- From: Adrian Walker <adriandwalker@gmail.com>
- Date: Fri, 17 Aug 2012 19:05:17 -0400
- To: Kingsley Idehen <kidehen@openlinksw.com>
- Cc: "public-lod@w3.org" <public-lod@w3.org>
- Message-ID: <CABbsEScSxG6W9fQqD_BqgQ7nJ4MOHZ_XsLPw6PAWzB4HdZ9qDg@mail.gmail.com>
Hi Kingsley,
Here's how your example looks in Executable English. You can view, run and
change the example by pointing a browser to www.reengineeringllc.com and
choosing SocialAccess1 .
| Kingsley wrote:
| 1. you can only sign up if you are no greater than 1 degree of
separation from TimBL, in a social network
| 2. you can only access a resource if you are known by TimBL
| 3. you can alter (e.g. extend membership) a resource ACL rule if
you claim to know TimBL and he also claims to know you.
|
| Here's how to specify that in Executable English
a-person and TimBL are at 1 degree of separation in a social network
--------------------------------------------------------------------
1. that-person is permitted to sign up
TimBL knows a-person
----------------------------------------------
2. that-person is allowed to access a resource
a-person claims to know TimBL
TimBL claims to know that-person
--------------------------------------------
3. that-person can alter a resource ACL rule
a-person and an-other-person are friends in Facebook
-----------------------------------------------------------------------------------
that-person and that-other-person are at 1 degree of separation in a
social network
an-other-person and a-person are friends in Facebook
-----------------------------------------------------------------------------------
that-person and that-other-person are at 1 degree of separation in a
social network
this-person and this-other-person are friends in Facebook
==========================================================
TimBL Kinglsey
Adrian Kinglsey
TimBL knows this-person
========================
Kingsley
this-person claims to know this-other-person
============================================
TimBL Kingsley
Kingsley TimBL
| This file is an application written in the language Executable English.
| You can view, run and change it by pointing a browser
| to www.reengineeringllc.com and selecting SocialAccess1.
Thanks for comments.
-- Adrian
Internet Business Logic
A Wiki and SOA Endpoint for Executable Open Vocabulary English Q/A over SQL
and RDF
Online at www.reengineeringllc.com
Shared use is free, and there are no advertisements
Adrian Walker
Reengineering
On Fri, Aug 17, 2012 at 9:14 AM, Kingsley Idehen <kidehen@openlinksw.com>wrote:
> On 8/17/12 9:00 AM, Adrian Walker wrote:
>
> Hi Kingsley & All,
>
> Facebook Access Tokens have a fairly fine grain, but for flexibility, and
> for explaining complex access decisions, the reasoning approach in the
> following example may be worth a look:
>
> www.reengineeringllc.com/demo_agents/Access.agent
>
> As you may see, with this approach one can reason about an organization
> chart, and about which roles can delegate which permissions.
>
>
> Simple example, how do I express the following:
>
> 1. you can only sign up if you are no greater than 1 degree of separation
> from TimBL, in a social network
> 2. you can only access a resource if you are known by TimBL
> 3. you can alter (e.g. extend membership) a resource ACL rule if you claim
> to know TimBL and he also claims to know you.
>
> Those rules are just the elementary level stuff. I can assure you that
> there are no OAuth solutions in the Web 2.0 realm that can handle that, let
> alone the kind of dexterity that Linked Data, WebID, and the SPARQL
> protocol bring to the table re. ACLs and data access policies :-)
>
> Links:
>
> 1. https://plus.google.com/s/acl%20webid%20sparql%20idehen -- posts about
> WebID, ACLs, Linked Data, and SPARQL .
>
> Kingsley
>
>
> Cheers, -- Adrian
>
> Internet Business Logic
> A Wiki and SOA Endpoint for Executable Open Vocabulary English Q/A over
> SQL and RDF
> Online at www.reengineeringllc.com
> Shared use is free, and there are no advertisements
>
> Adrian Walker
> Reengineering
>
>
> On Thu, Aug 16, 2012 at 7:39 PM, Kingsley Idehen <kidehen@openlinksw.com>wrote:
>
>> All,
>>
>> Here's Twitter pretty much expressing the inevitable reality re.
>> Web-scale business models:
>> https://dev.twitter.com/blog/changes-coming-to-twitter-api
>>
>> There's no escaping the importance of access control lists and policy
>> based data access.
>>
>> --
>>
>> Regards,
>>
>> Kingsley Idehen
>> Founder & CEO
>> OpenLink Software
>> Company Web: http://www.openlinksw.com
>> Personal Weblog: http://www.openlinksw.com/blog/~kidehen
>> Twitter/Identi.ca handle: @kidehen
>> Google+ Profile: https://plus.google.com/112399767740508618350/about
>> LinkedIn Profile: http://www.linkedin.com/in/kidehen
>>
>>
>>
>>
>>
>>
>
>
> --
>
> Regards,
>
> Kingsley Idehen
> Founder & CEO
> OpenLink Software
> Company Web: http://www.openlinksw.com
> Personal Weblog: http://www.openlinksw.com/blog/~kidehen
> Twitter/Identi.ca handle: @kidehen
> Google+ Profile: https://plus.google.com/112399767740508618350/about
> LinkedIn Profile: http://www.linkedin.com/in/kidehen
>
>
>
>
Received on Friday, 17 August 2012 23:05:45 UTC