- From: Kingsley Idehen <kidehen@openlinksw.com>
- Date: Fri, 17 Aug 2012 09:14:42 -0400
- To: Adrian Walker <adriandwalker@gmail.com>
- CC: "public-lod@w3.org" <public-lod@w3.org>
- Message-ID: <502E43C2.9030804@openlinksw.com>
On 8/17/12 9:00 AM, Adrian Walker wrote: > Hi Kingsley & All, > > Facebook Access Tokens have a fairly fine grain, but for flexibility, > and for explaining complex access decisions, the reasoning approach in > the following example may be worth a look: > > www.reengineeringllc.com/demo_agents/Access.agent > <http://www.reengineeringllc.com/demo_agents/Access.agent> > > As you may see, with this approach one can reason about an > organization chart, and about which roles can delegate which permissions. Simple example, how do I express the following: 1. you can only sign up if you are no greater than 1 degree of separation from TimBL, in a social network 2. you can only access a resource if you are known by TimBL 3. you can alter (e.g. extend membership) a resource ACL rule if you claim to know TimBL and he also claims to know you. Those rules are just the elementary level stuff. I can assure you that there are no OAuth solutions in the Web 2.0 realm that can handle that, let alone the kind of dexterity that Linked Data, WebID, and the SPARQL protocol bring to the table re. ACLs and data access policies :-) Links: 1. https://plus.google.com/s/acl%20webid%20sparql%20idehen -- posts about WebID, ACLs, Linked Data, and SPARQL . Kingsley > > Cheers, -- Adrian > > Internet Business Logic > A Wiki and SOA Endpoint for Executable Open Vocabulary English Q/A > over SQL and RDF > Online at www.reengineeringllc.com <http://www.reengineeringllc.com> > Shared use is free, and there are no advertisements > > Adrian Walker > Reengineering > > > On Thu, Aug 16, 2012 at 7:39 PM, Kingsley Idehen > <kidehen@openlinksw.com <mailto:kidehen@openlinksw.com>> wrote: > > All, > > Here's Twitter pretty much expressing the inevitable reality re. > Web-scale business models: > https://dev.twitter.com/blog/changes-coming-to-twitter-api > > There's no escaping the importance of access control lists and > policy based data access. > > -- > > Regards, > > Kingsley Idehen > Founder & CEO > OpenLink Software > Company Web: http://www.openlinksw.com > Personal Weblog: http://www.openlinksw.com/blog/~kidehen > <http://www.openlinksw.com/blog/%7Ekidehen> > Twitter/Identi.ca handle: @kidehen > Google+ Profile: https://plus.google.com/112399767740508618350/about > LinkedIn Profile: http://www.linkedin.com/in/kidehen > > > > > > -- Regards, Kingsley Idehen Founder & CEO OpenLink Software Company Web: http://www.openlinksw.com Personal Weblog: http://www.openlinksw.com/blog/~kidehen Twitter/Identi.ca handle: @kidehen Google+ Profile: https://plus.google.com/112399767740508618350/about LinkedIn Profile: http://www.linkedin.com/in/kidehen
Attachments
- application/pkcs7-signature attachment: S/MIME Cryptographic Signature
Received on Friday, 17 August 2012 13:13:28 UTC