- From: peter williams <home_pw@msn.com>
- Date: Fri, 22 Apr 2011 10:34:20 -0700
- To: <public-xg-webid@w3.org>
- CC: <foaf-protocols@lists.foaf-project.org>
- Message-ID: <SNT143-ds12188169F0553DD4CDB9E492950@phx.gbl>
Given the writing of the paper targeting the wants and needs of the usual US identity crowd and then the fact that folks are turning their focus towards the writing of a distinguishing paper for a conference on social web stuff in Germany, we should realize we have hit a turning point. We should consolidate the distinctions being drawn. Webid is about the interplay of three technologies (not listed), in a tiny small space that combines them in such a fashion that all three finally show themselves suited to the times. It doesn't need in this one brand name "webid" to be tied to other ideas ( see below). They need their own brand names (much like "ssl" distinguishes itself from "PKI" (2000ish, coined by Entrust) and "digitalids" (1995ish, coined by Sclavos)) Social networks are an "application" of webid. They focus on something the technologies (above) do not: using foaf and semweb to build "trust chains". I don't know much about it (and am not sure I want to); but Im hopeful. To be honest im excited that advanced logic can do graph analysis, especially if its using advanced computing models. It seems to be about profile management (on the web), cert issuing (on the web), chain discovery (on the web), and security context establishment via groupware (on the web, of course). NONE of these topics are webid, but they are "federated social networks". SO, we realize we have made the classical split between protocol for signaling and integrating (like SSL), and procedures for chaining trust (like the cert chains used in the https "application" of SSL) and then managing keys and names (like cert issuing). One feature is in kernel land (in windows anyways), and the other in user space (In the middle of some browser engine handling documents). That very architecture forces the separation of concerns, for security enforcement. One is about channels, the other about documents. Arguably, the social network stuff done in other incubator groups goes beyond trust chain discovery and closure, to address some of what https further addressed: secure hypermedia documents. This may even include what was done originally (in secure hypermedia theories cued of HTML anchors) which was computation based on sets of (related) SSL connections. If folks think carefully, one will realize the graphs of SSL connections emanating from a 1995-era HTML document when combined with the SSL tunnels managed by web proxy chains, as "Described by" actual hypermedia document rendered in browsers, is a form a global cipher run (back to that "web as a living computing platform", meme). You can and should view the space as a complexity-generating mixer. It's a giant knights tour, if you will, and the basis of a transposition step in (large space) cipher design. I think we are starting to see the re-emergence of digital id and channel composition as an interesting research topic, now we have re-learned to DISTINGUISH its elements. Of course, it's even more fun that the previous round of results are infact available at a global deployment level, available for further experimentation to observer the GLOBAL properties. Be nice if the folks who made that space and defined it and then brought ti to global realization point (even to the headstrong W3C types) got a credit once in a while. Is it time to turn off the endless litany of rants and imputations about how all oppressive it all was/is, contrary to fact? The global crypto scene is all a damn site better off than it was when we started (1987 in my case).
Received on Friday, 22 April 2011 17:34:48 UTC