excellent diagram in spec

http://www.w3.org/2005/Incubator/webid/spec/

 

for the first time, the diagram in 2.3 tells the (fuller) story. Now one can see the way in which the URIs work together, being both profile and resources udner the control of the user described by the profile, as does the foaf:knows link data graph. This give me a private forest oncept, and it gives me a notion that a /protected/ (virtual) endpoint can induce someone to be challenged on opening an authentication guard at a protected resource, to show they are known.

 

The mechanisms are not in the scope, but the issues are. That diagram tells the wider story, in which the validation protocol fits. And, it tells is "naturally" and effortlessly, with URIs. 		 	   		  

Received on Tuesday, 29 November 2011 20:24:53 UTC