<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>User-Defined Rules in a Distributed Address Book</article-title>
      </title-group>
      <contrib-group>
        <aff id="aff0">
          <label>0</label>
          <institution>Freie Universita ̈t Berlin Department of Computer Science Ko ̈ nigin-Luise-Str.</institution>
          <addr-line>24/26, 14195 Berlin</addr-line>
          ,
          <country country="DE">Germany</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>The Semantic Web as an evolution of the World Wide Web allows its users to share content over the boundaries of applications and web sites. However, current web-based systems for the controlled distribution of private information require the presence of information on centralized systems. A potential risk for the user is the central system operator which has full access to all stored information. Moreover, if a malicious user gets unauthorized access to the operator's management rights, the information stored by all users is exposed. In this paper, we demonstrate our alternative approach of a distributed address book, where users can store their information on a system under their own control. A special focus in our implementation was on the usability, in particular for the complex rule generation and processing chain, so that any user familiar with social network software is able to formulate access policies.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>
        The Semantic Web as an evolution of the World Wide Web allows its users to share
content over the boundaries of applications and web sites. To achieve this goal, the
resources of the WWW are annotated using machine-readable meta data. The principles
of Linked Data [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ] describe a set of conventions how this meta data should be
structured and published, so information can be re-combined and processed at an arbitrary
location.
      </p>
      <p>Conventional web-based systems for the controlled distribution of private
information require the presence of information on centralized systems. In order to control the
access to the managed information, these systems usually support secured data storage,
access policies for the stored data and user authentication. Examples for such systems
include various social networks: all users sign in on a central website to store their
information there. Users configure their privacy settings on that website, for instance
to reveal their telephone number only to a particular group of authorized users.
However, a potential risk for the user is the central system operator which has full access
to all stored user information. The user cannot necessarily trust the operator. Moreover,
if a malicious user gets unauthorized access to the operator’s management rights, the
information stored by all users is exposed and each user’s privacy is endangered.</p>
      <p>
        We have developed a decentralized method for enforcing distributed user-defined
access policies on Semantic Web data encoded in the Resource Description Format
(RDF) [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ] in a concept called the “Policy enabled Linked Data Server” PeLDS [
        <xref ref-type="bibr" rid="ref5 ref6">6,5</xref>
        ]. In
this paper, we demonstrate our alternative approach of a distributed address book, where
users can store their information on a system under their own control. Integration with
other users on other systems is easily possible, and the access to the stored information
can be controlled by the users themselves.
      </p>
      <p>The remainder of this paper is structured as follows: Section 2 describes the basic
concepts for protecting information published as linked data with the definition and
enforcement of access policies. Our back-end system, the Policy-enabled Linked Data
Server is introduced shortly. Subsequently, Section 3 describes our Distributed Address
Book application, its system architecture and user interaction concept. Finally, Section 4
concludes this paper.
2</p>
    </sec>
    <sec id="sec-2">
      <title>Linked Data with Access Policies</title>
      <p>Access policies are rules which describe the situations in which different pieces of
information are made available to others. In order to express access policies for an RDF
graph, the user has to describe those parts of the graph to be affected by a particular
rule. This process can be compared to a “classification” of a document with sensitive
contents. We have identified two levels for feasible data classification in Semantic Web
data: the data model level and the semantic level. RDF Graphs can be decomposed into
triples containing a subject, a predicate and an object element. These triples belong to
the data model level. Resource descriptions, their affiliation with concepts and
relationships to other resources are on the semantic level.</p>
      <p>
        The Semantic Web Rule Language (SWRL) is a W3C member submission of the
RuleML Datalog rule interchange language with additional OWL literals for Semantic
Web ontology data [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ]. SWRL rules can be evaluated by a reasoning program such as
Pellet1, KAON2 or RacerPro. SWRL rules can be represented using an RDF graph, and
thus allow easy rule handling along with the RDF graphs containing the information
to be protected. SWRL supports a number of predicates designed to enable access to
the information encoded in RDF. Our PeLDS concept uses SWRL for the expression of
access policies.
2.1
      </p>
      <sec id="sec-2-1">
        <title>The Policy enabled Linked Data Server</title>
        <p>The main feature for our concept of a Policy-enabled Linked Data Server is to provide
a semantic storage system which allows its users to specify which elements of their
RDF graphs are published to which user. This is achieved by calculating a temporary
constructive view on the stored graphs that contains only those elements the querying
user has been authorized to retrieve by the publishing user. To facilitate the easy
description of access policies, we have developed a rule-based access policy format based
on SWRL [6, Sec. 4.1].</p>
        <p>Users publishing data on the system can define an access policy for each dataset
they have created. The system guarantees the enforcement of a valid policy during each
operation involving this dataset. Each rule consists of a label, a rule antecedent
describing the condition under which the rule is satisfied and a consequent. Both the antecedent
1 http://clarkparsia.com/pellet
and the consequent contain a collection of logical predicates joined by the logical AND
condition. In addition to all of SWRL’s predicates, our policy language supports
custom predicates enabling data classification for single triples and resources as well as
instances of specific classes.</p>
        <p>Listing 1.1 gives an example of an access policy containing a single rule. The rule
expresses the following notion: the user “Bob” is permitted to access the phone number
of the user “Alice”’. The rule is labeled phoneRule and contains two antecedent
predicates. The first predicate specifies the ?action resource to be an instance of the
concept QueryAction, the second predicate requires the actor resource to have
http://example.com/bob as the value for its actor property. The consequent consists of a
data classification predicate covering all triples with resource
http://example.com/alice, property ex:phone, and arbitrary values.
p h o n e R u l e :
Q u e r y A c t i o n ( ? a c t i o n ) &amp;&amp; a c t o r ( ? a c t i o n , h t t p : / / e x a m p l e . com / bob )
=&gt; p e r m i t t r i p l e ( h t t p : / / e x a m p l e . com / a l i c e , ex : phone , ) ;</p>
        <sec id="sec-2-1-1">
          <title>Listing 1.1. Example access policy</title>
          <p>3</p>
        </sec>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>The Distributed Address Book</title>
      <p>Our demonstration application is a distributed address book designed as a web-based
application which is run from a standard web browser. As one would expect from an
address book application, users can add, view and remove contacts, and also organize
their contacts into groups. Users are able to change their own address book entry. In
contrast to most previous systems, users are able to securely integrate their contact
information with other users using different installations of the application without any
form of previous setup. A special focus in our implementation was on the usability, in
particular for the complex rule generation and processing chain, so that any user familiar
with social network software is able to formulate access policies. The address book is
using the PeLDS system only as a storage back-end, and all data concerning other users
is retrieved on-the-fly using Linked Data concepts. Users define access policies using a
set of pre-defined building blocks to secure their data.
3.1</p>
      <sec id="sec-3-1">
        <title>System Architecture</title>
        <p>
          2 http://arc.semsol.org
back-end storage. The PHP interpreter is run in an instance of the Apache HTTP server.
All persistent user data as well as access policies are stored inside a PeLDS instance.
The access to this data is performed using the RDF query language SPARQL [
          <xref ref-type="bibr" rid="ref7">7</xref>
          ] for
query operations and SPARQL/Update [
          <xref ref-type="bibr" rid="ref8">8</xref>
          ] for update operations.
        </p>
        <p>Addressbook Client</p>
        <p>HTML / CSS / JS
Web Browser</p>
        <p>HTTP</p>
        <p>Session</p>
        <p>Client
Legend</p>
        <p>Communication
Own Component
Existing Component
System delimiter
User</p>
        <p>Other Addressbook Server
FOAF/SSL</p>
        <p>HTTP(S)
Addressbook Server
ARC RDF Library</p>
        <p>PHP Interpreter
Apache HTTP Server
FOAF/SSL</p>
        <p>SPARQL /</p>
        <p>Rules</p>
        <p>PeLDS
Tomcat Servlet Container</p>
        <p>Server</p>
        <p>
          Only authorized users are able to view an entry according to the defined
authentication and authorization mechanisms in every communication layer. Between
Addressbook Client and Addressbook Server HTTP sessions are maintained which are
established after a successful user/password authentication by the user. Addressbook Server
and local or remote PeLDS instances use the FOAF+SSL authentication scheme which
employs SSL client certificates and a fully distributed certificate validation mechanism
[
          <xref ref-type="bibr" rid="ref9">9</xref>
          ].
3.2
        </p>
      </sec>
      <sec id="sec-3-2">
        <title>Contact Information and Access Policy Input</title>
        <p>User profiles consist of various fields, and the application is generating the input form
using a configuration file. This configuration defines the following properties for each
field: (1) the form elements the user inputs his data in, (2) a method to check whether
these inputs are valid, (3) a method to convert the data given by the user into RDF, (4)
a method to load the form data from RDF, and (5) a method to generate a rule
consequence fitting to the RDF snippet of this field. This way, the entire process of loading
the current values into the generated profile form, validating all values, and creating
the RDF graph corresponding to the submitted values is very flexible and customizable.
The application itself on the other hand defines various visibility levels, which then
form the rule antecedents. At the moment, five visibility levels are implemented and
selectable for each field:
1. Public - Field entries are made available to all users and clients, even without
authentication.
2. All contacts - Field entries are only visible to users, who have been added as a
contact by the current user.
3. Group (requires group selection) - Field entries are only visible to users which have
been added to the selected contacts group by the current user.
4. Contact (requires contact selection) - Field entries are only visible to the selected
user.
5. hidden - Field entries are only visible to the user that has created them.
contacts profile logout</p>
        <p>My profile
Web ID: http://contacts.pelds.org/ruleml</p>
        <p>Visibility
Name Bob RuleML Public</p>
        <p>Phone +1-(617)-253-5702 All contacts
GPS-Position 38.83 Lat. / -77.11 Long. Group</p>
        <p>Family</p>
        <p>
          Fig. 2 shows an example for the profile view for the user “Bob”. Three fields are
defined, “Name”, “Phone”, and “GPS-Position”. Bob has chosen for his name to be
visible to everybody, his phone number to be visible to all his contacts, and his GPS
PositSiavoe nchaongnesly to be visible to the members of the contacts group “Family” he has
defined. From this input, the addres©s2b00o9oHaknnes Mühleisen - powered by ARC2g,PreaLDpSh&amp; LsinhkeodwDanta in Listing 1.2
generates an RDF
encoded in the N3 RDF format [
          <xref ref-type="bibr" rid="ref1">1</xref>
          ] and an access policy consisting of three rules shown
in Listing 1.3 in the PsSF language that can be evaluated by the PeLDS system.
&lt; h t t p : / / c o n t a c t s . p e l d s . o r g / r u l e m l &gt; f o a f : name ” Bob RuleML ” .
&lt; h t t p : / / c o n t a c t s . p e l d s . o r g / r u l e m l &gt; f o a f : p h o n e
        </p>
        <p>”+1 (617) 253 5702” .
&lt; h t t p : / / c o n t a c t s . p e l d s . o r g / r u l e m l &gt; f o a f : b a s e d n e a r : p o s .
: p o s r d f : t y p e g e o : P o i n t .
: p o s g e o : l a t ” 3 8 . 8 3 ” .</p>
        <p>: p o s g e o : l o n g ” 7 7 . 1 1 ” .
&lt;h t t p : / / c o n t a c t s . p e l d s . o r g / r u l e m l &gt; f o a f : knows
&lt;h t t p : / / c o n t a c t s . p e l d s . o r g / a l i c e 2 &gt; .</p>
        <sec id="sec-3-2-1">
          <title>Listing 1.2. RDF graph created for Bob</title>
          <p>The first rule in the access policy, AddressbookDocument [. . . ] name, defines Bob’s
phone number to be publicly available. The rule condition sets no constraint on the
client, it just specifies the request (?action) to be a query operation. The consequence
consists of a data classification predicate permit triple, this way the triple
(http://[...]/ruleml,foaf:name,"Bob RuleML")
containing Bob’s full name is marked to be affected by this rule using the wild card “*”
and is thus made available to all other users.</p>
          <p>The second rule, AddressbookDocument [. . . ] phone makes Bob’s phone available
to contacts. The rule conditions therefore contain not only the restriction for the current
request to be a query in the first predicate (as before), but also puts constraints on
the querying user (actor), who has to be the entity responsible for the current action
according to the second predicate. The third condition predicate then requires a triple
defining the querying user to be known by Bob. The consequence is defined analog to
the first rule.</p>
          <p>Finally, the third rule AddressbookDocument [. . . ] pos describes the access
conditions for Bob’s GPS position, which only members of the “Family” contact group are
able to see. As in the second rule, the first three predicates of the rule condition only
match if the querying user is in the contact list of Bob, the fourth predicate then checks
for the membership of the contact in the “Family” group. The consequence contains
a more complex data classification: Since the position is a complex object consisting
of latitude and longitude, it is more efficient to perform a instance-classification on the
class geo:Point. The reference to this instance is classified using a simple triple pattern
with the foaf:based near predicate.</p>
          <p>A d d r e s s b o o k D o c u m e n t R d f I n p u t T e x t R d f V i s i b i l i t y W o r l d n a m e :
p e l d s : Q u e r y A c t i o n ( ? a c t i o n ) =&gt;
p e r m i t t r i p l e ( h t t p : / / c o n t a c t s . p e l d s . o r g / r u l e m l , f o a f : name , ) ;
A d d r e s s b o o k D o c u m e n t R d f I n p u t T e x t R d f V i s i b i l i t y A l l C o n t a c t s p h o n e :
p e l d s : Q u e r y A c t i o n ( ? a c t i o n ) &amp;&amp;
p e l d s : a c t o r ( ? a c t i o n , ? a c t o r ) &amp;&amp;
f o a f : knows ( h t t p : / / c o n t a c t s . p e l d s . o r g / r u l e m l , ? a c t o r ) =&gt;
p e r m i t t r i p l e ( h t t p : / / c o n t a c t s . p e l d s . o r g / r u l e m l , f o a f : phone , ) ;
A d d r e s s b o o k D o c u m e n t R d f I n p u t P o s R d f V i s i b i l i t y G r o u p p o s :
p e l d s : Q u e r y A c t i o n ( ? a c t i o n ) &amp;&amp;
p e l d s : a c t o r ( ? a c t i o n , ? a c t o r ) &amp;&amp;
f o a f : knows ( h t t p : / / c o n t a c t s . p e l d s . o r g / r u l e m l , ? a c t o r ) &amp;&amp;
f o a f : member ( h t t p : / / c o n t a c t s . p e l d s . o r g / r u l e m l / g r o u p / f a m i l y ,
? a c t o r ) =&gt;
p e r m i t t r i p l e ( h t t p : / / c o n t a c t s . p e l d s . o r g / r u l e m l ,</p>
          <p>f o a f : b a s e d n e a r , ) &amp;&amp;
p e r m i t i n s t a n c e ( geo : P o i n t ) ;</p>
        </sec>
        <sec id="sec-3-2-2">
          <title>Listing 1.3. Access Policy for Bob</title>
          <p>Users can add contacts to their address book using their URL as an identifier and link
to the remote contact data. Contrary to current systems, our Distributed Address Book
allows the addition of users on different Addressbook servers. Data retrieval is then
performed on the fly using Linked Data dereferencing. The information retrieved is
controlled by the respective PeLDS instances, and the Addressbook Client component
authenticates itself against every remote node it retrieves data from using the FOAF+SSL
verification method.</p>
          <p>As shown in Fig. 3, the Addressbook client displays a contact and a group list to
the user, which can then choose a contact to display his or her details. Continuing our
example from the previous section, Alice has successfully logged into the Distributed
Address Book and added Bob as a contact using his URL. Also, she has created a
group “Family”, and added Bob to it. Now, she selected the group “Family” in the left
column to list all contacts, and then chose the contact “Bob RuleML” in the center
colum to display Bob’s contact details in the right column. Bob’s name, phone number,
and current positions are displayed. Alice is able to see all this, because Bob’s access
policy permits her to see this information.
We have motivated the need for an architectural change in web-based computer systems
storing private information. We have introduced our concept of protecting information
publi+shed as Linked Da+ta using access polidceileetes consisting of declarative access rules.
Our concept of the Policy enabled© 2L00i9nHkaenndes DMüahlteiasenS-eprovweererd wby aARsC2d, ePesLcDSri&amp;bLeindkedsDhaotartly. The main
topic of this paper was the architecture and user interaction of our prototype of a
Distributed Address Book. The Distributed Address Book enables its users to store contact
information on a system they trust, and also makes secure integration with users of
other systems possible. Users are able to create access policies themselves by
following the template structure offered to them in the application. From the user’s choices,
an individual access policy is compiled, stored, and enforced. The described system is
available on-line at http://contacts.pelds.org, its source code can be
downloaded at http://www.pelds.org.</p>
          <p>Acknowledgments We would like to acknowledge the contributions of Martin Kost
and Johann-Christoph Freytag. This work has been partially supported by the
”InnoProfile Corporate Semantic Web” project funded by the German Federal Ministry of
Education and Research (BMBF) and the BMBF Innovation Initiative for the New
German Laender - Entrepreneurial Regions.</p>
        </sec>
      </sec>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <surname>Berners-Lee</surname>
          </string-name>
          ,
          <source>T.: Notation</source>
          <volume>3</volume>
          (
          <year>1998</year>
          ), http://www.w3.org/DesignIssues/ Notation3.html, http://www.w3.org/DesignIssues/Notation3.html accessed on 2010-
          <volume>04</volume>
          - 20
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <surname>Berners-Lee</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          :
          <article-title>Linked data (</article-title>
          <year>2006</year>
          ), http://www.w3.org/DesignIssues/ LinkedData.html, http://www.w3.org/DesignIssues/LinkedData.html accessed on 2010-
          <volume>04</volume>
          -20
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <surname>Horrocks</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Patel-Schneider</surname>
            ,
            <given-names>P.F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Boley</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tabet</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Grosof</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dean</surname>
            ,
            <given-names>M.:</given-names>
          </string-name>
          <article-title>SWRL: A semantic web rule language (</article-title>
          <year>2004</year>
          ), http://www.w3.org/Submission/SWRL/, http://www.w3.org/Submission/SWRL accessed on 2010-
          <volume>04</volume>
          -20
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <surname>Manola</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Miller</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>McBride</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          : RDF primer (
          <year>2004</year>
          ), http://www.w3.org/TR/ rdf-primer/
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5. Mu¨hleisen, H.:
          <article-title>Zugriffsrichtlinien und Authentifizierung fu¨r Linked-Data-Systeme. Master's thesis</article-title>
          , Humboldt-Universita¨t zu Berlin, http://muehleisen.org/da-hm-ld.
          <source>pdf</source>
          (
          <year>2009</year>
          ), http: //muehleisen.org/da-hm-ld.pdf
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6. Mu¨hleisen, H.,
          <string-name>
            <surname>Kost</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Freytag</surname>
            ,
            <given-names>J.C.</given-names>
          </string-name>
          :
          <article-title>SWRL-based Access Policies for Linked Data</article-title>
          . In: Ka¨rger,
          <string-name>
            <given-names>P.</given-names>
            ,
            <surname>Olmedilla</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            ,
            <surname>Passant</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            ,
            <surname>Polleres</surname>
          </string-name>
          ,
          <string-name>
            <surname>A</surname>
          </string-name>
          . (eds.)
          <source>Proceedings of the Second Workshop on Trust and Privacy on the Social and Semantic Web (SPOT2010)</source>
          . vol.
          <volume>576</volume>
          (
          <year>2010</year>
          ), http: //CEUR-WS.org/Vol-
          <volume>576</volume>
          /paper1.pdf
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <surname>Prud'hommeaux</surname>
          </string-name>
          , E.,
          <string-name>
            <surname>Seaborne</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>SPARQL query language for RDF (</article-title>
          <year>2008</year>
          ), http:// www.w3.org/TR/rdf-sparql-query/
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <surname>Seaborne</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Manjunath</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Bizer</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Breslin</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Das</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Davis</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Harris</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Idehen</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Corby</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kjernsmo</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Nowack</surname>
            ,
            <given-names>B.: SPARQL</given-names>
          </string-name>
          <string-name>
            <surname>Update</surname>
          </string-name>
          (
          <year>2008</year>
          ), http://www.w3.org/ Submission/2008/SUBM-SPARQL-Update-
          <volume>20080715</volume>
          /
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <surname>Story</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Harbulot</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Jacobi</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Jones</surname>
            ,
            <given-names>M.:</given-names>
          </string-name>
          <article-title>FOAF+SSL: RESTful authentication for the social web (</article-title>
          <year>2009</year>
          ), submitted to Semantic Web Conference 2009
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>