- From: Sandro Hawke <sandro@w3.org>
- Date: Sun, 27 Apr 2014 15:00:29 -0400
- To: ashok.malhotra@oracle.com, "public-ldp-wg@w3.org" <public-ldp-wg@w3.org>
On 04/27/2014 10:26 AM, ashok malhotra wrote:
> On 4/26/2014 5:47 PM, Sandro Hawke wrote:
>> It makes sense in general, but I'm not sure about the particulars.
>> What do you mean by collection? Why a collection at all?
>
> Hi Sandro:
> If we create a standard for Access Control should we specify policies
> or data structures?
Neither, I think. In my mind what's needed is:
1. an RDF vocabulary with terms like :allCanRead, defined as { ?x
:membersCanRead ?y } means every member of RDF Class ?x is allowed to
see the state of resource ?y. There might need to be some tweaking
about what it means to be a a thing allowed access -- is it a person, a
system holding the user's credentials, a system holding its own
credentials but authorized by the user, etc. Also: :membersCanAppend,
and :membersCanModify, etc.
2. a "protocol" so that clients can learn and modify those access
control triples. The simplest design would be to say access control
triples are part of the graph for RDF Sources and part of the metadata
for non-RDF Sources. That might be too simple, but it's a starting
point. Other things one might want include: a way to set default ACL
for new resources in a container; a way to set the ACL for a new
resource being POSTed; a way to give people the ability to change the
data without changing the ACL (separate write and admin privs). Those
would require a more complex structure, such as a specific ACL graph,
and the ability to POST multiple graphs at once (which I put on the
wishlist, and almost no one thought was important).
-- Sandro
> My thought was that policies are situation dependent, so we could
> standardize the data structures
> and use policies to connect the data structures. The collections
> could be populated by query
> or by enumeration or by some sort of policy.
>
> Ashok
>
>
Received on Sunday, 27 April 2014 19:00:35 UTC