<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>A Semantic Context-Aware Privacy Model for FaceBlock</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Primal Pappachan</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Roberto Yus</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Prajit Kumar Das</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Tim Finin</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Eduardo Mena</string-name>
          <email>emenag@unizar.es</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Anupam Joshi</string-name>
          <email>joshig@cs.umbc.edu</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>University of Maryland</institution>
          ,
          <addr-line>Baltimore County, Baltimore</addr-line>
          ,
          <country country="US">USA</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>University of Zaragoza</institution>
          ,
          <addr-line>Zaragoza</addr-line>
          ,
          <country country="ES">Spain</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>Wearable computing devices like Google Glass are at the forefront of technological evolution in smart devices. The ubiquitous and oblivious nature of photography using these devices has made people concerned about their privacy in private and public settings. The FaceBlock3 project protects the privacy of people around Glass users by making pictures taken by the latter, Privacy-Aware. Through sharing of privacy policies, users can choose whether or not to be included in pictures. However, the current privacy model of FaceBlock only permits simple constraints such as allow versus disallow pictures. In this paper, we present an extended context-aware privacy model represented using OWL ontologies and SWRL rules. We also describe use cases of how this model can help FaceBlock to generate Privacy-Aware Pictures depending on context and privacy needs of the user.</p>
      </abstract>
      <kwd-group>
        <kwd>Privacy</kwd>
        <kwd>Google Glass</kwd>
        <kwd>Semantic Web</kwd>
        <kwd>context-aware</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>
        Google Glass is a wearable device with an optical head-mounted display that
enable users to take pictures just by saying \OK Glass, take a picture" or
winking. Therefore, the device has raised privacy concerns because it has a readily
available camera which can take pictures without anyone noticing. We
developed FaceBlock [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ] as a solution to preserve the privacy of users in this new
scenario4.
      </p>
      <p>
        FaceBlock allows users to state their policy about being photographed (i.e.,
\I don't want my picture to be taken") by other people. To start with, FaceBlock
generates an eigenface [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ], a mathematical representation which we call a face
3 http://face-block.me/
4 Notice that FaceBlock can be used to preserve the privacy of users from pictures
taken by any smart device (e.g., eyewear, smartphone, tablet, camera). However, we
emphasize Google Glass, as eyewear devices are raising privacy concerns among the
general public.
identi er (see Figure 1(b)) using a picture of the user's face (see Figure 1(a)).
Whenever a Glass user is in the vicinity of the user, FaceBlock forms an ad hoc
connection with it and sends the face identi er along with the policy. In order to
enforce the policy, the FaceBlock application running on Google Glass uses the
face identi er to detect if the user who shared the policy is part of the pictures
taken by the device (see Figure 1(c)). It then selectively obscures the face of all
the people who have sent such a policy to the device (see Figure 1(d)). Using
eigenfaces helps to preserve the privacy of the sender even if the transmission is
intercepted and at the same time the enforcement of the policy rule ensures the
privacy in any pictures taken.
      </p>
      <p>While being helpful in safeguarding privacy, such an all-or-nothing model
does not help in many real-life situations. A person's preferences would depend
on the context of the situation (e.g., time, place, activity and participants), who
is taking the picture and with whom it may be shared. For example, policies like
\I am okay being photographed by people I know at a private event" or \I do not
like to be photographed when I am at public places". Therefore, to handle such
policies, the system should understand the semantics of concepts such as \public
place", \people I know" or \private event" as well as other elements describing
situation of the user.</p>
      <p>FaceBlock's current privacy model allows a user's device to specify whether
she wants her image obfuscated in pictures. Privacy-aware pictures are disabled
by default privacy policy when there is no active policy sent by the other users.
The current simple privacy model does not allow statements that photography
is permitted, using the approach of \whatever is not explicitly prohibited, is
permitted". Instead of asking everyone around if it is okay to take a picture, a
Glass user might prefer or require having a positive statement from the subjects
that the image can be displayed in public. Therefore, including a way for a person
to grant permission is also an obvious way to improve FaceBlock.
2</p>
    </sec>
    <sec id="sec-2">
      <title>Context-Aware Policies</title>
      <p>
        Arguably one of the most accepted de nition of the concept \context" was
suggested by Dey and Abowd [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]: \[...] any information that can be used to
characterize the situation of an entity. An entity is a person, place, or object that is
considered relevant to the interaction between a user and application, including
the user and applications themselves.". Dey and Abowd also decompose context
into two categories: primary context pieces (i.e., identity, location, activity, and
time) and secondary context pieces (context aspects that are attributes of the
primary context, e.g., a user's phone number can be obtained by using the user's
identity). This information about the context of a user can be modeled in an
ontology (see Figure 2).
      </p>
      <p>
        The payload of FaceBlock's current policy includes the face identi er and
privacy policy (allow vs. disallow pictures). However, more ne-grained privacy
policies can be added to the FaceBlock system using Semantic Web technologies.
The use of ontologies to represent privacy policies has been studied before in [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ].
Incorporating context-based rules will allow a higher degree of granularity and
control in the application of the policy rules for generating privacy-aware
pictures. This would allow privacy policy to be applied at the speci c context piece
mentioned or a subclass of that concept from the ontology. In the following we
present the di erent types of context-aware semantic policies.
      </p>
      <p>
        Location-aware policies. The basic assumption for the FaceBlock application
is that both concerned parties (the Google Glass user and a mobile user) are
at the same location. This is justi ed by use of peer-to-peer (P2P) networks
for sharing the policy between two users. In our scenario we treat location
context semantically as in \at the bar", \at the University campus" or \inside my
home". We de ne location hierarchy by referencing existing entities from linked
data ontologies such as DBpedia [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ] or GeoNames whenever possible. Usage of
ontologies enables FaceBlock to apply privacy policy for specialization of
general concepts. For example, if a student has speci ed that she does not want her
pictures to be taken at the University buildings, it is assumed that she does not
want any pictures to be taken at the University library unless speci ed by policy
that she does not mind pictures being taken at the library.
      </p>
      <p>
        Activity-aware policies. Activity adds another dimension to the meaning of
location. For example, a classroom used for private meetings versus public
lectures. Activity recognition is included in current smart devices at some extent.
For example, Google recently introduced through Android API version 8 and
above the ability to recognize simple activities like \in a vehicle", \on a
bicycle", \running", \still, \tilting", and \on foot". For other complex activities,
there are systems [
        <xref ref-type="bibr" rid="ref11 ref5 ref6">6, 5, 11</xref>
        ] that can infer the activity using information provided
by the user, sensors on the device, or even information from third party sources
such as calendar, event announcement, and email messages. Example policies
which would be activity dependent are: \don't allow my picture when I'm
dancing" (shared by a user), \don't allow pictures during meetings" (shared by a
meeting room). The later policy will be applied to di erent types of meetings
de ned in the ontology (e.g., business meeting and research meeting).
Identity-aware policies. While sharing personal information such as pictures,
the identity of entities (such as organizations or people) with whom it is being
shared is an important aspect. The identity of user can be an unique user ID
based on the device's MAC ID or a DigitalID veri ed by a trusted third party
or other sources such as ontologies of social networks (e.g., FOAF and
Facebook) or simply activity or location based (users who are at the same location
and performing same activity, e.g., participants in a con dential meeting). The
identi cation property in context ontology is used to identify the user when rst
encountered. Example of an identity-driven privacy policy could be: \don't
allow my picture by people who are not in my close-friend circle on Google Plus
social network", \don't allow my picture by people who are not in my colleagues
circle if I am at the o ce". Depending upon the ontological de nition, the last
policy would apply for the team members in the same o ce as well as remote
collaborators who might occasionally visit the o ce.
      </p>
      <p>Time-aware policies. While time is ingrained into other aspects of context,
it allows for an all-embracing notion of privacy in pictures without worrying
about the location and activity of users. For example, users could mention in
their privacy policy that no pictures of them should be taken after 5:00 pm
on Fridays irrespective of the activity or location. Time driven policy examples
could be \don't allow my picture on Friday after 5:00 pm till Monday until 8:00
am", \don't take my picture during holidays". Continuing from the last example,
as Spring Break would be classi ed as holidays, FaceBlock will be active during
the time.</p>
      <p>Composite policies. Most user situations demand a combination of various
types of context-aware policies described above. Complex policies could possibly
include rules that take into consideration more than one or all aspects of context
as de ned above. A possible example of such a scenario would be \do not allow
my social network colleagues group (identity context) to take pictures of me
(identity context) at parties (activity context) held on weekends (time context)
at the beach house (location context)". We propose to prede ne these rules
using the Semantic Web Rule Language (SWRL) based on FaceBlock's context
ontology (see Figure 2). For example, Figure 3 shows the SWRL rule that models
the previous policy. Notice that FaceBlock creates an maintains updated an
instance of the Context class with the current context of the user. Also, to model
whether a user is allowed to take pictures or not of another person we use the
data property FaceBlockPictures(Person,xsd:boolean).
3</p>
    </sec>
    <sec id="sec-3">
      <title>Creating Privacy-Aware Pictures</title>
      <p>
        We describe the cross device process for generating privacy-aware pictures as
shown in Figure 4. The user's context is represented using an OWL ontology and
privacy policies are described using SWRL rules. Finally, we use a Description
Logics reasoner to infer if the current context of the user matches with any of
the privacy policies de ned. Using wireless communications, such as Bluetooth
and WiFi, FaceBlock creates peer-to-peer networks to share the privacy policies
among devices. The user device holds the ontology and reasoner and is in charge
of checking the policies that should be applied (in [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ] we have shown that current
smart devices can handle Semantic Web technologies). Then, the Google Glass
device receives a simple policy consisting of a directive to allow or disallow
unobscured pictures for each user.
      </p>
      <p>We use an example with two users, Primal and Roberto, to explain how the
FaceBlock system works using the privacy policies. Primal is the user who wishes
to protect his privacy and Roberto is the user with the device for taking pictures,
that is Google Glass. Initially, Primal takes a picture of himself using FaceBlock
and it generates a face identi er (step 1 in Figure 4). He also speci es the
context constraints for his pictures using FaceBlock. At the Beach House, Primal's
smartphone detects and shares the face identi er with Roberto's Google Glass
(step 2) along with a unique identi cation. Later, both devices periodically check
whether the other device has left the surroundings by greeting/acknowledgment
messages. Roberto's device receives this information, stores it and sends back
his UID and an acknowledgment of the previous message (steps 3 and 4).</p>
      <p>Afterwards, FaceBlock on Primal's device continuously collects information
about his context and checks if any rule should be triggered by using the reasoner
(step 5). In this case, the context has changed (the party started) and the rule
presented in Figure 3 gets triggered requesting Roberto to FaceBlock pictures
of Primal (step 6). The corresponding privacy policy for Primal is shared with
Roberto's device (step 7). Each privacy policy has a Time To Live (TTL)
associated with it during which the policy should be applied to the pictures of the
user. Currently, we are using a uniform TTL for every policy. Roberto's device
accepts the privacy policy from Primal's device (step 8) and whenever he takes
a photo FaceBlock converts it into a privacy-aware picture (step 9). For that, if
faces are detected in the recently taken picture, FaceBlock checks if Primal is
present in the picture by comparing the detected face with Primal's face
identier and obscures it (step 10). Thus, FaceBlock creates a privacy-aware picture
for Roberto and protects the privacy of Primal.
4</p>
    </sec>
    <sec id="sec-4">
      <title>Discussion and Future Work</title>
      <p>
        In this paper, we have described a new policy management module for
FaceBlock, an approach to preserve user privacy when taking pictures with smart
devices. We have an implementation of the basic FaceBlock concept for trivial
allow/disallow policies that works on Android-based devices, including Google
Glass. We have also done work in our research group on context modeling,
learning, acquisition, use and sharing for mobile devices [
        <xref ref-type="bibr" rid="ref11 ref6">6, 11</xref>
        ]. We are currently
working on developing and implementing a new FaceBlock version that
integrates these two streams. Once that is done we can evaluate its e ectiveness and
performance.
      </p>
      <p>From a security and privacy perspective, Faceblock's framework has both
advantages and disadvantages. On the plus side, a device does not need to
identify its user to participate nor must it reveal any information about its context
model. The use of peer-to-peer networking reduces exposure to identi cation by
network location, especially if a device spoofs its MAC address. A device wishing
to protect its user needs to provide only an eigenface and periodic allow picture
and disallow picture messages. Eigenfaces enable a privacy preserving method to
share face identi ers which retains enough information for FaceBlock to perform
face recognition while making it di cult for humans. We acknowledge face
recognition techniques can be inaccurate which might mistakenly apply the policy to
someone who looks similar. We are further investigating di erent face
recognition techniques to reduce the number of false positives and false negatives. Our
architecture also assumes that each user device computes and maintains its own
context, so the cost of this task is distributed.</p>
      <p>On the other hand, like any privacy policy based solutions FaceBlock might
su er from malicious policies. Since Google Glass acts as the server for
privacyaware picture requests, a device could also launch a kind of denial of service
attack on a Glass device by sending it many requests to block di erent
eigenface images that appear to be from di erent devices via MAC address spoo ng.
Even though face identi ers and unique identi cation lessen the privacy loss
involved in con rming the identity of users during the generation of privacy-aware
pictures, we are exploring the possibility of a zero-knowledge protocol. Lastly,
the picture taking device follows policies voluntarily; there is no mechanism to
guarantee, or even incentivize, enforcement.</p>
      <p>We are exploring mechanisms to assist users in de ning their policies, which
involve using Graphical User Interfaces (GUIs) and forms to generate SWRL
rules. We are additionally exploring the possibility of supporting location-based
beacons that can broadcast organization's policies. These are the same as
contextaware policies but do not require the exchange of a face identi er between
participants. For example, many museums have a policy that no pictures are ever
allowed (location-aware). A church might have a policy that pictures are allowed
when a service is not taking place and disallowed when one is (activity-aware).
This will enable FaceBlock to generate privacy-pictures for inanimate objects.</p>
      <p>
        FaceBlock has to make sure that the privacy policy under consideration
reects the current context of the user. An interrupt driven approach, in which
user actively enters context change into the application, would be more
accurate and less power consuming. But this requires user to actively participate
in the generation of privacy-aware pictures and might fatigue them. A sensor
based polling approach can automatically detect context change without
interference from the user at a higher power cost. We are currently exploring both
these approaches to evaluate the tradeo s of accuracy versus e ciency [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ]. On
the Google Glass, maintenance is performed after receiving a privacy policy by
checking for other policies received from the same user and deleting them as
necessary. Additionally, we would also take into consideration the cost of
broadcasting change (in terms of messages, power, time) in context and optimizing it
for various parameters.
      </p>
      <p>The current FaceBlock protocol relies on P2P networks for information
exchange between two users. But in real-life scenarios there would be more than
one user in the vicinity of a Google Glass user who wishes to protect his
privacy. With higher number of communicating devices, relying on a synchronous
connection-oriented link over P2P networks (e.g., Bluetooth) might result in
degradation of quality of service. Therefore, other wireless mechanisms, such as
WiFi, or even a centralized cloud-based approach could be considered. Also in
cases where multiple devices share con icting policies, FaceBlock would require
a con ict resolution mechanism.</p>
      <p>
        Mechanisms for protecting user privacy in social circles have to balance
between privacy requirements and the easiness of utilizing them. Privacy preference
models such as P3P [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ], which received considerable attention, was ignored by
organizations and users due to the di culty and lack of value. While on the
other hand, licenses such as creative commons is well known and commonly
used. FaceBlock not only protects users from pictures taken by others but also
helps photographers to respect the privacy of others. We are taking into
consideration various methods for further incentivizing the usage of FaceBlock and the
generation of privacy-aware pictures so that the usage of this service becomes
ubiquitous. With millions of cameras in the world, due to the explosion of mobile
devices such as smartphones and tablets, mechanisms to preserve the privacy of
users are needed. We believe that FaceBlock is a right step towards handling
privacy needs in private and public spaces from photography devices.
Acknowledgments. This research work has been supported by the NSF grants
0910838 and 1228673, CICYT project TIN2010-21387-C02-02, and DGA FSE.
      </p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <surname>Abowd</surname>
            ,
            <given-names>G.D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dey</surname>
            ,
            <given-names>A.K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Brown</surname>
          </string-name>
          , P.J.,
          <string-name>
            <surname>Davies</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Smith</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Steggles</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          :
          <article-title>Towards a better understanding of context and context-awareness</article-title>
          .
          <source>In: First International Symposium on Handheld and Ubiquitous Computing (HUC</source>
          <year>1999</year>
          ). pp.
          <volume>304</volume>
          {
          <issue>307</issue>
          (
          <year>1999</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <surname>Bizer</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lehmann</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kobilarov</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Auer</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Becker</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Cyganiak</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hellmann</surname>
            ,
            <given-names>S.:</given-names>
          </string-name>
          <article-title>DBpedia - a crystallization point for the web of data</article-title>
          .
          <source>Web Semantics</source>
          <volume>7</volume>
          (
          <issue>3</issue>
          ),
          <volume>154</volume>
          {
          <fpage>165</fpage>
          (
          <year>2009</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <surname>Cranor</surname>
            ,
            <given-names>L.F.</given-names>
          </string-name>
          :
          <article-title>Web privacy with P3P - the platform for privacy preferences</article-title>
          .
          <source>O'Reilly</source>
          (
          <year>2002</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <surname>Das</surname>
            ,
            <given-names>P.K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Joshi</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Finin</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          :
          <article-title>Energy e cient sensing for managing context and privacy on smartphones</article-title>
          .
          <source>In: Int. Workshop on Society, Privacy and the Semantic Web { Policy and Technology (PrivOn</source>
          <year>2013</year>
          ) (
          <year>2013</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <surname>Ghosh</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Joshi</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Finin</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Jagtap</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          :
          <article-title>Privacy control in smart phones using semantically rich reasoning and context modeling</article-title>
          .
          <source>In: IEEE Workshop on Semantic Computing and Security (SPW</source>
          <year>2012</year>
          ). pp.
          <volume>82</volume>
          {
          <issue>85</issue>
          (
          <year>2012</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <surname>Jagtap</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Joshi</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Finin</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zavala</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          :
          <article-title>Preserving Privacy in Context-Aware Systems</article-title>
          .
          <source>In: 5th IEEE International Conference on Semantic Computing (ICSC</source>
          <year>2011</year>
          ). pp.
          <volume>149</volume>
          {
          <issue>153</issue>
          (
          <year>2011</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <surname>Kagal</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Finin</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Joshi</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>A policy based approach to security for the Semantic Web</article-title>
          . In: International Semantic Web Conference (ISWC
          <year>2003</year>
          ), pp.
          <volume>402</volume>
          {
          <issue>418</issue>
          (
          <year>2003</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <surname>Sirovich</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kirby</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Low-dimensional procedure for the characterization of human faces</article-title>
          .
          <source>Journal of the Optical Society of America A</source>
          <volume>4</volume>
          (
          <issue>3</issue>
          ),
          <volume>519</volume>
          {
          <fpage>524</fpage>
          (
          <year>1987</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <surname>Yus</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Bobed</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Esteban</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Bobillo</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Mena</surname>
          </string-name>
          , E.:
          <article-title>Android goes semantic: DL reasoners on smartphones</article-title>
          .
          <source>In: Second International Workshop on OWL Reasoner Evaluation (ORE</source>
          <year>2013</year>
          ). pp.
          <volume>46</volume>
          {
          <issue>52</issue>
          (
          <year>2013</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <surname>Yus</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Pappachan</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Das</surname>
            ,
            <given-names>P.K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Mena</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Joshi</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Finin</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          :
          <article-title>FaceBlock: Privacy-Aware Pictures for Google Glass</article-title>
          .
          <source>In: 12th International Conference on Mobile Systems</source>
          , Applications, and
          <string-name>
            <surname>Services</surname>
          </string-name>
          (MobiSys
          <year>2014</year>
          ). pp.
          <volume>366</volume>
          {
          <issue>366</issue>
          (
          <year>2014</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <surname>Zavala</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dharurkar</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Jagtap</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Finin</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Joshi</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>Mobile, Collaborative, Context-Aware Systems</article-title>
          .
          <source>In: AAAI Workshop on Activity Context Representation: Techniques and Languages</source>
          (
          <year>2011</year>
          )
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>