- From: Story Henry <henry.story@bblfish.net>
- Date: Mon, 22 Feb 2010 16:13:59 +0100
- To: nathan@webr3.org
- Cc: foaf-protocols@lists.foaf-project.org, Linked Data community <public-lod@w3.org>
On 22 Feb 2010, at 15:59, Nathan wrote: >> >> We would need something like this >> >> :pk cert:timeIdentified [ a TimeSlice; >> of :me; >> from "2009-10-10..."^^xsd:dateTime; >> to "2010-01-01..."^^xsd:dateTime . >> ] . >> >> It does not make sense to have time slices on a key, as that is a mathematical entity, very similar to a literal. > > seems to me that a cert:Certificate should / could have Validity details > on there (issued-on, expires on) - it's all ready catered for in > certificates just needs expressed in the vocab. yes, we have defined cert:Certificate, though we do not use it currently cert:Certificate a owl:Class; vs:term_status "unstable"; rdfs:subClassOf foaf:Document; rdfs:comment """A certificate is a Document that is signed. As explained here http://www.pgpi.org/doc/pgpintro/#p16 'A digital certificate consists of three things: * A public key. * Certificate information. ('Identity' information about the user, such as name, user ID, and so on.) * One or more digital signatures.' """ . And the interesting thing is that it does not look like we need the notion of a certificate, and are able to get a lot done. Or rather: the foaf file is itself the certificate, and when it is served by an https server it is signed (during transmission). As per definition above the foaf file is a certificate because: - it contains a public key (and identitifes who knows the public key) - has information about the agent identified by the public key - and is signed (by the server when sent over https) (so there is no need to place the signatures inside the foaf file) The important piece is for how long a public key identifies an agent, as the one that knows it's private key. I think you could get a lot done just by specifying that. Henry
Received on Monday, 22 February 2010 15:14:46 UTC