740 ITU‐T's Technical Reports and Specifications The secondary data user can request access to the open attributes by utilizing R‐XAR. Figure 8.4.4 lists an example of an R‐XAR. If the secondary data consumer requests attribute identified as quasi‐identifiers, DAP publishes anonymized data that contains attributes calculated as quasi‐identifiers. The user also declares the required anonymization method, privacy protection level, sensitive attributes combinations, open attributes, and quasi‐identifiers utilizing the R‐XAR. The formats of XAS and its subset XAR utilize the cascading style sheets (CSS) format and the Semantic Web standard. The XAS can be processed utilizing an XML schema, RDL schema, OWL method, and other related tools. 1 <?xml version=\"1.0\" encoding=\"utf‐8\"?> 2 <anonymize type=\"k(3)\"> 3 <head> 4 <sensitive> 5 <rdf:RDF> 6 <v:Kind> 7 <v:hasTelephone> 8 <rdf:Description> 9 <rdf:type number=\"2\" /> 10 </rdf:Description> 11 </v:hasTelephone> 12 </v:Kind> 13 </rdf:RDF> 14 <PowerConsumption /> 15 </sensitive> 16 <group name=\"addr\" type=\"quasi\" /> 17 </head> 18 <rdf:RDF> 19 <v:Kind> 20 <v:bday /> 21 <v:hasTelephone> 22 <rdf:Description> 23 <rdf:value note=\"TelephoneNumber\" type=\"quasi\" /> 24 </rdf:Description> 25 </v:hasTelephone> 26 </v:Kind> 27 </rdf:RDF> 28 <PowerConsumption note=\"PowerConsumption\" /> 29 </anonymize> Fig. 8.4.4 R‐XAR Example