- From: Jeremy Carroll <jjc@hplb.hpl.hp.com>
- Date: Tue, 11 May 2004 12:41:12 +0200
- To: <kianoush.eshaghi@metadat.at>, <www-rdf-interest@w3.org>
- Cc: "'Kotsch (Email)'" <Leszek.Kotsch@metadat.com>, "'Hoffmann (Email)'" <harald.hoffmann@metadat.com>
You might find the following interesting, although it does not directly address your question: http://lists.w3.org/Archives/Public/www-archive/2004Apr/att-0081/PID-FAFPGYH S-1081860211.pdf It does provide some vocab terms which might be relevant. (Named Graphs, Provenace and Trust by Carroll, Bizer, Hayes, and Stickler) Jeremy > -----Original Message----- > From: www-rdf-interest-request@w3.org > [mailto:www-rdf-interest-request@w3.org]On Behalf Of Kianoush Eshaghi > Sent: 11 May 2004 12:04 > To: www-rdf-interest@w3.org > Cc: 'Kotsch (Email)'; 'Hoffmann (Email)' > Subject: Authentication on the basis of RDF > > > > I investigate to implement a schema of Authentication (identify). A user > attempts to act a network resource, at first it must to complete a > authentication process, which determines how it acts the resource, i.e. > under which rights (read, write,etc.) it can act. (role based). > > I implement the model on the basis of RDF. Is there a published > RDF-vocabulary attended to my purpose? > > I appreciate any pointer. > > Thanks, > > Eshaghi > >
Received on Tuesday, 11 May 2004 06:41:38 UTC