RE: Authentication on the basis of RDF

You might find the following interesting, although it does not directly
address your question:

http://lists.w3.org/Archives/Public/www-archive/2004Apr/att-0081/PID-FAFPGYH
S-1081860211.pdf

It does provide some vocab terms which might be relevant.

(Named Graphs, Provenace and Trust
by Carroll, Bizer, Hayes, and Stickler)

Jeremy

> -----Original Message-----
> From: www-rdf-interest-request@w3.org
> [mailto:www-rdf-interest-request@w3.org]On Behalf Of Kianoush Eshaghi
> Sent: 11 May 2004 12:04
> To: www-rdf-interest@w3.org
> Cc: 'Kotsch (Email)'; 'Hoffmann (Email)'
> Subject: Authentication on the basis of RDF
>
>
>
> I investigate to implement a schema of Authentication (identify). A user
> attempts to act a network resource, at first it must to complete a
> authentication process, which determines how it acts the resource, i.e.
> under which rights (read, write,etc.) it can act. (role based).
>
> I implement the model on the basis of RDF. Is there a published
> RDF-vocabulary attended to my purpose?
>
> I appreciate any pointer.
>
> Thanks,
>
> Eshaghi
>
>

Received on Tuesday, 11 May 2004 06:41:38 UTC