- From: Melvin Carvalho <melvincarvalho@gmail.com>
- Date: Thu, 20 May 2021 17:48:58 +0200
- To: Henry Story <henry.story@bblfish.net>
- Cc: Kingsley Idehen <kidehen@openlinksw.com>, Read-Write-Web <public-rww@w3.org>
- Message-ID: <CAKaEYhKhGmXSJA2RzBnn9iSk8DnUSoHLztu4XAsUm6wk77hikQ@mail.gmail.com>
On Thu, 20 May 2021 at 17:22, Henry Story <henry.story@bblfish.net> wrote:
>
>
> > On 20. May 2021, at 17:17, Kingsley Idehen <kidehen@openlinksw.com>
> wrote:
> >
> > Changed title to orient focus.
> >
> > Here's what exists currently, putting blockchains aside.
> >
> > • I can generate an X.509 Certificate (which an expiration date)
> that functions as my Web Ticket
> > • I can ACL protect my RDF documents and even associated services
> > Adding a blockchain to the mix solves the following:
>
> Btw. with Verifiable Credentials we should now be in a position to go
> beyond X509 - finally!
> It is also quite possible to bypass the TLS layer for authentication.
> Finally one can use description logic to describe access rights.
>
> I am trying to bring all these ideas together here:
>
>
> https://github.com/solid/authentication-panel/blob/main/proposals/HttpSignature.md
>
> One type of description could be ownership of a ticket, signed by the
> agency giving out the tickets.
>
Interesting
acl:agent [ cert:key </2019-09-02#k1> ],
Are agent bnodes of this kind actually working, right now?
>
> >
> > • Making my Ticket more copy-proof by tracking ownership via a
> Blockchain -- rather than depending solely on "private key" access and
> control on the part of users
> > • Handling accounting for future royalties etc
> > Links:
> >
> > [1]
> https://medium.com/virtuoso-blog/understanding-our-lod-connectivity-license-offer-2eef8fffaa7e
> -- example of the X.509 approach that's been in use for a while now re ODBC
> and JDBC Connectivity to the LOD Cloud
> >
>
> Henry Story
>
> https://co-operating.systems
> WhatsApp, Signal, Tel: +33 6 38 32 69 84
> Twitter: @bblfish
>
>
Received on Thursday, 20 May 2021 15:49:23 UTC