
          <string-name>
            <given-names>K.</given-names>
            <surname>Kittel</surname>
          </string-name>
          .
          <article-title>A risk based approach for selecting services in business process execution</article-title>
          .
          <source>In Wirtschaftsinformatik (1)</source>
          , pages
          <fpage>357</fpage>
          {
          <fpage>366</fpage>
          ,
          <year>2009</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <given-names>P.</given-names>
            <surname>Watson.</surname>
          </string-name>
          <article-title>A multi-level security model for partitioning work ows over federated clouds</article-title>
          .
          <source>In CloudCom</source>
          , pages
          <volume>180</volume>
          {
          <fpage>188</fpage>
          ,
          <year>2011</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13. S. Wenzel, C. Wessel,
          <string-name>
            <given-names>T.</given-names>
            <surname>Humberg</surname>
          </string-name>
          , and
          <string-name>
            <given-names>J.</given-names>
            <surname>Ju</surname>
          </string-name>
          <article-title>rjens. Securing processes for outsourcing into the cloud</article-title>
          .
          <source>In CLOSER</source>
          , pages
          <volume>675</volume>
          {
          <fpage>680</fpage>
          ,
          <year>2012</year>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>