<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>A Computational Framework for Identity and Its Web-based Realization</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>William Nick</string-name>
          <email>@aggies.ncat.edu</email>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Emma Sloan</string-name>
          <email>emma_sloan2@brown.edu</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Hannah Foster</string-name>
          <email>hnfoster@aggies.ncat.edu</email>
          <email>hnfoster@aggies.ncat.edu jpmayes@ncat.edu</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Albert Esterline</string-name>
          <email>esterlin@ncat.edu</email>
          <xref ref-type="aff" rid="aff3">3</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Brown University</institution>
          ,
          <addr-line>Greensboro, NC 27411</addr-line>
          ,
          <country country="US">USA</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>James Mayes, North Carolina A&amp;T State U.</institution>
          ,
          <addr-line>Greensboro, NC 27411</addr-line>
          ,
          <country country="US">USA</country>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>Madison Mccotter, Siobahn Day, Marguerite McDaniel, North Carolina A&amp;T State U.</institution>
          ,
          <addr-line>Greensboro, NC 27411, {wmnick, mumccott, scday, mamcdan2}</addr-line>
          ,
          <country country="US">USA</country>
        </aff>
        <aff id="aff3">
          <label>3</label>
          <institution>North Carolina A&amp;T State U.</institution>
          ,
          <addr-line>Greensboro, NC 27411</addr-line>
          ,
          <country country="US">USA</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2017</year>
      </pub-date>
      <fpage>33</fpage>
      <lpage>40</lpage>
      <abstract>
        <p>This paper presents a computational framework for identity and is particularly focused on identifying the culprit in a crime-scene investigation. A case is conceptualized as a constellation of situations in the sense of Barwise's situation theory. Data on a case is stored as RDF triples in a triple store. Several relevant OWL ontologies have been developed and supplemented with SWRL rules. Uncertainty and combining levels of (possibly conflicting) evidence are handled with Dempster-Shafer theory. A webpage is being developed to make available to students of criminal justice the results of our work. The user will be able to query about evidence and follow how it accrues to various hypotheses.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>We are developing a computational framework for identity,
and, with our focus on criminal investigations, we are
integrating ontologies and (to combine levels of evidence)
Dempster-Shafer theory into our system. A particularly
important goal of this project is a web interface to this system
for learning purposes. This webpage will allow a student to
query information regarding criminal investigations and
follow how evidence accrues to various hypotheses about the
identity of the culprit.</p>
      <p>
        The SuperIdentity project is the state-of-the-art in
frameworks for identity (Creese et al. ). It starts with some known
information or element of identity, such as a username or
email address, and transforms that element into others, e.g.,
by looking up an email address to find the associated
username. These elements are grouped by type (e.g., phone
number) into characteristics, multisets of elements. The set of all
characteristics is a person’s superidentity, a compilation of
all known information on them. Our framework covers all
aspects of the SuperIdentity framework but from a
situationtheory perspective. We assemble constellations of situations
(in the technical sense of Barwise and Perry
        <xref ref-type="bibr" rid="ref2">(Barwise and
Perry 1983)</xref>
        ) to produce a case as in the legal sense,
providing more structure and provenance than provided by
superidentities.
      </p>
      <p>The remainder of this paper is organized as follows.
Section 2 presents background: situation theory (the
theoretical background for our representations), Semantic Web
resources (our OWL ontologies serve as knowledge bases, and
data is stored as RDF triples conforming to our ontologies),
and Dempster-Shafer theory (used to handle uncertainty and
collaborating and conflicting evidence). Section 3 presents
our running example, Section 4 presents our ontologies, and
Section 5 summarizes the encoding of our examples in RDF.
Section 6 discusses the SWRL (Semantic Web Rule
Language) rules that complement our ontologies. Section 7
addresses evidence in the legal sense and the importance of
certain objects, viz., biometric artifacts, that persist across
situations. Section 8 presents our application of
DempsterShafer theory, Section 9 outlines a functional design of our
webpage, and Section 10 sketches the ongoing
implementation of our web-based system. Section 11 concludes and
suggests future work.</p>
      <p>
        Our framework is used in a way compatible with
contemporary crime-scene investigation, with most information
manually encoded as RDF triples and possibly automated
encoding of documents. We rely on human perception
except for biometric matching. Ontologies, which capture
expert knowledge and conventional practice (there is no
machine learning), constrain the encoding and support
inference. Dempster-Shafer theory reveals how evidence
combines and provides guidance even when evidence is weak.
For other recent presentations of our framework, see
        <xref ref-type="bibr" rid="ref16 ref17 ref22">(McDaniel et al. 2017a)</xref>
        and
        <xref ref-type="bibr" rid="ref16 ref17 ref22">(McDaniel et al. 2017b)</xref>
        regarding
ontologies and
        <xref ref-type="bibr" rid="ref21">(Sloan et al. 2016)</xref>
        and
        <xref ref-type="bibr" rid="ref16 ref17 ref22">(Sloan et al. 2017)</xref>
        regarding application of Dempster-Shafer theory.
2
      </p>
    </sec>
    <sec id="sec-2">
      <title>Background</title>
      <p>2.1</p>
    </sec>
    <sec id="sec-3">
      <title>Situation Theory</title>
      <p>
        Our computational framework is based on the situation
theory of Barwise and Perry
        <xref ref-type="bibr" rid="ref2">(Barwise and Perry 1983)</xref>
        ,
especially as systematized by Devlin
        <xref ref-type="bibr" rid="ref8">(Devlin 1995)</xref>
        . According
to Barwise, “‘[s]ituation’ is our name for those portions of
reality that agents find themselves in, and about which they
exchange information"
        <xref ref-type="bibr" rid="ref3">(Barwise 1989)</xref>
        . A situation supports
elementary items of information, called infons, each
essentially a relation among objects at a time and place (or
possibly the lack of such a relation). A real situation supports
an indefinite number of infons. We generally work with
abstract situations, each supporting a finite number of
(possibly parameterized) infons. An abstract situation amounts to
a type under which real situations are classified.
      </p>
      <p>There are constraints between situations, as expressed, for
example, by “smoke means fire." By virtue of constraints,
one situation may carry information about another. By virtue
of conventional (linguistic) constraints, an utterance
situation, in which someone performs a (declarative) speech act,
carries information about a described situation. Whether the
speech act is felicitous may depend on resource situations
related by conventions to the utterance situation; in a purely
linguistic setting, such situations typically support infons
expressed by relative clauses.</p>
      <p>In our framework, an id-action takes place in what we
call an id-situation. Any id-action is considered an
assertion of identity even if it is not verbal. So an id-situation
is an utterance situation, and the crime scene is the
corresponding described situation. Supporting situations essential
to crime-scene evidence (e.g., those where suspects’
fingerprints were recorded) are resource situations: there are
conventional constraints requiring the existence of properly
executed situations for the evidence to be admissible. Together,
the id-situation, the described situation (crime scene), and
the resource situations make an id-case.
2.2</p>
    </sec>
    <sec id="sec-4">
      <title>Semantic Web Resources</title>
      <p>
        The semantic web is built off of two W3C standards
        <xref ref-type="bibr" rid="ref18">(Pan
2009)</xref>
        : the resource description framework (RDF) [ref] and
the resource description framework schema (RDFS). The
web ontology language (OWL) extends the expressiveness
of RDFS and allows for the creation of ontologies.
“Ontology" is a term borrowed from philosophy, where it means
the conceptualization of entities in the world and how they
interact with each other, but, in computer science, it denotes
a conceptualization of a domain.
      </p>
      <p>RDF is a W3C recommendation that allows for the
annotation of web resources. RDF statements (known as triples)
are in the form of subject predicate object, where predicate
is a binary relation. A resource (thing) is denoted in RDF by
a uniform resource identifiers (URI), a string unique across
the web. A URI reference (URIref) is a URI with an optional
fragment identifier at the end. A URIref is usually
represented as a Qname, pre:lp, where pre is a URI (essentially
a namespace pefix) and lp is the local part. A blank node
(bnode) is a resource that is not identified by a URIref,
functioning like a pronoun. One RDF serialization defined by
the W3C is N3, in which triples are expressed by the three
components separated by whitespace. If several triples share
a subject, we can abbreviate by listing the common subject
then listing predicate-object pairs separated by semi-colons.</p>
      <p>RDFS allows for the definition of new RDF classes and
properties. An individual is an instance of a class. A class
may be a subclass of classes and a property may be a
subproperty of properties. A property has a domain, which is
a class to which its subjects belong, and a range, which is
a class or datatype to which its objects belong. For a
succinct representation, where p is a property, Dom is its domain,
and Rng is its range, we write p: Dom ! Rng. Object
properties have classes as ranges while datatype properties have
datatypes. Unlike RDFS, OWL allows for the expression of
local scope of properties, disjointedness of classes, Boolean
combinations of classes, cardinality restrictions, and special
characteristics of properties.</p>
      <p>
        SPARQL
        <xref ref-type="bibr" rid="ref19">(Pérez, Arenas, and Gutierrez 2006)</xref>
        is a
SQLlike query language for triple stores. The WHERE clause
contains a pattern of triples that will be matched by the query
engine. Query output is what is bound to the variables in the
SELECT clause. Various applications allow one to infer new
triples from those present in the triple store via connections
captured in the OWL ontologies. For additional inference
patterns, the ontologies can be supplemented with rules in
the Semantic Web Rule Language (SWRL). These are
ifthen rules that use the concepts expressed in the ontologies.
2.3
      </p>
    </sec>
    <sec id="sec-5">
      <title>Dempster-Shafer Theory</title>
      <p>
        Dempster-Shafer (DS) theory is a justification-based way of
distributing evidence
        <xref ref-type="bibr" rid="ref13">(Halpern 2005)</xref>
        . “Mass" of evidence
distributes to sets of elements or outcomes, with unassigned
mass, representing ignorance, given to the set of all
elements, called the frame of discernment. This assigns masses
sum to 1.0. A focal element is a set with non-zero mass. A
refinement is the analysis on the frame of discernment to get
a more detailed frame of discernment.
      </p>
      <p>Given a mass function, the belief function for a set is
the lower bound for likelihood, calculated by adding the
masses of all subsets of the set, while the plausibility is
the upper bound for the likelihood, calculated by adding
the masses from all of the sets that overlap the set. In
symbols, for a frame of discernment ⇥ , a mass function
m, and any subset ✓ of ⇥ , Bel(✓ ) = P✓ ⇤ ✓ ✓ m(✓ ⇤ ) and
P laus(✓ ) = P✓ ⇤ \ ✓ 6=; m(✓ ⇤ ). Thus, for any ✓ ✓ ⇥ ,
Bel(✓ )  P laus(✓ ).</p>
      <p>DS theory allows for the combination of multiple mass
functions for different kinds of evidence to produce a new
mass function that relates to the combined evidence. There
are a number of combination rules that fit different types of
data better. For example, Dempster’s rule combines pieces of
evidence that are equally reliable while preserving the
uncertainty inherent within each piece of evidence. Specifically,
Dempster’s rule calculates a measure, K, of conflict between
the mass functions and divides that measure as mass among
the different focal elements, including the focal element
that is the entire frame of discernment. In symbols, with
K = PB\ C6=✓ m1(B)m2(C) for mass functions m1 and
m2 and focal elements B and C. Dempster’s rule combines
m1 and m2 as m12 = (PB\ C=A m1(B)m2(C))/(1 K).
Other combination rules include Zhang’s rule (which
allows combination of mass functions with different frames of
discernment) and the mixing rule (which assigns different
weights to the combined mass function and so compensates
for the fact that some pieces of evidence may be more
reliable than others). And often researchers create their own,
context-specific combination rules.</p>
      <p>3</p>
    </sec>
    <sec id="sec-6">
      <title>Running Example</title>
      <p>We consider a scenario where a theft has occurred at a party.
There is a list of possible suspects in the form of a guest list.
Evidence from the crime scene includes a group photograph
from a security camera with one guest with their hand on the
doorknob of the door to where the valuables were kept and a
fingerprint on that doorknob. This scenario is a constellation
of situations, centering around two separate id-situations for
the two pieces of evidence: the fingerprint and the snapshot.
Situation s1 (see Figure 1) is the id-situation for the
fingerprint case; an analyst compares fingerprints on file from the
partygoers to the forensic one at the crime scene. In
situations s3a-s3d, a suspect has their fingerprint taken by a police
officer, and in situation s4, the criminal touches the
doorknob, placing the forensic fingerprint. The CSI team lifts
the fingerprint from the doorknob in situation s5. The
idsituation for the case with the security camera image, s2, is
supported by its own constellation of situations. See Figure
2. Police take a mugshot of each suspect in situations
s6as6d. Those mugshots are then compared with the security
camera image in s2. The security camera records the group
in situation s7, which acts as an utterance situation,
describing the group in s8. Situation s4, in which the fingerprint is
left by touching the doorknob, is a part of situation s8.</p>
    </sec>
    <sec id="sec-7">
      <title>4 The Ontologies</title>
      <p>Figure 3 shows the ontologies created for the framework and
their relationships to each other. Each ontology inherits from
the ontology below.</p>
      <p>Our ID-Situation Ontology (to which we associate the
prefix id) focuses on situations and constellation of
situations (i.e., id-cases) that involve id-actions as well as
any evidence supporting them. This ontology is built on
the Situation Ontology (to which we associate the
prefix sit), whose two major classes are sit:Situation and
sit:Infon, whose children are essential in encoding our
example. Subclasses of sit:Infon corresponding to
various relations are defined in the ID-Situation Ontology. For
such a subclass, we define properties with it as domain
for the argument positions in the corresponding relation.
This avoids RDF’s restriction to binary relations
(“properties") and accommodates variable-arity relations. For
simplicity, we associate time and location with a situation
rather than with individual infons. Consequently, we define
top-level classes sit:Temp and sit:Loc as well as various
functional properties such as sit:tempLoc: sit:Situation
! sit:Temp and sit:spatialLoc: sit:Situation ! sit:Loc.
For the sit:Situation class, there is a reflexive and
transitive object property sit:partOf: sit:Situation !
sit:Situation to indicate that one situation is a part of
another.</p>
      <p>The ID-Situation Ontology includes class id:IdCase,
an instance of multiple situations that form an id-case.
There is an object property id:hasSituation: id:IdCase
! sit:Situation, connecting an id-case to its
constituent situations. Subproperties of id:hasSituation
are id:hasIdSituation: id:IdCase ! sit:Situation and
id:hasSupportingSituation: id:IdCase ! sit:Situation.
The first acts as a functional property that relates an
id-case to its id-situation; the latter links an id-case to
supporting situations. We also have an equivalence property,
id:coordindatedIdCase: id:IdCase ! id:IdCase, that relates
id-cases that refer to the same scenario.</p>
      <p>As shown in Figure 3, the ID-Situation Ontology
incorporates other ontologies that relate not only to the structure of
a case but also to the specific kind of information–biometric
artifacts–and procedures needed for evidence to support
idactions. This includes the Physical Biometric Ontology that
addresses biometric artifacts, which are images of the
suspects’ physical features registered for use by forensic
professionals. For the information captured by physical
biometrics, we have a Physical Features Ontology that addresses
the human body, which relates specific surface features to
specific persons, allowing the biometric images to serve as
identifiers.</p>
      <p>The most important of the supporting ontologies is the
Law Enforcement Ontology. (For simplicity, we now omit
prefixes.) The standard FOAF ontology has a top-level Agent
class with children Organization and Person. We provide
a child LawEnforcementAgency of Organization and a child
LawEnforcementProfessional of Person itself with children
ForensicProfessional, PoliceOfficer, PoliceInvestigator,
and ProsecutionProfessional. There is an affiliation
property associating agents with organizations and a certification
property associating forensic professionals with certificates.
There is a Personal Records Ontology.</p>
      <p>5</p>
    </sec>
    <sec id="sec-8">
      <title>Encoding in RDF of the Example</title>
      <p>We outline the RDF encoding of the fingerprint case,
providing an example of code. A shorter summary of the mugshot
case is presented.
5.1</p>
      <p>The Fingerprint Id-Case
s1 is the id-situation for the fingerprints. It supports
two essential infons, both instances of children of
id:MatchingFpInfon (a child of sit:Infon). One child of this
class is id:AnalystMatchingFpInfon, information that an
attempt is made to match a fingerprint from the scene against
a recorded fingerprint, and the other is id:SimilarFpInfon,
information on the similarity measure for the match and the
matching procedure used. For the first suspect, s1 supports
the following two infons (denoted by blank nodes, with “_"
in place of a prefix).
_:i11a a id:AnalystMatchingFpInfon;
id:fpAnalyst forprof:117;
id:fpObserved forensicfp:652;
id:fpRecorded fpfile:496;... .
_:i1a a id::SimilarFpInfon;
id:fpObserved forensicfp:652;
id:fpRecorded fpfile:496;
id:simMeasure "0.92";
id:simProc similar:Proc1; ... .</p>
      <p>We assume that the relevant agency has indexed the
individuals with numerical identifiers. We introduce prefixes
for individuals thus indexed: forprof for forensic
professionals, forensicfp for fingerprints collected at crime scenes, and
fpfile for fingerprints on file. We also assume unique
identifiers with prefix similar for the matching procedures used.
The same pair of fingerprints appears in both infons. There
are similar pairs of infons for the other suspects.</p>
      <p>s3a is the situation where the fingerprints of the first
subject were taken and recorded. It supports one essential
infon, the information that a forensic professional takes the
fingerprint of a subject. There is one such infon for the other
three fingerprint-recording situations. s4 is the described
situation, where someone leaves their fingerprint on the
doorknob. There are two essential items of information here, that
the fingerprint is on the doorknob, and that some suspect left
their fingerprint. s5, where the fingerprint on the doorknob is
lifted, has one essential item of information, that a forensic
professional lifts a fingerprint.
5.2</p>
      <p>The Mugshot Id-Case
s2, the id-situation for the mugshots, supports two essential
infons similar to those in the fingerprint id-situation, s1. The
photo of the culprit is a part of the photo that the officer took:
the part showing their face. s6a, where the mugshot of the
first subject was taken and recorded, supports one essential
infon, that a given forensic professional takes and records
a mugshot of a suspect with a given camera. There is one
such infon for each of the remaining three situations. s7,
where a forensic professional takes a picture, has two
significant infons. One is that a certain officer takes a picture
of a given situation with a given camera thereby producing
a given group photo. s7 is an utterance situation: it produces
an artifact carrying information about another situation, viz.,
s8. The other significant infon in s7 is that a certain group is
in the described situation, s8. When our culprit is identified,
we add a triple stating that they are a member of the group.
The described situation, s8, has one significant infon, for the
touching. Once we have identified the culprit, we add a triple
for the toucher. This infon is supported by the described
situation while s7 carries this infon by virtue of the photo it
produces. There is a part-whole relation between s4 and s8.
6</p>
    </sec>
    <sec id="sec-9">
      <title>SWRL Rules</title>
      <p>SWRL rules allow us to infer new triples and thus fill in
our descriptions of objects, situations, and agents based on
triples already in our ontologies. There are two significant
tasks for our SWRL rules: identify the culprit and classify
situations and entire id-cases.
6.1</p>
    </sec>
    <sec id="sec-10">
      <title>Identifying the Culprit</title>
      <p>Typically, there is a described situation where the culprit is
unidentified and an id-situation, where the evidence is
presented for pronouncing a judgment on the identity of the
culprit in the described situation. For example, in the
fingerprint case, once we have an identity judgment, we can fill
in the value for the id:fpProducer property for the instance of
id:LeaveFpInfon supported by s4. We have created a rule that
does the updates subsequent to identifying the culprit. This
includes supplying id:toucher in id:TouchInfon and an agent
in id:AgentInfon for the described situation s8. We also
assert a triple of the form x sit:agentInSit s, indicating that x
is the agent of interest in situation s. This is top-level
information not associated with any other situation that provides
one way of identifying the agent. Inference will generally
identify several suspects as “the" culprit since inference does
not consider the goodness of biometric matches; we handle
level of evidence with Dempster-Shafer theory – see Section
8.
6.2</p>
    </sec>
    <sec id="sec-11">
      <title>Classifying Situations and Id-Cases</title>
      <p>We need abstract situations as types to classify real
situations and abstract id-cases to classify constellations of
situations in a way conducive to identification. The ID-Situation
Ontology has subclasses of class sit:Situation, essentially
abstract situations, and it has an id:IdCase class, which has
subclasses for classification. Determining whether a given
situation should be an instance of a given situation class is
a classification problem that hinges on whether the real
situation supports certain infon subclasses. When we described
our running example, we described real situations, but the
descriptions themselves, where we talked about essential
infons, basically formulated abstract situations. Our
classifying SWRL rules, then, have the form
Situation(?s), ... -&gt; SituationSubClass(?s)
The conditions that fill in the ellipsis relate to the infons that
?s supports. We also classify an instance of id:IdCase as an
instance of a subclass of that class. Finally, we have a SWRL
rule for determining that an instance of the mugshot id-case
and an instance of the fingerprint id-case are coordinated
7</p>
    </sec>
    <sec id="sec-12">
      <title>Biometric Artifacts and Legal Evidence</title>
      <p>
        Objects and situations (or events) are complementary
        <xref ref-type="bibr" rid="ref11">(Galton and Mizoguchi 2009)</xref>
        . Objects are created, changed,
copied, and destroyed in situations, and situations consist
of objects related in various ways. Though our foundations
are built on situations, objects are important in several
areas. Some objects are passive participants (e.g. doorknob)
while others play essential roles in capturing evidence (e.g.
camera). To support our conclusions from the evidence
collected, we may need facts regarding these objects. The
objects of primary interest are biometric artifacts, serving as
threads that stitch together the situations building an id-case.
E.g., in the fingerprint id-case, fingerprints are recorded on
file (situations s3a-s3d), providing objects used in the
idsituation, s1, and a fingerprint is lifted from the doorknob
in s5, providing the object against which the fingerprints on
file are compared.
      </p>
      <p>
        To see how such objects count as evidence, note that
evidence in criminal prosecution includes any documents,
testimony or tangible objects that tend to prove or disprove
the existence of alleged facts
        <xref ref-type="bibr" rid="ref4">(Black, Garner, and McDaniel
1999)</xref>
        . Documentary evidence consists of any written object
or article, e.g., letters, contracts, deeds, licenses, and
certificates, presented as proof. Testimonial evidence consists of
any statement made under oath by a witness during trial or
at deposition. “Tangible object" evidence refers to any
physical item or its representation presented as proof to support
an alleged fact. Physical evidence includes biological and
non-biological trace evidence. Here, trace evidence is
defined as evidence that can be transferred between people,
objects or the environment. Physical evidence also includes
facial recognition (photography and videography) and
fingerprint and biometric (DNA, blood, semen, saliva, urine, feces,
hair, teeth, bone, tissue, and cells) evidence. The use of all
evidence is subject to law, legal rules and procedures to
determine its admissibility and probative value. Additionally,
the provenance, preservation (cf. chain of custody–CoC–
immediately below), and analysis of evidence is central to
its forensic application.
      </p>
      <p>
        In particular, biometric artifacts used as evidence have to
be genuine throughout. CoC theory addresses what is
essential “to ensure the integrity of evidence"
        <xref ref-type="bibr" rid="ref12">(Giannelli 1993)</xref>
        .
Our framework facilitates application of CoC theory,
focusing (for now) on physical, or “real," evidence, tangible
evidence used to prove a fact that is at issue in a case
        <xref ref-type="bibr" rid="ref5">(Citizens
Information 2014)</xref>
        . It also has to be relevant, material, and
competent
        <xref ref-type="bibr" rid="ref10">(Findlaw 2016)</xref>
        to be admitted in court.
Following what CoC theory states is required, one can
authenticate real evidence since CoC theory requires the mapping of
who, what, where, and how evidence is obtained and
handled
        <xref ref-type="bibr" rid="ref12">(Giannelli 1993)</xref>
        . We appeal to CoC theory since our
central focus is to evaluate whether the metadata or
forensic data (as real evidence) is sufficient to identify suspects.
Our framework records CoC steps followed; it does not itself
physically obtain or preserve the evidence.
      </p>
    </sec>
    <sec id="sec-13">
      <title>8 Application of Dempster-Shafer Theory</title>
      <p>For each id-case, a numerical measure is created of who
is likely to be the criminal and then all known id-cases
are combined using Dempster-Shafer theory. For each
idsituation and each suspect, there is a distance measure that
is part of the id-situation. A mass function is then created
based on that distance measure. To work with the scenario
from the running example, to create the mass function for
the fingerprint id-case, as shown in Figure 1, masses are
assigned based on the distance between each suspect’s
fingerprint and the fingerprint from the crime scene. Conversion
of distances to masses uses a customized sigmoid function,
which provides a threshold below which a possible match
can be ignored. Those masses are then normalized so that
all values sum to 1.0.</p>
      <p>An id-situation is tied to resource situations through
constraints. Every piece of evidence in the id-situation has been
collected in some other situation or set of situations,
following appropriate legal procedures to maintain a chain of
custody, a convention that specifies a related situation or set of
situations (e.g., the s3 situations in Figure 1) that must have
occurred. There are three possible interpretations of the
constraints in the context of Dempster-Shafer theory. One is that
each set of situations provides a separate mass function so
that the mass function from the resource situations must be
combined with the mass function from the id-situation. The
second is to consider each resource situation as a refinement
of the frame of discernment created in the id-situation. The
third interpretation has the resource situations modifying the
mass function.</p>
      <p>Treating each set of situations as a separate piece of
evidence, with its own mass function, would sanction
application of Dempster-Shafer combination rules. The frame of
discernment for the id-situation in fact is the same as the
frame of discernment for a collection of resource situations
that covers all the suspects from the id-situation. Dempster’s
combination rule is appropriate because the underlying
uncertainties should be preserved.</p>
      <p>Treating the constraints as refinements would make each
group of resource situations modify the arrangement of the
set of suspects. As noted, however, in our framework, the
frame of discernment is the same throughout.</p>
      <p>Not all resource situations can be accommodated
using the two previously described methods. For example,
in Figure 1, information from situation s5 modifies the
idsituation, but it does not refer to any suspect and so does
not refine the frame of discernment or even rearrange focal
elements. The analysts who collected the crime scene
fingerprint might be untrustworthy. This could be handled by
moving some mass to the entire frame of discernment or by
weighting the piece of evidence less heavily when
combining it with evidence from other id-situations.</p>
      <p>Table 1 shows the mass, belief, and plausibility for the
mass functions from the two id-situations and their
combination. Masses of non-singleton sets other than the entire
frame of discernment (“All") are all zero. The mass values
have been subject to modification to accommodate aspects
of the resource situations as just discussed.</p>
      <p>Photographic Evidence
Suspect Mass Belief
201 0.399 0.399
202 0.405 0.405
203 0 0
204 0 0
All 0.196 1.0</p>
      <p>Fingerprint Evidence
Suspect Mass Belief
201 0.290 0.290
202 0 0
203 0.215 0.215
204 0.188 0.188
All 0.306 1.0</p>
      <p>Combined Evidence
Suspect Mass Belief
201 0.528 0.528
202 0.222 0.222
203 0.076 0.076
204 0.066 0.066
All 0.108 1.0
This section outlines the functionality of the webpage
interface to the system we are building. The webpage will have
three major functional areas: the case description , query,
and evidence panes.
9.1</p>
    </sec>
    <sec id="sec-14">
      <title>Case Description Pane</title>
      <p>The case description pane will include a menu of cases.
When a case is clicked, a short paragraph describing the case
will appear, providing information about the case including
an outline of the events as well as a summary of the kinds
of evidence available. The user may switch between the
various scenarios and investigate the scenario of their choice.
The case description will have a button to bring up a menu
of suspects. When the user selects a given suspect, a short
description of the suspect appears along with a template for
constructing queries about the suspect. Generally, this pane
provides information to initiate interaction in the other two
panes.
9.2</p>
    </sec>
    <sec id="sec-15">
      <title>Query Pane</title>
      <p>This pane, whose content is specific to the selected case,
supports both queries on the triple stores and inferences
made on these stores given the ontologies and the SWRL
rules. There is a tab for each kind of evidence. In our
running example, there is a tab for the fingerprint evidence and
a tab for the mugshot evidence. There is also a tab for
inferring the identity of the culprit, and a tab for classifying the
case and its constituent situations.</p>
      <p>The contents of the tabs for the various kinds of evidence
are structured similarly. Consider, for example, the tab for
the fingerprint evidence. Often a value will be selected from
a menu. The following are some possible topics for queries.
• Who took a given fingerprint that is on file? When?</p>
      <p>Where?
• How was the fingerprint preserved or copied?
• Who lifted the fingerprint?
• Who handled the comparison of the fingerprint on file and
the forensic fingerprint?
• How good a match is the match between a given
fingerprint on file and forensic fingerprint?
Many of these queries relate to provenance, including chain
of custody. Note that it is natural for a query to span
situations, often by following the CoC. For example, one could
ask for the name of the professional who took the
fingerprint on file in situation s3a that is used in the id-situation
s1. Many queries could be issued for a set of fingerprints on
file. The results will be displayed in a table, possibly ranked
by the value of some field (e.g., the goodness of match). If
the result of a query indicates some suspect is particularly
interesting, the user may bring up the template mentioned
above for queries about a person. Legal professionals may
also be of interest (e.g., those who took fingerprints), and a
variation of the template will be available for querying about
them.</p>
      <p>The tab for inferring the identity of the culprit basically
does just that. Often, however, there will be more than one
culprit inferred since mere inference does not take into
account how good the evidence is (which is the realm of
Dempster-Shafer theory, accessed via the evidence pane).
One will be able to control the size of the set of inferred
culprits by setting thresholds on matches and restricting
evidence to just some kinds of evidence (e.g., fingerprint or
mugshot). To find details of an alleged culprit, one can
follow up with the suspect template mentioned above.</p>
      <p>The tab for classifying the case and its constituent
situations provides an interface for applying some of the SWRL
rules mentioned in Section 6. We could find the classes (if
any) that the various situations instantiate. For example, a
situation might be an instance of the abstract id-situation
where an attempt is made to identify a culprit by fingerprint.
We could find the id-case class (if any) that an id-case
instantiates. For example, a given constellation of situations
forming an id-case may be an instance of a case where a
culprit is identified by fingerprint. Finally, we could determine
whether a given id-case is coordinated with another id-case
as they involve the same described situation and similar set
of suspects.
9.3</p>
    </sec>
    <sec id="sec-16">
      <title>Evidence Pane</title>
      <p>The evidence pane will support the application of
DempsterShafer theory to the evidence provided for the cases. It is
assumed that mass functions have been defined for each kind
of evidence in each case. Like the query pane, the contents of
the evidence pane will be specific to the selected case. The
user will be able to access the templates for suspects and
for personnel in this pane as well to see details on people of
interest.</p>
      <p>There will be a tab for each kind of evidence and a tab for
the combined evidence. The contents of the tabs for the
various kinds of evidence will have similar structure. Consider,
for example, the tab for the fingerprint evidence. The user
will be able to request a table for the singleton sets of
suspects ordered by belief or ordered by plausibility, given the
mass function based on fingerprint matches. This could be
restricted to the top few in belief or plausibility. Frequently,
the belief or plausibility of non-singleton sets is of interest,
particularly when the belief for such a set is high or the
plausibility is low. The user might request small sets with high
belief or large sets with low plausibility. The mass functions
can me modified by features of the resource situations, such
as the reliability of the forensic professional who took the
fingerprint on file. The fingerprint tab will include ways for
the user to have such modifying aspects incorporated into
the mass function.</p>
      <p>The tab for the combined evidence will allow the user to
view tables of singleton sets, now with the belief and
plausibility from the combined mass function. Non-singleton sets
are of interest here as they are with a single kind of
evidence. The user will be able to select the combination rule
used, the default being Dempster’s rule. There will also be a
way to analyze sensitivity. For example, the fingerprint from
the scene might be quite indistinct so that it does not
discriminate sharply between the suspects while the forensic
mugshot may be a clear picture of the culprit’s face. In that
case, the page should indicate that identification relies much
more on the one kind of evidence (mugshots) than on the
other (fingerprints) and give some indication of how much
more.</p>
    </sec>
    <sec id="sec-17">
      <title>Implementation of the Web-based System</title>
      <p>
        This section describes the implementation of our web-based
system, which is a work in progress. To implement the
backend of our system, we used the Apache Struts
modelview-controller framework
        <xref ref-type="bibr" rid="ref23">(The Apache Software
Foundation 2010)</xref>
        , Apache Velocity template engine
        <xref ref-type="bibr" rid="ref24">(The Apache
Software Foundation 2014)</xref>
        , and the Stardog triplestore [12].
The view (frontend) and the controller interface are provided
by Struts and can integrate with other technologies to
provide the model. A controller acts as a bridge between an
application’s model and the web view. The Stardog triple
store
        <xref ref-type="bibr" rid="ref6">(Complexible 2014)</xref>
        supports OWL and rule reasoning,
which it does in a lazy and late-binding fashion: reasoning is
performed at query time according to a reasoning type
specified by the user. Apache Velocity is a template engine for
Java that provides the user a simple but powerful template
language able to reference objects defined in Java. We use
Velocity to create SPARQL queries from a template since
we assume that the user is not familiar with SPARQL. We
connect to the Stardog triplestore using the RESTful web
service exposed by Stardog. We decided to use the RESTful
web services because the Jena
        <xref ref-type="bibr" rid="ref1">(Apache Software
Foundation 2013)</xref>
        interface code was not available. (Jena is our
preferred Semantic Web framework.) A RESTful web service
uses HTTP verbs for accessing and manipulating data.
      </p>
      <p>To keep the web application running as fast as possible, an
XML document was created to store meta-information about
and control information for our scenarios. The information
in this XML document includes the id, name, and
description of the scenario. The user will access the data in this
XML document through the interface. The XML document
will also contain the possible queries that can be executed on
each piece of evidence as well as the types of evidence for
each scenario. The code will turn similarity measures into
masses used later for belief and plausibility calculations.</p>
      <p>
        Belief and plausibility calculations are written in Python.
To run this script from Java, we use the Jython interpreter
        <xref ref-type="bibr" rid="ref15">(Jython 2001)</xref>
        , which is a Python interpreter written in Java
and is embeddable in Java applications. To store the data
produced by the code executed by Jython, a data structure
was created to store belief and the plausibility values. The
data structure with the masses will be stored into a session
variable to be used later. After the user selects the
combination rule to use, the data structure will be passed into a
combination method with a string identifier that identifies
the combination rule. The Jython interpreter will run the
appropriate method for that particular combination rule. The
output of the running of the interpreter will be stored into
a data structure of data objects. The data produced by the
Jython interpreter will be cached into memory using
Infinispan
        <xref ref-type="bibr" rid="ref20">(Redhat 2009)</xref>
        , which is an in-memory key-value data
store written in Java and used as a cache or a data grid. It
can be embedded into Java applications or used as a remote
service over a variety of protocols. Our setup will have
Infinispan embedded into our application so that some of the
data may be cached .
11
      </p>
    </sec>
    <sec id="sec-18">
      <title>Conclusion</title>
      <p>We have presented our computational framework for agent
identity, currently focused on criminal investigations,
especially the use of biometrics therein. This paper is especially
concerned with ongoing development of a web-based
system that makes available via a webpage the functionality
of this framework especially for pedagogical putposes. The
theoretical underpinnings are in Barwise’s situation theory.
We construct a case as a constellation of situations,
including an id-situation, corresponding to Barwise’s utterance
situation and involving an identity assertion (of the culprit).
The described situation is the crime scene. There are also
resource situations tied by convention to the id-situation,
such as where fingerprints are recorded and filed. Cases are
encoded in RDF, and several OWL ontologies have been
developed to serve as a knowledge base and define RDF
classes and properties. Dempster-Shafer theory is used to
handle uncertainty and in combining levels of possibly
conflicting or corroborating evidence. We presented an example
and discussed its encoding in RDF as per our ontologies. We
discussed our ontologies and the SWRL rules that enhance
them. Evidence in the legal sense was discussed in the
current context, and the importance of biometric artifacts that
persist across situations was noted. A functional design of
our webpage was presented, and the ongoing
implementation of the web-based system was discussed.</p>
      <p>
        The webpage will make available to students of criminal
justice our work on a computational framework on identity
as it is particularly focused on identifying the culprit in a
crime scene investigation. A computerized evidentiary fact
pattern would help students develop their critical thinking
skills and support interdisciplinary problem solving.
Additionally, the availability of the web interface will provide
unlimited opportunities for students to practice and engage in
fact-pattern scenarios, thus building valuable experience for
future careers and research. The Criminal Justice program
at North Carolina A&amp;T State University will use the
webpage in four of its courses and in its signature co-curricular
project. The webpage can be used as an instructional tool
and for formative assessment. The web interface could also
be used in the Aggie Sleuths Project, an interdisciplinary,
interdepartmental research project based on a simulated crime
scene
        <xref ref-type="bibr" rid="ref9">(Fakayode et al. 2016)</xref>
        .
      </p>
      <p>We have encoded several scenarios besides the example
given in this paper, and we are in the process of encoding
several more. Note that fingerprint and mugshot biometrics
are used online. In working with online authentication
(Jenkins et al. ), we are addressing behavioral biometrics (e.g.,
swipe patterns on mobile devices). We intend eventually to
address any kind of evidence for identity and to develop
ontologies as required. And we shall continue to enhance our
use of Dempster-Shafer theory, looking at various
combination rules and ways to modify mass functions.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          <string-name>
            <given-names>Apache</given-names>
            <surname>Software Foundation</surname>
          </string-name>
          .
          <year>2013</year>
          .
          <article-title>Apache jena</article-title>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          <string-name>
            <surname>Barwise</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          , and
          <string-name>
            <surname>Perry</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          <year>1983</year>
          .
          <article-title>Situations and attitudes</article-title>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          <string-name>
            <surname>Barwise</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          <year>1989</year>
          .
          <article-title>The situation in logic. Center for the Study of Language (CSLI).</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          <string-name>
            <surname>Black</surname>
            ,
            <given-names>H. C.</given-names>
          </string-name>
          ;
          <string-name>
            <surname>Garner</surname>
            ,
            <given-names>B. A.</given-names>
          </string-name>
          ; and
          <string-name>
            <surname>McDaniel</surname>
            ,
            <given-names>B. R.</given-names>
          </string-name>
          <year>1999</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          <string-name>
            <given-names>Citizens</given-names>
            <surname>Information</surname>
          </string-name>
          .
          <year>2014</year>
          .
          <article-title>Real evidence</article-title>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          <string-name>
            <surname>Complexible</surname>
          </string-name>
          .
          <year>2014</year>
          . Stardog.
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          <article-title>Tools for understanding identity</article-title>
          .
          <source>In Technologies for Homeland Security (HST)</source>
          ,
          <year>2013</year>
          IEEE International Conference on,
          <fpage>558</fpage>
          -
          <lpage>563</lpage>
          . IEEE.
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          <string-name>
            <surname>Devlin</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          <year>1995</year>
          .
          <article-title>Logic and information</article-title>
          . Cambridge University Press.
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          <string-name>
            <surname>Fakayode</surname>
            ,
            <given-names>S. O.</given-names>
          </string-name>
          ;
          <string-name>
            <surname>Mayes</surname>
            ,
            <given-names>J. P.</given-names>
          </string-name>
          ;
          <string-name>
            <surname>Kanipes</surname>
            ,
            <given-names>M. I.</given-names>
          </string-name>
          ; Johnson, D.; and
          <string-name>
            <surname>Cuthbertson</surname>
            ,
            <given-names>E. L.</given-names>
          </string-name>
          <year>2016</year>
          .
          <article-title>Promoting student learning in criminal justice, stem, and forensic science: Aggie sleuth initiative (aggiesi)-guided inquiry learning experience</article-title>
          .
          <source>Journal of Criminal Justice Education</source>
          <volume>1</volume>
          -15.
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          <string-name>
            <surname>Findlaw</surname>
          </string-name>
          .
          <year>2016</year>
          .
          <article-title>Summary of the rules of evidence.</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          <string-name>
            <surname>Galton</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          , and
          <string-name>
            <surname>Mizoguchi</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          <year>2009</year>
          .
          <article-title>The water falls but the waterfall does not fall: New perspectives on objects, processes and events</article-title>
          .
          <source>Applied Ontology</source>
          <volume>4</volume>
          (
          <issue>2</issue>
          ):
          <fpage>71</fpage>
          -
          <lpage>107</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          <string-name>
            <surname>Giannelli</surname>
            ,
            <given-names>P. C.</given-names>
          </string-name>
          <year>1993</year>
          .
          <article-title>Chain of custody</article-title>
          .
          <source>Report</source>
          , School of Law, Case Western Reserve University.
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          <string-name>
            <surname>Halpern</surname>
            ,
            <given-names>J. Y.</given-names>
          </string-name>
          <year>2005</year>
          .
          <article-title>Reasoning about uncertainty</article-title>
          . MIT Press.
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          <string-name>
            <surname>In</surname>
            <given-names>SoutheastCon</given-names>
          </string-name>
          ,
          <year>2016</year>
          ,
          <fpage>1</fpage>
          -
          <lpage>2</lpage>
          . IEEE.
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          <string-name>
            <surname>Jython</surname>
          </string-name>
          .
          <year>2001</year>
          .
          <article-title>Jython: Python for the java platform</article-title>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          <string-name>
            <surname>McDaniel</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ;
          <string-name>
            <surname>Sloan</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          ;
          <string-name>
            <surname>Day</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ;
          <string-name>
            <surname>Mayes</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ;
          <string-name>
            <surname>Nick</surname>
            ,
            <given-names>W.</given-names>
          </string-name>
          ; Roy,
          <string-name>
            <given-names>K.</given-names>
            ; and
            <surname>Esterline</surname>
          </string-name>
          ,
          <string-name>
            <surname>A.</surname>
          </string-name>
          <year>2017a</year>
          .
          <article-title>Situation-based ontologies for a computational framework for identity focusing on crime scenes</article-title>
          .
          <source>In Accepted for IEEE Conference on Cognitive and Computational Aspects of Situation Management (CogSIMA</source>
          <year>2017</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          <string-name>
            <surname>McDaniel</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ;
          <string-name>
            <surname>Sloan</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          ;
          <string-name>
            <surname>Nick</surname>
            ,
            <given-names>W.</given-names>
          </string-name>
          <string-name>
            <surname>Mayes</surname>
          </string-name>
          , J.; and
          <string-name>
            <surname>Esterline</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          <year>2017b</year>
          .
          <article-title>Ontologies for situation-based crime scene identities</article-title>
          .
          <source>In Accepted for IEEE SoutheastCon.</source>
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          <string-name>
            <surname>Pan</surname>
            ,
            <given-names>J. Z.</given-names>
          </string-name>
          <year>2009</year>
          .
          <article-title>Resource description framework</article-title>
          .
          <source>In Handbook on Ontologies</source>
          . Springer.
          <fpage>71</fpage>
          -
          <lpage>90</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          <string-name>
            <surname>Pérez</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ; Arenas,
          <string-name>
            <given-names>M.</given-names>
            ; and
            <surname>Gutierrez</surname>
          </string-name>
          ,
          <string-name>
            <surname>C.</surname>
          </string-name>
          <year>2006</year>
          .
          <article-title>Semantics and complexity of sparql</article-title>
          .
          <source>In International semantic web conference</source>
          ,
          <volume>30</volume>
          -
          <fpage>43</fpage>
          . Springer.
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          <string-name>
            <surname>Redhat</surname>
          </string-name>
          .
          <year>2009</year>
          . Infinispan.
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          <string-name>
            <surname>Sloan</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          ;
          <string-name>
            <surname>McDaniel</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ;
          <string-name>
            <surname>Nick</surname>
            ,
            <given-names>W.</given-names>
          </string-name>
          ; Mayes, J.; and
          <string-name>
            <surname>Esterline</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          <year>2016</year>
          .
          <article-title>Structure and evidence in identity cases</article-title>
          .
          <source>In Proc. 2016 IEEE Symposium Series on Computational Intelligence (IEEE SSCI</source>
          <year>2016</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          <string-name>
            <surname>Sloan</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          ;
          <string-name>
            <surname>McDaniel</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ;
          <string-name>
            <surname>Nick</surname>
            ,
            <given-names>W.</given-names>
          </string-name>
          ; Mayes, J.; and
          <string-name>
            <surname>Esterline</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          <year>2017</year>
          .
          <article-title>Marshalling situation-based evidence in identity cases</article-title>
          . In Accepted for IEEE SoutheastCon.
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          <string-name>
            <given-names>The</given-names>
            <surname>Apache Software Foundation</surname>
          </string-name>
          .
          <year>2010</year>
          .
          <article-title>Apache struts</article-title>
          .
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          <string-name>
            <given-names>The</given-names>
            <surname>Apache Software Foundation</surname>
          </string-name>
          .
          <year>2014</year>
          .
          <article-title>Apache velocity</article-title>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>