- From: <henry.story@bblfish.net>
- Date: Tue, 20 May 2014 13:24:26 +0200
- To: ashok.malhotra@oracle.com
- Cc: Serena Villata <serena.villata@inria.fr>, Jr Ted Thibodeau <tthibodeau@openlinksw.com>, public-ldp-wg@w3.org
On 20 May 2014, at 13:08, ashok malhotra <ashok.malhotra@oracle.com> wrote:
> Henry:
> The usecases you added allow Eddie to edit the ACGs for resources he owns.
> rather than the webmaster controlling all ACGs. Is this correct?
> If so, we should add a requirement that agent can edit the ACGs for resources
> he owns.
I think that makes sense. If we start by the root container, we can define the requirements recursively, a bit like this:
1. the web master is able to edit the ACGs for all resources whose urls match the regex "https://domain.example/.*"
2. the web master specifies the ACG for the root LDPC and then gives the rights to do whatever he wants
to the owner of a created LDPC making him the sub-web master of the created LDPC e.g.,
"https://domain.example/joe/.*"
3. the owner of the created LDPC <https://domain.example/joe/> can create new LDPCs and give any rights he chooses to them
some of the rights he can choose to give are:
- allow anyone to post to a particular container ( perhaps with the restriction that he be authenticated in some way ), but
not to read the contents of the container
- allow only friends to post, and edit content in another container
- allow friends of friends ....
... the use cases from the wiki ...
> Ashok
>
> On 5/20/2014 6:09 AM, henry.story@bblfish.net wrote:
>> On 19 May 2014, at 17:53, Serena Villata <serena.villata@inria.fr> wrote:
>>
>>> Dear Ashok, all,
>>> I have just few comments on the Note:
>>>
>>> - "ACG: An Access Control Graph describes which agents can have some mode of access to a resource, or collection of resources.": I would
>>> substitute this sentence with "ACG: An Access Control Graph describes which features an agents has to satisfy to have some mode of access
>>> to a resource, or collection of resources.". This is to avoid the misunderstanding that only specified lists of agents (or roles of the
>>> agents) are considered while it is also possible to list the attributes of the agents whose access is granted. I see that this point
>>> is mentioned as possible future outcome of an AC WG: "The WG will need to decide whether it also wants to define fine-grained access
>>> control at an attribute level." To me attribute-level AC is more general than specifying AC lists of agents (as you do not always know the
>>> URIs of all the agents that will try to access the resource and maybe they are allowed to). However, I understand that this is a tricky point, and
>>> it is fine with me to leave it as a future option (as it is just a single page :-) ) for a dedicated WG.
>>>
>>> - "allowing friends of his to POST to a container, but not read the contents of the container": sounds a bit strange to me. Why the constraint that he cannot read the contents of the container?
>> I was thinking of an notification LDPC where one can be notified of a change to a resource ( say someone adds you to their friend profile ). You want to allow people to POST but not necessarily to view all the notifications that have been posted.
>> I updated the uses cases here https://www.w3.org/2012/ldp/wiki/AccessControl
>>
>> does that help?
>>
>>> All the best,
>>> Serena
>>>
>>>
>>>
>>> ----- Mail original -----
>>>> De: "Ashok Malhotra" <ashok.malhotra@oracle.com>
>>>> À: "Ted Thibodeau Jr" <tthibodeau@openlinksw.com>, "Serena Villata" <serena.villata@inria.fr>, public-ldp-wg@w3.org
>>>> Envoyé: Lundi 19 Mai 2014 16:57:31
>>>> Objet: Please review the Access Control page
>>>>
>>>> Serena, Ted:
>>>> The LDP WG is getting ready to publish the Access Control page as a WG note.
>>>> Could you please take a look at
>>>> https://www.w3.org/2012/ldp/wiki/AccessControl
>>>> before we do that? And it is what it says -- just a single page :-)
>>>> --
>>>> All the best, Ashok
>>>>
>> Social Web Architect
>> http://bblfish.net/
>>
>
Social Web Architect
http://bblfish.net/
Received on Tuesday, 20 May 2014 11:25:00 UTC