- From: Peter Williams <home_pw@msn.com>
- Date: Sat, 31 Dec 2011 15:11:49 -0800
- To: Kingsley Idehen <kidehen@openlinksw.com>
- CC: "public-xg-webid@w3.org" <public-xg-webid@w3.org>
- Message-ID: <snt0-eas112FD9AA72033557F3C1A2E92930@phx.gbl>
I'm concerned that noone else delivers such an endpoint. It's a specialized crawler, at the end of the day. If one "instucts" the crawler to crawl with query x (having logged in with webid to set the enabled queries, logged in (using webid) as follower of said setter in order to execute said query (and deposit the result set in ones follower's data space) It all makes sense. For some reason, that world did not come about. Sent from my iPhone On Dec 31, 2011, at 10:27 AM, "Kingsley Idehen" <kidehen@openlinksw.com> wrote: > On 12/31/11 1:03 PM, Peter Williams wrote: >> >> I going to edit my little validator agent experiment today, to make further use of the linkburner sparl-protocol endpoint, doing remote query execution in the course of enforcing the SSL handshake protocol. > > You mean: URIBurner, a Linked Data service that we offer to the public :-) > >> I assume its owl-enabled, with reasoner. > > You add this pragma to your SPARQL: > DEFINE input:same-as "yes" > > Example from prior queries: > > ## owl:sameAs pragma. Comment out if you don't seek owl:sameAs reasoning applied to the SPARQL query . > > DEFINE input:same-as "yes" > ## pragma use end > > ## HTTP GET (sponging) pragma, use "add" for progressive named graph population, so you can add relations to the source without overwriting > ## the local graph used by the Virtuoso server. Note, this is also a default cache invalidation scheme override > > DEFINE get:soft "add" > > ## pragam use end. > > PREFIX : <http://www.w3.org/ns/auth/cert#> > PREFIX xsd: <http://www.w3.org/2001/XMLSchema#> > > > ASK FROM <http://rdf-translator.appspot.com/parse?url=http%3a%2f%2fid.myopenlink.net%3a80%2fdataspace%2fperson%2fhome_pw&of=xml> WHERE { > ?s :key [ > :modulus "c531b19280ed0e1a64d9cf327801296366657325ff08a35c93b406293429415430d6d832fa3694f05d05ace8a2ac95db5147feb1c19bc5eb7a80aedc510b79bbbe2ddce7badd9d00a36566445bba5065f66478ac2c4c24e1e8869f0a6eb7b9feef54a194c4f1e77d1918662967f02878e0f27e6880f93a1c32feac1a0861f349"^^xsd:hexBinary ; > :exponent ?exp ; > ] . > } > > >> I will need help formulating working queries that exercise some query ...working over 2 profiles, named using 2 SAN URIs from 1 cert, with 1 key. > > You idp space simply needs to have owl:sameAs relations in place and the reasoner will handle the query solution. >> >> >> >> Your linkburner sparql server has an option to auto-pull owl:sameAs data from the triples *received* from the securely-named endpoint, when its "useful" to do so, in the course of preparing data for local querying. > > The pragma: define get:soft "{add | replace | soft}" handles resource retrieval modalities. > The pragma: define input:same-as "yes" handles enabling or disabling of the OWL reasoner. > >> I want to see the utility of what we have been discussing. I want (as the worlds worst programmer) to be able to do it, so we know its real fo all the class (not just those who get As) . > > Great. > > Also note you could also test the inversefunctional property relation option by declaring cert:key as being an IFP and then making a custom inference rule that's invoked by a pragma. For the URIBurner instance, I'll have to set up that rule once you are ready to test that scenario. All you have to do is associate two URIs with the same public key in your idp space modulo owl:sameAs relation. > >> Then the rest of the world can copy it. Using a remote sparql protocol server for this seems ideal, since its now acting as a trust resolver (leveraging equivalence relations). using a sparql server guarded by webid validation is even better, as a "system" of trusted agents start to come into being. > > Yes, we can WebID protect the sparql endpoint. Basically, that's what we'll soon enact re. id.myopenlink.net, we've been waiting for an external QA tester like you for a few years now! > >> >> >> >> I want to be able to test for membership of two profiles in a given equivalence class. The class itself will be distinguishsed using a data URI with certain integrity properties that detect tampering, and webid validation agents (and the SSL handshake) will prove that the profiles do participate in that particular equivalency class. Since the class apparatus is based on the canonical nature of the public key in the data URI, it obviously scales to any size of equivalencies we want, suit the million person world of (wholly de-centralized) realty trust networks based on the individual (and her 20 local friends, neighbors, and business associates). > > This is the game, right here! > > > > -- > > Regards, > > Kingsley Idehen > Founder & CEO > OpenLink Software > Company Web: http://www.openlinksw.com > Personal Weblog: http://www.openlinksw.com/blog/~kidehen > Twitter/Identi.ca handle: @kidehen > Google+ Profile: https://plus.google.com/112399767740508618350/about > LinkedIn Profile: http://www.linkedin.com/in/kidehen > > > >
Received on Saturday, 31 December 2011 23:12:29 UTC