<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>The WebID Protocol Enhanced With Group Access, Biometrics, and Access Policies</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Cory Sabol</string-name>
          <email>cssabol@uncg.edu</email>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>€William Nick</string-name>
          <email>wmnick@aggies.ncat.edu</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>€Maya Earl</string-name>
          <email>mnearl@aggies.ncat.edu</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>€Joseph Shelton</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>€Albert Esterline</string-name>
          <email>esterlin@ncat.edu</email>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Dept. of Computer Science</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>€Dept. of Computer Science</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Greensboro</institution>
          ,
          <addr-line>North Carolina</addr-line>
          ,
          <country country="US">USA</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>University of North Carolina at Greensboro &amp;</institution>
          ,
          <country country="US">USA</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2016</year>
      </pub-date>
      <fpage>89</fpage>
      <lpage>95</lpage>
      <abstract>
        <p>The WebID protocol solves the challenge of remembering usernames and passwords. We enhance this protocol in three ways. First, we give it the ability to manage groups of agents and control their access to resources on the Web. Second, we add support for biometric access control to enhance security. Finally, we add support for OWL-based policies that may be federated and result in flexible access control.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>Introduction</title>
      <p>
        The primary way of authenticating users on the Web is via
username and password. This is a rather secure and
timetested method, but it is cumbersome and error prone. A
user may forget their username or password, requiring
them to choose the ever so prevalent “forgot password”
option. If the way a password reset is handled is insecure,
then this opens up an entirely new attack surface for
malicious actors to gain information about a user. This is where
alternatives such as OpenID
        <xref ref-type="bibr" rid="ref17">(Wang Chen &amp; Wang, 2012)</xref>
        ,
EMCSSL
        <xref ref-type="bibr" rid="ref7">(Emercoin, 2015)</xref>
        , and WebID (W3C, 2015)
come into play. These systems are distributed platforms
that provide a user with, ideally, a simple way of asserting
their identity on the Web. In this paper, we focus on the
WebID protocol, identification for groups and some ways
in which the security of WebID can be improved for
applications in which it is deemed necessary.
      </p>
      <p>The remainder of this paper is organized as follows. The
next section presents Semantic Web standards (such as
RDF and OWL), which are used for representation in our
protocols. Next is a section that introduces the WebID
protocol and its use. Next, we introduce the problem of group
access with WebIDs, and the following section presents
Copyright held by the author(s).
our solution. The next section discusses our use of access
policies, reasoning about policies, and enforcing policies.
Next, we present biometrics (the use of a person’s
physiological and behavioral characteristics for authentication)
and our biometric enhancement of the WeID protocol. The
penultimate section briefly discusses implementation
technologies, and the last section concludes with a summary of
this paper.</p>
    </sec>
    <sec id="sec-2">
      <title>RDF/RDFS/OWL</title>
      <p>
        Our enhancements make heavy use of the Resource
Description Framework (RDF). RDF is a specification for
managing metadata of resources on the Web. In RDF, all
information is represented as triples of the form subject,
predicate, object
        <xref ref-type="bibr" rid="ref6">(Broekstra, Kampman &amp; Harmelen,
2002)</xref>
        . The subject is the resource in question, and the
predicate might describe a characteristic that the subject
has, in which case the object is the value of that
characteristic. Or the predicate describes a relationship between the
subject and the object, as in Tim knows Sarah, where Tim
is the subject, knows is the predicate, and Sarah is the
object.
      </p>
      <p>RDF lets us create a model of a resource and the
relationships it has with other resources. RDF is also
machinereadable so that we can build applications that leverage it
and the power of linked data (see below) to make the use
and discovery of data much easier and consistent across
platforms. RDF is also expressible in various serializations,
such as RDF/XML, for better machine consumption. The
Turtle serialization is a subset of the N3 serialization and is
meant for ease of human reading and writing. All RDF
examples throughout this document are written in N3
syntax for ease of reading.</p>
      <p>The Resource Description Framework Schema (RDFS)
provides a way to construct RDF vocabularies by allowing
one to define RDF classes, properties, and relations
tailored to one’s needs. One such RDFS vocabulary used in
the research reported here is FOAF, which stands for
Friend Of A Friend. Another such vocabulary is ACL, or
the Access Control Language. Both vocabularies are
discussed below.</p>
    </sec>
    <sec id="sec-3">
      <title>Linked Data</title>
      <p>
        Linked-data is a set of best practices regarding the
publication and connection of structured data on the Web
        <xref ref-type="bibr" rid="ref6">(Broekstra, Kampman &amp; Harmelen, 2002)</xref>
        . Linked-data
aims to provide a consistent and uniform way for agents on
the web to consume and publish data, machine and human
alike. The key to this is that data is published in a
consistent format and that all data links to other appropriate
data so that the discovery and consumption of further data
is easy and encouraged. The main format in which
linkeddata is published in RDF.
      </p>
    </sec>
    <sec id="sec-4">
      <title>FOAF</title>
      <p>FOAF is a powerful RDF vocabulary that allows for the
concise description of people and their social networks in a
semantic and machine-readable manner (OpenSSL, 2007),
It allows us to compute over the relationships and
programmatically make conclusions about a person and those
to which they are connected. The conventional namespace
prefix for FOAF is foaf:.</p>
      <p>FOAF is, of course, applicable to more than just people
and their social networks. It is applicable to any agent on
the web. An agent could be a person or it could be a
software agent that acts on the behalf of a person or
organization. FOAF is also useful for representing the subtle status
of a group of agents. We leverage the semantics of the
foaf:Group class in order not only to allow a group to act
as a collection of agents but also for the group itself to be
treated as, as well as act as, an individual within an
application or service. This is the crux of allowing for
authentication of a group’s agents based on the group asserting its
identity as an individual.</p>
      <p>ACL
The Access Control Language (ACL) is a simple RDF
vocabulary that allows the specification of access control
rules to be tied to resources on the web and presented in a
machine-readable manner. It allows for a fairly flexible
and broad range of rules to be specified regarding a
resource. It also allows for the rules to be specified and
determined in a decentralized manner. A resource can have
its access control rules easily derived from another
resource’s ACL file on the web. The rules can even be
maintained simply via a separate service, thanks to the power of
linked data. Table 1 depicts the various modes of access
offered by ACL.</p>
      <p>Mode:
Read</p>
      <sec id="sec-4-1">
        <title>Write</title>
      </sec>
      <sec id="sec-4-2">
        <title>Append</title>
        <p>This ACL-RDF vocabulary, which is defined with
RDFS, includes properties of authorization (W3C, 2015). It
allows the administrator to specify access control modes,
which are essentially classes of operations. The
WebAccessControl protocol states that the user
authenticates to the server through the implementation of
WebID+TLS.</p>
        <p>However, ACL can in some cases be rather rigid, which
is why we introduced a policy ontology written in OWL
(web ontology language) that we developed. The main
advantage of this ontology is that it can be used in tandem
with a reasoner service such as Apache Jena, which can
make inferences based on the rules derived from the
ontology.</p>
        <p>OWL</p>
        <p>
          OWL
          <xref ref-type="bibr" rid="ref1">(Antoniou &amp; van Harmelen, 2004)</xref>
          extends the
power of RDFS and is used to represent ontologies on the
Semantic Web. “Ontology” is a term that is borrowed from
philosophy referring to a conceptualization of a domain,
describing entities in the world and how they relate to each
other.
        </p>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>WebID and Its Use</title>
    </sec>
    <sec id="sec-6">
      <title>WebID</title>
      <p>
        WebID is a W3C proposed protocol which provides a way
for an agent to be identified using standard web
technologies (W3C, 2015). At its most basic level, a WebID is
simply a unique URI (uniform resource identifier) that
represents some resource or agent on the web. When the URI
is dereferenced, an RDF or human readable format of the
document that describes the resource or agent in question
is returned. (Derefencing means to retrieve the resource to
which the URI points.) The version of the file that is
returned is determined by content negotiation and CoolURIs
        <xref ref-type="bibr" rid="ref3">(Ayers &amp; Völkel, 2008)</xref>
        , along with fragment identifiers or
303 redirects, to determine and return the appropriate
representation of the document representing the resource that
the WebID represents. Typically, HTML is served to
human users and RDF to machines. The service that is
implementing WebID can of course decide how this is to be
handled; it could be that a human agent has reason to view
the RDF representation of a resource and a machine needs
to consume the HTML representation.
      </p>
    </sec>
    <sec id="sec-7">
      <title>WebID + TLS</title>
      <p>WebID + TLS is the protocol that describes the
implementation of WebID. It has the following general steps (W3C,
2015):</p>
      <p>Initially, the client must establish a TLS connection,
which the server authenticates itself, using the
standard TLS protocol.</p>
      <p>Next, the client on a specific resource can perform an</p>
      <p>HTTP GET, PUT, POST, or DELETE action.</p>
      <p>At this stage, the guard, or server agent, can grant or
deny access according to the access control rules.
Now, if the resource requires authentication for access,
the client’s identity is linked to a private key and
public key pair. This pair should be embedded in the
client’s certificate to be verified. The client has the
option to automate which certificate to send from its
browser when the TLS agent makes a certificate
The TLS agent matches the certificate’s public key
with the public key in the user’s profile document on
the server.</p>
      <p>The Verification Agent, defined in (W3C, 2015),
verifies that the WebID in the WebID certificate
knows the given public key.</p>
      <p>The Verification Agent extracts the public key and the
URIs from the Subject Alternative Name property
field in the certificate.</p>
      <p>With the WebID collected, the guard can check if one
of the URIs is authorized by the access control rules.
If access is granted, then the guard can pass on the
request to the protected resource.</p>
    </sec>
    <sec id="sec-8">
      <title>The Group Problem</title>
      <p>There are several problems that this work addresses,
including group access control using WebID as well as
strengthening access control on the web by coupling the
policy ontology we have developed with a Jena-based
reasoner to help decentralize the security logic of
determining access to resources on the web. We also present a
solution to one of the main security flaws of WebID by
creating a system that couples a user’s biometric data with their
WebID to create a two-step authentication process.</p>
      <p>We start by describing the problem surrounding group
access control on the web. As it stands, delegating access
to agents on the web is a process that relies heavily on
static access control lists and security logic that is heavily
integrated into the application logic of the service.
Furthermore, we have a natural notion of trust in a group’s head
member, often allowing them to assert their identity and
subsequently allowing for the knowledge to validate the
identity of the group’s other members. Capturing this in a
computational environment is a challenge, but we have
several solutions. We implemented a system that can allow
for group owners to authenticate themselves as well as
establish the trust needed to more easily authenticate the
group's members. This is primarily accomplished by
making use of the FOAF term foaf:Group and the subtlety
that allows a foaf:Group also to be an individual agent.
Also, one can specify a class associated with a group so
that elements of that class are automatically of that group
and vice versa.</p>
      <p>We now address decentralizing web access control
further than was done in our initial implementation.
Developing secure code is often difficult, especially when the
security logic of the application is tightly knit into the
implementation. In our access to resources based on semantic
rule lists, decoupling some of the security functionality
from the main application logic allows for the application
logic to be developed and maintained much more easily.
We remove the rigidity of our original solution to
authenticating groups and expand it into a more generalized and
extensible system with the use of OWL and a Jena
reasoning service that can also easily apply to individual agents.
The OWL policy ontology that has been developed in our
lab is also more robust and flexible than ACL as a means
of expressing access control rules.</p>
    </sec>
    <sec id="sec-9">
      <title>Our Solution to the Group Problem</title>
      <p>To solve the problems of group access control, we began
experimenting with the notion of authenticating a group of
agents by dereferencing the WebIDs of the group's
members, which are presented in the group's profile document.
In order for this to work, however, we must make certain
that a group is explicitly defined to avoid ambiguities in
discerning whether or not the agent that is asserting its
identity is indeed a group. This is where we make use of
the foaf:Group term. Figure 1 is a simple example of a
foaf:Group defined in RDF using N3 syntax. The profile
explicitly asserts that the agent is a foaf:Group. The
profile document also contains the agent's public key, as all
WebID profiles must. And it contains a list of the WebIDs
belonging to its member agents. This is critical to the
verification process, which allows the group to assert its
identity and authenticate the group members too.
1: @prefix foaf: &lt;http://www.xmlns.com/foaf/spec/#&gt; .
2: @prefix cert: &lt;http://www.w3.org/ns/auth/cert/#&gt; .
3:
4: _:webidcommunitygroup a foaf:Group;
5: foaf:name “webidcommunitygroup”;
6: foaf:member[/*group member WebID's here*/];
7: cert:PublicKey “MIICQ...EstKg==” .</p>
      <p>We can allow a WebID that represents a group to serve
as an entry point to the authentication process. We do this
by first dereferencing the WebID to get the profile
document. With this we determine whether or not the agent is a
group by checking if the profile contains the foaf:Group
term. From there, we parse the WebIDs contained in the
foaf:member list and individually verify the WebID of
each member and determine the access to the resource in
question based on the access rules tied to the resource. We
then use server-side caching techniques to cache this
access information for a limited time to the service so that,
when an agent that is a member of a previously
authenticated group requests access to the resource, the service
may simply validate their WebID and then perform a
simple lookup against the cached access data to determine
what type of access should be allowed.</p>
      <p>We expanded our initial algorithm to include use of the
policy ontology and a reasoner, which was implemented
using Apache Jena. This got rid of the rigidity of the
algorithm and its close ties to the limited ACL vocabulary in
favor of the flexibility that our OWL-based policy
ontology offers. Figure 2 shows the updated version of the
highlevel group access algorithm, which makes use of a
response returned from the reasoner.</p>
    </sec>
    <sec id="sec-10">
      <title>Defining and Enforcing Policies</title>
    </sec>
    <sec id="sec-11">
      <title>OWL-based Policy Ontology</title>
      <p>
        The major advantage of using XML to represent policies is
that it is straightforwardly extensible
        <xref ref-type="bibr" rid="ref5">(Bradshaw, Uszok
and Montanari, 2014)</xref>
        , but the problem with XML, as with
many other representations, is that its semantics is mostly
implicit. One problem with implicit semantics is that the
conventions on which it is based are potentially
ambiguous. For that reason, semantic technologies are being used.
There are many advantages to using OWL to represent
policies. Ontologies allow for policies to be easily
extended by simply adding new concepts.
1: define function grantAccess(AgentURI, ResourceURI):
2: if (Agent's WebID not valid) then
3: Deny access to ResourceURI, prompt resource owner that
      </p>
      <p>AgentURI
4: has requested access to the resource.
5: return access denied
6: end
7:
8: Define AProile := dereference(AgentURI)
9: Define ResACL := dereference(ResourceURI)
10: Define AGraph := toGraph(AProfile)
11: Define ResACLGraph := toGraph(ResACL)
12:
13: if (AgentURI is in ResACLGraph OR
14: Agraph.class is in ResACLGraph) then
15: return access type specified in ResACL
16: end
17: else
18: Deny access to ResourceURI, prompt resource owner
19: that AgentURI has requested access to the resource.
20: return access denied
21: end
22:end
23:
24:forEach (Member m in Group g) do
25: accessCache.add(m, grantAccess(m, Resource.URI))
26:end</p>
      <p>Using ontologies to describe policies enables the system
to use concepts that describe the entities and environments
that are being controlled. This simplifies their descriptions
and improves the system’s analyzability. The result is that
policy frameworks can take advantage of powerful features
such as policy conflict detection and harmonization. As
with databases, there is the possibility of accessing the
information provided by querying the ontology based on
the ontology schema.</p>
      <p>The KAoS policy service framework (Uszok, Bradshaw
&amp; Jeffers, 2004) is a mature general-purpose policy
management system developed by the Florida Institute for
Human and Machine Cognition (IHMC). It makes use of
OWL and OWL-based tools for specification, analysis and
enforcement of policies that are constrained across a
variety of distributed computing platforms. KAoS has support
for obligations and authorization policies as well as
mechanisms for other kinds of policies. This enables analysis,
management, specification, and enforcement of policies.
Use of OWL-based policies allows term and policy
federation. We are importing the KAoS policies and extending it
in order to create our own policies.</p>
    </sec>
    <sec id="sec-12">
      <title>Jena/Reasoning</title>
      <p>
        Jena is a Java-based Semantic Web framework
        <xref ref-type="bibr" rid="ref12">(McBride,
2002)</xref>
        . It can read all RDF serializations and add data to
RDF graphs, and it can write RDF graphs to all common
serializations. A number of inference engines and
reasoners can be used in Jena. With these engines,
additional RDF assertions can be derived from an original RDF
document. Languages such as RDFS and, for possibly
sophisticated ontologies, OWL are supported; additional
facts can be inferred from instance data using these
languages. SWRL rules
        <xref ref-type="bibr" rid="ref9">(Horrocks et al., 2004)</xref>
        are supported
if one installs the Pellet reasoner
        <xref ref-type="bibr" rid="ref13">(Parsia, 2004)</xref>
        . Pellet is an
open-source Java-based OWL 2 reasoner. One of the main
points of this framework is that it is intentionally general
so as to be applicable for virtually any problem.
      </p>
    </sec>
    <sec id="sec-13">
      <title>Apache Thrift</title>
      <p>
        Thrift is an interface definition language and binary
communication protocol that is used to define and create
services for numerous languages. It is used as a remote
procedure call (RPC) framework and was developed at
Facebook for “scalable cross-language services development”
        <xref ref-type="bibr" rid="ref2">(Apache, 2007)</xref>
        . It is incorporated into our code through
the use of RDF and triples. The RDF file information goes
to the server, which infers triples and then returns more
triples. Whatever access the person has will be inferred by
the reasoner. The Thrift service uses Pellet for reasoning
about our policies.
      </p>
    </sec>
    <sec id="sec-14">
      <title>Extension Using Biometrics</title>
    </sec>
    <sec id="sec-15">
      <title>Biometrics</title>
      <p>
        Biometrics is the study of identifying an individual based
off of their physical characteristics
        <xref ref-type="bibr" rid="ref11 ref3">(Jain and Ross 2008)</xref>
        . It
is useful in many authentication systems due to its inherent
advantages over other types of authentication. Unlike a
knowledge-based system
        <xref ref-type="bibr" rid="ref18">(Zhang and Li 2011)</xref>
        that uses a
password or some other key phrase to grant access, a
biometric system uses an individual’s biometric, such as their
face, iris or fingerprint. These biometrics cannot be as
easily misplaced or stolen as a password can. A token-based
systems
        <xref ref-type="bibr" rid="ref8">(Hao &amp; Yu, 2010)</xref>
        use some physical token such
as a key or smart card to grant access. However, tokens can
also be misplaced or stolen.
      </p>
      <p>
        A biometric system is composed of some sensor, such as
a camera or scanner, a module that extracts features from
what was taken from the sensor, a module that stores the
extracted features in a database, and a module to compare
extracted features to enrolled features
        <xref ref-type="bibr" rid="ref11 ref3">(Jain and Ross
2008)</xref>
        .
      </p>
    </sec>
    <sec id="sec-16">
      <title>WebID + Biometric protocol</title>
      <p>
        This section describes the WebID+Biometrics protocol,
which is built off the WebID protocol but uses the
disposable feature extractors created by the GEFE technique
developed by
        <xref ref-type="bibr" rid="ref15">Shelton et al. (2012)</xref>
        for biometric verification.
WebID+Biometrics also uses OWL-based policies, as
described above. One possible scenario where this protocol
might be used is where a person tries to login to a social
network service. For example, William is a user of
Joseph’s social networking site. Figure 3 shows the sequence
diagram for the WebID+Biometrics protocol for this
scenario. The scenario assumes authentication for a RESTful
web service. A RESTful web service communicates using
the HTTP protocol in a way similar to (but more involved
than) the way a web browser gets a web page from a
server.
      </p>
      <p>William’s client sends a TLS request to Joseph’s social
networking service. Then Joseph’s social networking
service requests a certificate from William’s client. William’s
client sends a certificate to Joseph’s social networking
service and dereferences William’s profile from William’s
server from the URI that was provided in William’s
certificate. Joseph’s social networking service then queries the
RDF that is William’s profile and checks whether or not
the modulus and exponent from the profile on William’s
server match the modulus and exponent from William’s
certificate. If they match, then Joseph’s service will send
the RDF for the particular feature extractor that has been
generated at random. William’s client will ask William to
submit, for example, a picture from which it will extract
the feature vector and serialize it to an RDF serialization.
That RDF will be sent to Joseph’s service, which will
dereference a document on William’s server that contains
William’s biometric information. Joseph’s service will
then verify that William’s biometrics matches the enrolled
feature vectors. Finally, if the biometrics submitted to
Joseph’s social networking service matches the biometrics
from the RDF document on William’s server, then
Joseph’s service will notify William’s client that he may
access it.</p>
      <p>Figure 3- The sequence diagram for the WebID+Biometrics
Protocol</p>
      <p>Unlike the WebID protocol, we use policies, which are
expressed in OWL. This allows us to infer roles and to
infer how access is delegated. To illustrate this, consider
another example, where a user, Renee, is trying to access a
resource controlled by William. Renee is part of the same
organization as William, and William has also delegated
access to a resource to Renee. Renee’s client requests to
login and access a resource controlled by William. The
service requests Renee’s certificate and gets the RDF
profile document from Renee’s server from the URI in the
certificate. The service checks whether the modulus and
exponent in the certificate match the modulus and
exponent in the profile document. The Service requests Renee’s
client to submit her biometric credentials using a particular
disposable FE. If the biometrics for Renee matches the
biometrics on Renee’s server, then the server will pass
Renee’s policy document to a reasoning service. The
reasoning service will reason about the document based on a
policy ontology. The result will determine whether Renee
will gain access to the system.</p>
      <p>Like the WebID protocol, our protocol allows for
profiles to be decentralized. Unlike the WebID protocol,
however, our protocol is able to handle biometric verification.
This allows users to bring their own biometrics. Unlike the
WebID protocol, our protocol reasons about permissions
using policy documents expressed in OWL.</p>
    </sec>
    <sec id="sec-17">
      <title>Implementation</title>
      <p>Node.js was used to build a client application from which
agents may try to authenticate for access to resources that
have access rules expressed using the OWL based policy
ontology. The client also acts as the WebID authentication
service. We paired the Node.js client with an Apache Jena
based reasoner service, which accepts the access rules and
makes inferences based on them, returning the type of
access to a resource that is to be granted to the client. The
reasoner used is Pellet, and Apache Thrift provides
RESTful access to it.</p>
    </sec>
    <sec id="sec-18">
      <title>Conclusion</title>
      <p>We addressed the way group access control and group
based authentication might be handled on the web and
created a high-level algorithm for authenticating a group and
its members and caching the access decisions to the server
for a limited time. This allows for a more natural notion of
a group to exist and interact with web services, just as in
real life a group owner’s identity is validated and then trust
is established and propagated to the group’s members. We
also improved the security of the WebID protocol by
coupling it with biometrics. This mitigates the threat of
somebody having access to a device in which an agent’s WebID
certificate is installed. We also add support for OWL-based
policies that may be federated and result in flexible access
control. What is reported here leads to future work aimed
at the notion of a network of trust.
http://www.w3.org/TR/cooluris/.
&lt; https://www.openssl.org/&gt;
ty: Disposable Feature Extractors for Mitigating Biometric
Replay Attacks. Procedia Computer Science, 8, 351-360.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          <string-name>
            <surname>Antoniou</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          , &amp; van
          <string-name>
            <surname>Harmelen</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          (
          <year>2004</year>
          ).
          <article-title>Web ontology language: Owl</article-title>
          . In Handbook on ontologies (pp.
          <fpage>67</fpage>
          -
          <lpage>92</lpage>
          ). Springer Berlin Heidelberg.
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>2007.http://thrift.apache.org/.</mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          <string-name>
            <surname>Ayers</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          and
          <string-name>
            <surname>Völkel</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          <year>2008</year>
          .
          <article-title>Cool URIs for the Semantic Web</article-title>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          <string-name>
            <surname>Bizer</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Heath</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          , and
          <string-name>
            <surname>Berners-Lee</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          <year>2009</year>
          .
          <article-title>Linked Data-The Story So Far</article-title>
          .
          <source>International Journal on Semantic Web and Information Systems</source>
          . pp.
          <fpage>1</fpage>
          -
          <lpage>22</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          <string-name>
            <surname>Bradshaw</surname>
            ,
            <given-names>J.M.</given-names>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Uszok</surname>
          </string-name>
          , and
          <string-name>
            <given-names>R.</given-names>
            <surname>Montanari</surname>
          </string-name>
          .
          <year>2014</year>
          .
          <article-title>Policy-Based Governance of Complex Distributed Systems: What Past Trends Can Teach Us about Future Requirements</article-title>
          . Adaptive, Dynamic, and Resilient Systems, CRC Press.
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          <string-name>
            <surname>Broekstra</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kampman</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          and
          <string-name>
            <surname>Harmelen</surname>
            ,
            <given-names>F. V.</given-names>
          </string-name>
          <year>2002</year>
          .
          <article-title>Sesame: A Generic Architecture for Storing and Querying RDF and RDF Schema</article-title>
          .
          <source>Proceedings of the First International Semantic Web Conference on the Semantic Web</source>
          . Springer-Verlag, London, UK, UK,
          <fpage>54</fpage>
          -
          <lpage>68</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          <string-name>
            <surname>Emercoin</surname>
          </string-name>
          .
          <year>2015</year>
          . EMCSSL.
          <article-title>Decentralized identity management, passwordless logins, and client SSL certificates using Emercoin NVS</article-title>
          . Emercoin International Development Group.
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          <string-name>
            <surname>Hao</surname>
            ,
            <given-names>Z.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Yu</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          <year>2010</year>
          .
          <string-name>
            <given-names>A</given-names>
            <surname>Security Enhanced Remote Password Authentication Scheme Using Smart Card</surname>
          </string-name>
          . 2010 Second International Symposium on Data, Privacy, and E-Commerce,
          <fpage>56</fpage>
          -
          <lpage>60</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          <string-name>
            <surname>Horrocks</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Patel-Schneider</surname>
            ,
            <given-names>P.F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Boley</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tabet</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Grosof</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dean</surname>
            .
            <given-names>M.</given-names>
          </string-name>
          <year>2004</year>
          .
          <article-title>SWRL: A Semantic Web Rule Language Combining OWL and RuleML, W3C Member Submission</article-title>
          ,
          <fpage>W3C</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          http://www.w3.org/Submission/2004/SUBM-SWRL-
          <volume>20040521</volume>
          /.
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          <string-name>
            <surname>Jain</surname>
            ,
            <given-names>A. K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ross</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          <year>2008</year>
          . Introduction to Biometrics. Handbook of Biometrics. Springer. pp.
          <fpage>1</fpage>
          -
          <lpage>22</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          <string-name>
            <surname>McBride</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          <year>2002</year>
          .
          <article-title>Jena: A Semantic Web Toolkit</article-title>
          .
          <source>IEEE Internet Computing</source>
          <volume>6</volume>
          (
          <issue>6</issue>
          ):
          <fpage>55</fpage>
          -
          <lpage>59</lpage>
          (
          <year>2002</year>
          )
          <article-title>OpenSSL Software Foundation</article-title>
          .
          <source>OpenSSL Project</source>
          .
          <source>The OpenSSL Project Homepage</source>
          ,
          <year>2007</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          <string-name>
            <surname>Parsia</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sirin</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          <year>2004</year>
          .
          <article-title>Pellet: an OWL DL reasoned</article-title>
          .
          <source>Proc.</source>
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          <source>DL-2004</source>
          ,
          <year>2004</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          <string-name>
            <surname>Shelton</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Bryant</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Abrams</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Small</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Adams</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Leflore</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Dozier</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          <year>2012</year>
          . Genetic &amp;
          <string-name>
            <surname>Evolutionary Biometric SecuriUszok</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Bradshaw</surname>
            ,
            <given-names>J. M.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Jeffers</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          <year>2004</year>
          .
          <article-title>KAoS: A policy and domain services framework for grid computing and semantic web services</article-title>
          . Trust management: Second international conference,
          <source>iTrust 2004</source>
          , Oxford, UK, March 29-April 1,
          <year>2004</year>
          . Proceedings. Vol.
          <volume>2995</volume>
          of Lecture Notes in Computer Science., (pp.
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          16-
          <fpage>26</fpage>
          ). Springer-Verlag, Berlin, Heidelberg W3C. ed.
          <year>2015</year>
          .
          <article-title>WebID-TLS</article-title>
          .
          <article-title>Authentification over TLS</article-title>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          <string-name>
            <surname>Wang</surname>
            ,
            <given-names>R</given-names>
          </string-name>
          ,. Chen,
          <string-name>
            <given-names>S.</given-names>
            ,
            <surname>Wang</surname>
          </string-name>
          ,
          <string-name>
            <surname>X.</surname>
          </string-name>
          <year>2012</year>
          .
          <article-title>Signing me onto your accounts through Facebook and Google: A traffic-guided security study of commercially deployed single-sign-on web services</article-title>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          <string-name>
            <surname>Zhang</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Li</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          <year>2011</year>
          .
          <article-title>Security vulnerabilities of an remote password authentication scheme with smart card</article-title>
          .
          <source>2011 International Conference on Consumer Electronics, Communications and Networks (CECNet)</source>
          ,
          <fpage>698</fpage>
          -
          <lpage>701</lpage>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>