- From: Andy Seaborne <andy.seaborne@epimorphics.com>
- Date: Wed, 14 Nov 2012 16:17:29 +0000
- To: public-ldp-wg@w3.org
On 14/11/12 13:41, Henry Story wrote: > > On 14 Nov 2012, at 14:18, Ashok Malhotra <ashok.malhotra@oracle.com> wrote: > >> Hi Andy: >> There are a bunch of cases like this. For example, take personnel records. >> These are typically restricted to HR folks but you can always see your own records. >> Need to think some more about where to draw the line between access control >> and LDP functionality Yes. We can make this too complicated and ambitious for v1. > Why is this problematic? Can you not just use the following rule to do what > you want? > > @prefix wac: <http://www.w3.org/ns/auth/acl#> . > > [] wac:accessToClass [ wac:regex "https://oracle.com/u/.*" ]; > wac:mode wac:Read, wac:Write, wac:Control; > wac:agentClass <https://oracle.com/g/team/admin#it> . > > [] wac:accessToClass [ wac:regex "https://oracle.com/u/123123/.*" ]; > wac:mode wac:Read; > wac:agent <https://oracle.com/u/123123#i> . To make it interesting: Support all bugs are "/bugs/NNNN" and it is the data that decalres it to be a security issue. ## Somewhere ... :SecurityProblem rdfs:subClassOf :Bug . PUT/POST-- </bug/155> a :SecurityProblem ; .... -- i.e. access control depends on the data, not only the access name. This may result in a different URI allocated so later access control works by regex, but at least its on creation. And what happens if you PUT to a LDPR that changes it's designation? Andy > > the wac:regex relation does not exist. One should probably use powder, but I wanted > to implement something really simple to test this out. It just took a couple of > days to write and test: > > https://github.com/read-write-web/rww-play/blob/master/app/test/WebACLTestSuite.scala#L147 > > How to specify regular expressions in WAC would be nice, and would be a topic for > discussion for the Access Control Teleconf > > http://lists.w3.org/Archives/Public/public-ldp-wg/2012Nov/0156.html > > It would be useful to work out what the problem is so I can add it to ACTION-28 Access control may depend on data (from create/change time). Andy > >> All the best, Ashok >> >> On 11/14/2012 3:04 AM, Andy Seaborne wrote: >>> >>> >>> On 12/11/12 20:48, Henry Story wrote: >>>> Luckily Access Control is orthogonal to LDP >>> >>> I hope that's true but I don't see why it must be so. >>> >>> The LDP spec covers operations on resources and containers and does not mention access control. >>> >>> Use case: I create bugReportSecurity57 about a security issue. I want it restricted because the information contained allows an attacker to exploit the security hole. Bug reports are normally publicly readable. >>> >>> What is the operation flow to create a secure bug report if normally bug reports are publicly readable? (if they are not by default publicly readable, what operation on them makes them so?) >>> >>> Or concretely: what triples are PUT where? >>> >>> Andy >>> >>> >> > > Social Web Architect > http://bblfish.net/ >
Received on Wednesday, 14 November 2012 16:17:58 UTC