<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>A Policy-Based Dialogue System for Physical Access Control</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Mohammad Ababneh</string-name>
          <email>mababneh@gmu.edu</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Duminda Wijesekera</string-name>
          <email>dwijesek@gmu.edu</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>James Bret Michael</string-name>
          <email>bmichael@nps.edu</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Index Terms-Dialogue, Question Answering, Voice</string-name>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Department of Computer Science, George Mason University</institution>
          ,
          <addr-line>Fairfax, VA</addr-line>
          ,
          <country country="US">USA</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Department of Computer Science, Naval Postgraduate School</institution>
          ,
          <addr-line>Arlington, VA</addr-line>
          ,
          <country country="US">USA</country>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>Recognition</institution>
          ,
          <addr-line>VXML, XACML, Access Control Policy, Security</addr-line>
        </aff>
      </contrib-group>
      <abstract>
        <p>-We prototype a policy-based dialog system for providing physical access control to secured facilities and smart buildings. In our prototype system, physical access control policies are specified using the eXtensible Access Control Markup Language. Based on the policy and the user's presence information, our dialog system automatically produces a series of questions and answers that, if correctly answered, permit the requester to enter the secure facility or smart building. The novelty of this work is the system's ability to generate questions appropriate to the physical location, time of day, and the requester's attributes.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>I. OVERVIEW</title>
      <p>
        We developed a prototype policy-based system for
guarding entry to physical facilities, such as smart
buildings. The system interacts with potential entrants
using a spoken dialogue. Our physical access control
system uses the OASIS consortium’s eXtensible Access
Control Markup Language (XACML) standard [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ] and
the W3C’s Voice eXtensible Markup Language (VXML)
[
        <xref ref-type="bibr" rid="ref2">2</xref>
        ] for specifying the dialogue.
      </p>
      <p>In order to generate dialogues from physical access
control policies specified in XACML, we generate
socalled “VXML Voice forms” from XACML policy rules.
In this paper we describe our initial implementation of the
prototype. Given that emerging mobile applications use
interactive voice commands such as Apple’s Siri,
Google’s Andriod S-Voice, and Microsoft Windows
Speech Recognition, we envision that new applications
would emerge for interactive voice-based access to
resources.</p>
      <p>
        The dialogues we generate are in the form of a
question and an (acceptable) answer. In our prototype,
questions are generated using a grammar for words or
phrases—belonging to a restricted vocabulary—that are
taken from an XACML rule’s subject-attribute values
[
        <xref ref-type="bibr" rid="ref3">3</xref>
        ][
        <xref ref-type="bibr" rid="ref4">4</xref>
        ]. Answers should conform to a grammar that is
linked to the rule’s data type, and acceptable answers are
those that provide the values that match the values
specified in the XACML policy. The class of grammars
may come from and be checked against a database or
other sources of subject attributes.
      </p>
      <p>For each question, user input is collected and stored in
a variable. These variables are used to generate an
XACML request that is passed to an XACML policy
decision point (PDP). The PDP is responsible for the
decision of either granting or denying access. If access is
granted, the system sends a control-system message to an
actuator that unlocks the entry door to the facility.</p>
      <p>
        We succeeded in generating a question for each rule in
the policy. Our existing implementation uses a small
number of policy rules and their conversion. We are
currently working on scaling this implementation by
addressing the run-time and automatic conversion of a
large number of rules, in addition to developing the
capability to dynamically generate the grammars using
.grxml files [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ].
      </p>
      <p>Due to advancements in mobile applications and the
emergence of voice user interfaces (VUI) as well as their
being provided as a service in the cloud, new access
control mechanisms are needed. When completed, our
current architecture and implementation will serve as a
testbed for further research and development.</p>
      <sec id="sec-1-1">
        <title>A. Potential Applications</title>
        <p>The following are potential applications for our
system:
</p>
        <p>Mobile computing: The adaptation of the voice
technology and VUI in mobile computing (e.g.,
Apple’s Siri, Google’s Android S-Voice,
Microsoft Windows Speech Recognition,



1
2
3
4
5
6</p>
        <p>Research in Motion’s BlackBerry) introduces
challenges in using the technology in order to
accomplish more sophisticated tasks such as
access control to either resources and services
locally on the devices or remotely at data centers
via cloud services. We envision this system to be
useful for providing ubiquitous policy-based
automated physical access control from mobile
devices, where hands-free usage is valued or
required.</p>
        <p>
          Military and first-responder applications: It is
important to provide hands-free user interfaces to
military personnel, especially those participating
in combat operations, as well as first responders
(e.g., firefighters, police, paramedics). These
personnel have to access support facilities (e.g.,
gates at a forward operating bases or police
substations) and equipment (e.g., fire trucks) (see
[
          <xref ref-type="bibr" rid="ref5">5</xref>
          ]).
        </p>
      </sec>
      <sec id="sec-1-2">
        <title>Information systems: In general this access</title>
        <p>control can be used to provide appropriate access
to any information system using a VUI.</p>
        <p>Electronic Commerce and Business: This new
access control approach can be used in
performing transactions in e-commerce
applications accessed via mobile computing
devices.
 Physical Access Control: Access control to
critical facilities can be automated and access can
be granted or denied based on an enterprise’s
policy. Policy languages such as XACML are
standardized to unify policies across enterprises
and reduce administrative load. This is all
handsfree and it only depends on answers to questions
that represent the subject’s attributes. A sample
dialogue for access control is illustrated in Table
1.</p>
        <p>U
S
U
S</p>
        <p>Hello
Welcome, Please Say who you are?
I am User01 (Alice)
Please say your Password or
enter it using the key pad
Pass01
Ok, I got that. Now tell me Why
do you need to access the
building (Role)
Professor
What is your office number
4429
In which floor is the dean’s
meeting room
5th
What is the time on the clock to
your right
7:30
The original intention of access control policy
languages such as XACML was to deal with systems and
access control enforcement points, but not humans. In our
approach we use XACML to drive human interaction
through dialogues with the system. This new approach
has implications on the way dialogues are generated and
access control decisions are taken. As mentioned above,
many potential applications might take advantage of this
approach. To be applicable, many aspects of human voice
interactions should be studied—more research on this but
it is outside of the scope of the work we report on here.</p>
        <p>One important aspect of such an approach is the scale
of implementation, especially in case of physical control.
The user of such a system will likely not use the system if
the system takes a long time to make an access decision
for each individual of a large number of humans waiting
in crowds such as at a sporting event (e.g., a World Cup
football match). The processing time of an access request
initiated by a human entity is going to be different than
the time initiated by an automated process or application.
This is another area of research we have left to future
work.</p>
      </sec>
    </sec>
    <sec id="sec-2">
      <title>II. BACKGROUND In this section we discuss the most relevant standards and technologies to our research.</title>
      <sec id="sec-2-1">
        <title>A. VoiceXML</title>
        <p>
          VoiceXML (VXML) is the Voice Markup Language
developed and standardized by the W3C’s Voice Browser
Working Group. It is intended for creating audio
dialogues that feature synthesized speech, digitized audio,
recognition of spoken and Dual Tone Multi-Frequency
(DTMF) key inputs, recording of spoken input, telephony,
and mixed initiative conversations. VXML is similar to
HTML in the textual arena in providing an interface
between a user and the Web, using a voice interface. Its
purpose is to bring the advantages of web-based
development and content delivery to interactive voice
response (IVR) applications. All Web technologies are
still relevant in any voice interface, such as services,
markup languages, linking, URIs, caching, standards,
accessibility, and cross-browser [
          <xref ref-type="bibr" rid="ref2">2</xref>
          ].
        </p>
        <p>The most important terms in VXML are:
 Form: Forms define an interaction that collects
values for a set of form-item variables. Each field
may specify a grammar that defines the allowable
inputs for that field. If a form-level grammar is
present, it can be used to fill several fields from
one utterance
 Block: An item is a component of a form that
presents information by synthesizing a phrase of
text into speech to the user.
 Field: An item is a component of a form that
gathers input from the user by synthesizing a
textual phrase into speech for the user. The user
must provide a value for the field before
proceeding to the next element in the form.
 Menu: A menu presents the user with a choice of
options and then transitions to another dialog
based on that choice</p>
      </sec>
      <sec id="sec-2-2">
        <title>B. XACML</title>
        <p>
          XACML is an OASIS standard XML-based language
for specifying access control policies [
          <xref ref-type="bibr" rid="ref1">1</xref>
          ]. In a typical
XACML usage scenario, a subject that seeks access to a
resource submits a query through an entity called a Policy
Enforcement Point (PEP). The PEP, responsible for
controlling access to the resource, forms a request in the
XACML request language and sends it to the PDP. The
PDP in turn evaluates the request and sends back one of
the following responses: accept, reject, error, or unable to
evaluate, with the PEP allowing or denying access to the
requester accordingly, as shown in Figure 1.
        </p>
        <p>Figure 1 contains the following entities:
 Policy Set: A set of policies.
 Policy: A set of rules, an identifier for the
rulecombining algorithm, and (optionally) a set of
obligations. May be a component of a policy set.
 Rule: A target, an effect, and a condition. A
component of a policy.
 Combination Algorithm: The procedure for
combining the decision and obligations from
multiple policies.
 Subject: An actor whose attributes may be
referenced by a predicate.
 Target: The set of decision requests, identified by
definitions for resource, subject, and action that a
rule, policy, or policy set is intended to evaluate.
 Resource: Data, service or system component.
 Attribute: All entities are identified using
attributes.</p>
        <p>Predicate: An evaluable statement about
attributes.</p>
        <p>PEP: Governing entity of a resource.</p>
        <p>PDP: The entity that evaluates access requests.
PIP: The entity that fetches attribute values for
the PDP..</p>
        <p>PAP: The entity that retains polices.</p>
        <p>Context Handler: The entity that converts
decision requests to XACML requests.</p>
        <p>Some of the currently available implementations of
the XACML specification are for example OpenXACML,
enterprise-java-xacml from Google code, HERAS
XACML, JBoss XACML, Sun Microsystem’s XACML,
and WSO2 Identity Server, which is used in this
implementation.</p>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>III. IMPLEMENTATION PLATFORMS</title>
      <p>In this section we introduce briefly
implementation platforms of the standards
technologies used to implement our prototype.
the
and</p>
      <sec id="sec-3-1">
        <title>A. Voxeo for Speech Recognition</title>
        <p>
          Voxeo Prophecy is a standards-based platform for
speech, IVR, and Software Implemented Phone (SIP)
applications for Voice over Internet Protocol (VoIP)
applications [
          <xref ref-type="bibr" rid="ref6">6</xref>
          ]. Some of the capabilities integrated into
the platform are: automatic speech recognition, speech
synthesis, and visual programming. Prophecy provides
libraries to create and deploy IVR or VoIP applications,
including VXML and Call Control (CCXML) browsers
with speech recognition and synthesis engines, and a
built-in SIP soft-phone. Prophecy supports ASP, CGI, C#,
Java, PERL, PHP, Python, and Ruby and has a built-in
web server that supports PHP and Java applications. It
complies with VXML and CCXML standards.
        </p>
      </sec>
      <sec id="sec-3-2">
        <title>B. XACML Implementation – WSO2</title>
        <p>
          WSO2 Identity Server [
          <xref ref-type="bibr" rid="ref7">7</xref>
          ] provides security and
identity management of enterprise web applications,
services, and APIs. WSO2 full implementation supports
identity management, single sign-on, Role-based Access
Control (RBAC), fine-grained access control, LDAP,
OpenID, SAML, Kerberos, OAuth, WS-Trust, and the
XACML 2.0/3.0.
        </p>
      </sec>
      <sec id="sec-3-3">
        <title>C. Programming and development</title>
        <p>In addition to the above two major platforms,
programming languages such as Java, Java Server Pages
(JSP), and Java Script (JS) were used to accomplish the
integration and interoperability work between these
platforms and thus enabled us to develop our prototype.</p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>IV. OUR APPROACH</title>
      <p>The core of our work transforms an access control
policy into a voice platform supported voice language.
We use XACML and W3C VXML for these two
purposes.</p>
      <p>In order to generate a dialogue between a user and an
access control system to make it possible for the system to
make a decision to whether grant or deny access, the
access control policy is transformed into VXML. The
rules in each policy are read and transformed into
VoiceXML blocks and forms. The entire policy is parsed
using a DOM parser and then each rule element is
converted to a VXML block for the user interface
translating text to speech (TTS), posing the question to
the user, and then waiting for the user’s response through
voice recognition. The details of how TTS and voice
recognition technologies are outside the scope of our
current work; we are implementing these services through
an integrated Voice Application Development
Environment introduced in Section III.A. Figure 2 depicts
the high-level architecture for our prototype system.</p>
      <p>A more detailed illustration of this policy voice
(VXML) is shown in Figure 3.</p>
      <sec id="sec-4-1">
        <title>A. A Working Scenario</title>
        <p>We used the Voxeo Prophecy IVR platform (see
www.voxeo.com/products/voicexml-ivr-platform.jsp)—
including the webserver, designer, SIP, and application
manager—to develop our application for voice
recognition. We use a scenario to illustrate how the
application works.</p>
        <p>Our scenario starts with a XACML policy file, with
the rule shown in Figure 4.</p>
        <p>Using JSP, we load the XACML file into a Document
Object Manager (DOM) object. We read the rules inside
the XACML document and link each rule to a VXML
block/form. The JSP script extracts the attribute’s value
from the DOM’s rule element and passes it to the Voxeo
designer application, which converts it to VXML. Figure
5 shows an example of a VXML file.
&lt;?xml version="1.0" encoding="UTF-8"?&gt;
&lt;vxml xmlns="http://www.w3.org/2001/vxml"
xmlns:xsi="http://www.w3.org/2001/
XMLSchema-instance"
xsi:schemaLocation="http://www.w3.org/2001/vxml
http://www.w3.org/TR/voicexml20/vxml.xsd"
version="2.0"&gt;
&lt;form&gt;
&lt;field name="e-mail"&gt;
&lt;prompt&gt;What is your e-mail address?
&lt;/prompt&gt;
&lt;grammar src="email.grxml"</p>
        <p>type="application/srgs+xml"/&gt;
&lt;/field&gt;
&lt;block&gt;
&lt;submit next="http://www.example.com/user.asp"/&gt;
&lt;/block&gt;
&lt;/form&gt;
&lt;/vxml&gt;</p>
        <p>Fig. 5. A sample VXML</p>
        <p>In order to create the question, a phrase is inserted
before the attribute value in the form of “What is?” or “Is
your?” followed by the attribute name extracted from the
RuleID of the DOM’s rule element. Our current
implementation supports the yes/no answers to “Is your?”
type of questions. We are in the process of enlarging the
question formation syntax to support other question
formats.</p>
        <p>In this way a question will be generated for every rule
in the policy file. The human user then needs to answer
the questions posed by the system.</p>
        <p>The next step is to collect attribute “VoiceXML
variable” values generated throughout the dialogue and
use them to generate an XACML request. Figure 6 shows
an example of a request.</p>
        <p>The XACML request will be sent to the XACML
implantation of choice. In our case, we have chosen
WSO2 Identity Server version 3.2. It has a distinguished,
modern, and high-performance XACML implementation
with a service-oriented implementation option. The
Voxeo development environment supports both HTTP
requests and web services. Our choice was to enforce the
policy by accepting the XACML request through a web
service interface with the WSO2 XACML PEP. The PDP
will take a decision based on the attribute values collected
from the dialogue and matches of values of subjects and
resources in the XACML implementation (see Figure 1).
The grant or deny decision will then be ready to be
returned back to the application. In our current case, it
should be translated to a physical access decision as to
whether to open a door.</p>
        <p>The XACML’s access decision is based on the output
of the policy and rule combining algorithms. Following
the standard, the rule and policy should evaluate to true in
order to grant access; otherwise it would produce
“indeterminate” or “not applicable.” In case there are
multiple applicable rules and policies, the final access
decision is the result of the logical combination of these
algorithms.</p>
        <p>
          Our work, in its final state, will illustrate the use of
XACML to control access to resources through building
dialogues with human users. There are efforts proposing
access control systems through XACML interfacing with
other data models. In the published literature, a majority
of this integration effort is with Web Services [
          <xref ref-type="bibr" rid="ref8">8</xref>
          ]. Most of
this harmonizing work relied on the use of the de facto
Simple Object Access Protocol (SOAP) [
          <xref ref-type="bibr" rid="ref9">9</xref>
          ] messages in
the Web Services architecture to extract security-related
attributes and use them in XACML for the purpose of
access control [
          <xref ref-type="bibr" rid="ref10">10</xref>
          ] [
          <xref ref-type="bibr" rid="ref11">11</xref>
          ].
        </p>
        <p>
          Security Assertion Markup Language (SAML) profile
for XACML is heavily relied on when there is a need to
use additional subject’s attributes that are administered by
other authorities to evaluate access control requests [
          <xref ref-type="bibr" rid="ref12">12</xref>
          ].
SAML and other message exchange protocols can be the
means through which XACML can interface with other
data models. Our work is different by trying to let
XACML reach the human user directly and initiating a
dialogue with him, manage the dialogue, and then decide
whether to allow access.
        </p>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>V. NEXT STEPS</title>
    </sec>
    <sec id="sec-6">
      <title>Our next steps in this work would be:</title>
      <p> Finishing the XACML implementation
 Being able to generate requests and responses and
execute them
 Determining the best way to use grammars
 Looking into the best way to generating
VoiceXML from XACML: there are options to
evaluate such as DOM and XSLT</p>
      <p>Some of the follow-on research items we are pursuing
are:

</p>
      <p>Integrating presence information with the dialog
access control system. It is critical for an
automated system to authenticate to the system
the speaker or requester of access to avoid certain
attacks, such as by verifying the physical presence
and human nature of the speaker.</p>
      <p>
        Making the dialog as short as possible. In a
spoken dialog or question-answer system, it is
different than filling a form using a keyboard and
a mouse. It can take more time to say the voice
block (form) than filling it by hand or via a
keyboard. In some cases, we might need to make
a quick access decision through dialog which
might require thinking of ways to reduce the time
required to collect attributes and make a correct
XACML decision. Maybe asking only the most
difficult or important questions according to their



weight can reduce the number of questions
without affecting the accuracy. An analysis
similar to the one in [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ] implementing item
response theory [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ] [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ] might be helpful to this
work.
      </p>
      <p>Some policy sets might have a large number of
policies and rules with different combination
algorithms. It would be interesting to see how this
can affect our spoken policy-based access control
(question-answer) system.</p>
      <p>After being able to generate dialogues from
policies, it would be interesting to see if we can
generate rules from dialogues.</p>
      <p>In any dialogue, it is important to guarantee the
privacy of what is spoken. In order to answer a
question the user has to say things that might be
considered to be sensitive (e.g., a unique
government identity card number, such as a social
security number) and the user might be reluctant
to answer the question in public, which might
affect the attributes collected in order to build the
request and thus the decision might not be correct.</p>
    </sec>
    <sec id="sec-7">
      <title>VI. CONCLUSION</title>
      <p>In this work, we have presented a novel approach to
generate a dialogue for the purpose of physical access
control from a standard access control policy language.
This policy language driven interaction with the user or
authorization requester is generated at runtime and is
implemented in a standard language.</p>
    </sec>
    <sec id="sec-8">
      <title>ACKNOWLEDGMENT</title>
      <p>This material is based upon work supported by the US
Air Force Office of Scientific Research under grant
FA9550-09-1-0421.</p>
    </sec>
    <sec id="sec-9">
      <title>AUTHOR BIOGRAPHIES MOHAMMAD ABABNEH is a doctoral student in the Information Technology program at George Mason University.</title>
      <p>DUMINDA WIJESEKERA is an Associate Professor of
Computer Science at George Mason University, where he
serves as Program Director of the Doctor of Philosophy
program in Information Security and Assurance. He is a
member of the university’s Center for Security
Information Systems.</p>
      <p>JAMES BRET MICHAEL is a Professor of Computer
Science and Electrical and Computer Engineering at the
Naval Postgraduate School, Arlington, Virginia.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          <article-title>[1] OASIS, eXtensible Access Control Markup Language (XACML), available</article-title>
          at URL: https://www.oasisopen.org/committees/tc_home.php?wg_abbrev=xacml,
          <source>last accessed Aug. 6</source>
          ,
          <year>2012</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>World</given-names>
            <surname>Wide Web Consortium</surname>
          </string-name>
          ,
          <article-title>Voice Extensible Markup Language (VoiceXML)(VXML), available</article-title>
          at URL: http://www.w3.org/Voice/,
          <source>last accessed Aug. 6</source>
          , 2012
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>World</given-names>
            <surname>Wide Web Consortium</surname>
          </string-name>
          , Speech Grammar Recognition Specification, white paper available at URL: http://www.w3.org/TR/speech-grammar/,
          <source>last accessed Aug. 6</source>
          ,
          <year>2012</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>J. E.</given-names>
            <surname>Hopcroft</surname>
          </string-name>
          and
          <string-name>
            <given-names>J. D.</given-names>
            <surname>Ullman</surname>
          </string-name>
          , Introduction to Automata Theory, Languages, and
          <string-name>
            <surname>Computation</surname>
          </string-name>
          ,
          <string-name>
            <surname>Addison-Wesley</surname>
          </string-name>
          ,
          <year>1979</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>Thomas</given-names>
            <surname>Massie</surname>
          </string-name>
          and Duminda Wijesekera, “TVIS:
          <article-title>Tactical Voice Interaction Services for Dismounted Urban Operations,” in Proceeding of Military Communications Conference</article-title>
          , IEEE, pp.
          <fpage>258</fpage>
          -
          <lpage>264</lpage>
          , San Diego, Calif.,
          <source>Nov</source>
          .
          <fpage>17</fpage>
          -
          <lpage>19</lpage>
          ,
          <year>2008</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6] URL: http://www.Voxeo.com,
          <source>last accessed Aug. 6</source>
          ,
          <year>2012</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7] URL: http://www.wso2.com,
          <source>last accessed Aug. 6</source>
          ,
          <year>2012</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>OASIS</given-names>
            ,
            <surname>Web</surname>
          </string-name>
          <string-name>
            <surname>Services</surname>
          </string-name>
          , available at URL: https://www.oasis-open.org/standards
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <issue>W3C</issue>
          ,
          <article-title>Simple Object Access Protocol (SOAP), available</article-title>
          at URL: http://www.w3.org/TR/soap
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>Chongshan</given-names>
            <surname>Ran</surname>
          </string-name>
          and Guili Guo, “
          <source>Security XACML Access Control Model Based On SOAP Encapsulate,” International Conference on Computer Science and Service System</source>
          , IEEE, pp.
          <fpage>2543</fpage>
          -
          <lpage>2546</lpage>
          , Nanjing, China,
          <fpage>27</fpage>
          -
          <lpage>29</lpage>
          June 2011.
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <surname>Ardagna</surname>
            ,
            <given-names>C.A.</given-names>
          </string-name>
          , De Capitani di Vimercati,
          <string-name>
            <given-names>S.</given-names>
            ,
            <surname>Paraboschi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            ,
            <surname>Pedrini</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E.</given-names>
            ,
            <surname>Samarati</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            ,
            <surname>Verdicchio</surname>
          </string-name>
          ,
          <string-name>
            <surname>M.</surname>
          </string-name>
          , “
          <article-title>Expressive and Deployable Access Control in Open Web Service Applications,”</article-title>
          <source>IEEE Transactions on Services Computing</source>
          , Volume
          <volume>4</volume>
          , Issue 2, pp.
          <fpage>96</fpage>
          -
          <lpage>109</lpage>
          , April-June
          <year>2011</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <surname>OASIS</surname>
          </string-name>
          ,
          <article-title>Security Assertion Markup Language (SAML), SAML 2.0 profile of XACML v2.0, available</article-title>
          at URL: http://docs.oasis-open.
          <source>org/xacml/2</source>
          .0/access_controlxacml-
          <fpage>2</fpage>
          .0
          <article-title>-saml-profile-spec-os</article-title>
          .pdf
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <surname>Ahmed</surname>
            <given-names>A. L.</given-names>
          </string-name>
          <string-name>
            <surname>Faresi</surname>
          </string-name>
          and Duminda Wijesekera, “Preemptive Mechanism to Prevent Health Data Privacy Leakage,”
          <source>in Proceedings of International Conference on Management of Emergent Digital EcoSystems</source>
          , ACM, pp.
          <fpage>17</fpage>
          -
          <lpage>24</lpage>
          , San Francisco, Calif.,
          <source>Nov</source>
          .
          <fpage>21</fpage>
          -
          <lpage>23</lpage>
          ,
          <year>2011</year>
          ,
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>F. B.</given-names>
            <surname>Baker</surname>
          </string-name>
          ,
          <article-title>The basics of item response theory</article-title>
          ,
          <source>ERIC Clearinghouse on Assessment and Evaluation</source>
          ,
          <year>2001</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>F. B.</given-names>
            <surname>Baker</surname>
          </string-name>
          ,
          <article-title>Item response theory: Parameter estimation techniques</article-title>
          , vol.
          <volume>176</volume>
          ,
          <string-name>
            <surname>CRC</surname>
          </string-name>
          ,
          <year>2004</year>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>