Re: WebID-ISSUE-44 (revolutionaries): Secure communication among revolutionaries [use cases]

>  > 
> > WebID-ISSUE-44 (revolutionaries): Secure communication among revolutionaries [use cases]
> > 
> > http://www.w3.org/2005/Incubator/webid/track/issues/44
> > 
> > Raised by: Reto Bachmann-Gmür
> > On product: use cases
> > 
> > A revolutionary network in an oppressive state wants to share some of their information only with people thy have reasons to consider trustworthy. They identities are not tied to persons identifiable to the state, also theirs security system must not rely on Certificate Authorities as a government owned Telecom company owns a root certificate.
> > 
> > Alice a well trusted member of the network is incarcerated together with Bob and finds him to be trustworthy. Alice shall be able to include Bob in the network, i.e. make it possible to other existing members to identify Bob as a person trusted by Alice.
> 

ok, so Alice adds Bob to her foaf:knows, or to some foaf:Group the others use. The foaf:Group is access controlled an only readable by other members of the network, each of which can add mebers they trust


On 19 Feb 2011, at 19:21, Peter Williams wrote:

> You need to add the harder case: removing Bob from the trust list, once the celll discovers he is a plant (all along, or post insertion and "inducement")

if the trust list is built informally by the declared relationships members have to each other. The members who lose trust can remove that person from their list. If enough people do that the person looses access.

Anyway, I know those were just use cases, and my answer are just initial sketches of answers.

Henry



Social Web Architect
http://bblfish.net/

Received on Tuesday, 22 February 2011 10:54:00 UTC