The document discusses a proposal for privately publishing resources across multiple domains. It outlines background on the current state, objectives to store resources in one place and define access policies centrally using Semantic Web technologies. A test bed is described using FOAF profiles, WebID authentication and a distributed resource broker. Related work like Priv.ly is discussed with differences noted. Conclusions state the approach allows private cross-domain publishing and independent access management. Future work includes addressing partial resources, public-key encryption and blacklisting options.
This document outlines steps for preparing for and conducting a job search, including taking a self-inventory, updating resumes and cover letters, developing an elevator pitch, leveraging networking and social media, and maintaining a strong personal brand. It notes that while jobs are fewer, opportunities still exist in fields like education, healthcare, and information technology. Networking is emphasized as the most effective strategy, with only 5% of jobs found through online applications. Proper interview preparation and maintaining a positive attitude are also recommended.
Javascript is a dynamic, loosely typed scripting language with C/Java-like syntax that uses prototypical inheritance rather than classes. It supports objects, arrays, functions, numbers, strings, booleans, null, and undefined data types. Class-like structures can be created using constructor functions and prototypes. Namespacing is important to avoid cluttering the global object. Well-designed widgets separate concerns into small stateful objects and maximize collection usage. JSON is commonly used for data interchange and is faster and less verbose than XML. Popular libraries include jQuery, Prototype, MooTools and YUI for components, widgets and page enhancement.
This document discusses how information about movies, directors, and actors can be easily found on databases like Daum Movie and IMDB, but finding information about specific military divisions or historical figures is more difficult. It proposes creating a graph database that maps relationships between directors, actors, and their works to allow users to navigate and explore this information, beginning from any individual entity. The database would source its information from existing open APIs and content sources like Freebase, Openbase, and Wikipedia.
This document outlines steps for preparing for and conducting a job search, including taking a self-inventory, updating resumes and cover letters, developing an elevator pitch, leveraging networking and social media, and maintaining a strong personal brand. It notes that while jobs are fewer, opportunities still exist in fields like education, healthcare, and information technology. Networking is emphasized as the most effective strategy, with only 5% of jobs found through online applications. Proper interview preparation and maintaining a positive attitude are also recommended.
Javascript is a dynamic, loosely typed scripting language with C/Java-like syntax that uses prototypical inheritance rather than classes. It supports objects, arrays, functions, numbers, strings, booleans, null, and undefined data types. Class-like structures can be created using constructor functions and prototypes. Namespacing is important to avoid cluttering the global object. Well-designed widgets separate concerns into small stateful objects and maximize collection usage. JSON is commonly used for data interchange and is faster and less verbose than XML. Popular libraries include jQuery, Prototype, MooTools and YUI for components, widgets and page enhancement.
This document discusses how information about movies, directors, and actors can be easily found on databases like Daum Movie and IMDB, but finding information about specific military divisions or historical figures is more difficult. It proposes creating a graph database that maps relationships between directors, actors, and their works to allow users to navigate and explore this information, beginning from any individual entity. The database would source its information from existing open APIs and content sources like Freebase, Openbase, and Wikipedia.
Ruby codemetric automation server - Putne IntroductionDaegwon Kim
This document discusses code metrics and the Putne automation server. It provides an overview of code metrics including complexity, duplication, and code smells. It also discusses Ruby code metrics gems and tools for collecting metrics. Putne is introduced as an open source, self-hosted automation server that can run code metrics and visualizations. It connects to code repositories through push hooks and the GitHub API. Visualizations provided include complexity sunbursts, activity calendars, and other exploratory reports.
This document discusses data visualization and mapping variables to visual elements in graphs. It explains how to create bar plots in R using the barplot() and ggplot2 packages. Examples are provided to map class, score, and category variables from sample data to the x-axis, y-axis, bar names, bar heights, and bar colors. The document also covers concepts like the grammar of graphics, scales, coordinates, and the process of creating graphs with variables, algebra, geometry, aesthetics and dimensions beyond the standard two-dimensional XY space.
This document introduces portlets and discusses their key characteristics. Portlets are self-contained components that can be placed on web pages and portals to provide modular functionality like weather, feeds, etc. They run in a portlet container on top of the servlet API and provide modes and states. The standard portlet API lacks MVC and data binding capabilities, which frameworks like Spring Portlet address. Best practices include treating portlets as view-only technologies and separating business logic into services.
The document discusses key concepts in the Ruby programming language including its emphasis on reducing surprises, syntax sugars like optional parentheses, and features like string interpolation. It also covers Ruby conventions like variables, methods marked with ? or !, and magic comments as well as data types like arrays, symbols, strings, hashes, and keyword parameters. Inheritance and mix-ins are compared to includes and self.
이미지 기반의 배포 패러다임 Immutable infrastructureDaegwon Kim
- The document discusses immutable infrastructure and immutable images in cloud computing.
- Immutable infrastructure uses configuration management tools like Chef and Docker to build stateless, reproducible server images.
- When servers are deployed from these images, they are configured automatically and can be replaced easily without losing state.
RIOXX is a metadata application profile intended to allow repositories to report on open access publications in a way that satisfies UK funder requirements. Version 2.0 of RIOXX is nearing release following feedback on the beta version. It focuses on publications and represents key metadata elements like authors, projects, and licenses in a consistent way. Repositories will soon be able to implement RIOXX through funded plugin development to facilitate reporting for funders like RCUK and HEFCE.
Kurento: a media server architecture and API for WebRTCLuis Lopez
Introducing Kurento for WebRTC Expo 2013 (Paris). Kurento is an Open Source multimedia framework, which provides a Java EE compatible API suitable for adding real-time communication capabilities to any WWW application in a simple and seamless way.
Making your Repository or Open Access Journal OpenAIRE compatible with OA Hor...OpenAIRE
Webinar: "Making your OA repository or OA journal OpenAIRE compatible with OA Horizon 2020 requirements" - Thursday 26 November 2015, 11:00am - 12:00pm.
The webinar is a part of FOSTER e-learning course “Making your OA repository or OA journal OpenAIRE compatible with OA Horizon 2020 requirements”.
This document discusses caching patterns and strategies for digital data. It provides an overview of common caching patterns including read-through caching, write-through caching, pre-fetch caching, side caching, and publisher/refresh ahead caching. For each pattern there is a brief description of how it works and examples of suitable uses cases. The document also discusses how to distribute data across different caching layers from content delivery networks to the database layer.
Talk from 05 June 2014 NYLUG meeting at Bloomberg NYC. Short history of where Ceph came from, an architectural overview, and the current state of the community.
This document discusses security in Hadoop clusters using Apache Ranger. It provides an overview of Hadoop security, describes the components of Ranger and how it implements authorization, auditing and central policy management. The document demonstrates typical authorization workflows with Ranger for HDFS and Hive, and best practices for configuring Ranger and its integration with LDAP. It also includes a demo of Ranger controlling access to HDFS directories and Hive tables.
Talk given by @atreloar and @hvdsomp at workshop sponsored by http://dans.knaw.nl/ with title "Riding the Wave and the Scholarly Archive of the Future". NOTE: This reflects thinking in progress which may well change in the future.
A 30 minute presentation given to the Toronto Web Performance Meetup about Google's PageSpeed and the SPDY Protocol.
This presentation covers the following topics.
- What is PageSpeed, how to use and install.
- Should you use SPDY? Or wait for HTTP 2?
- Shortcomings of HTTP 1.1
Jon W. Dunn presented this overview of the Avalon Media System at the start of the "Avalon Media System: Implementation and Community" session at the 2014 Digital Library Federation (DLF) Forum on October 28, 2014.
See session description and community notes: http://www.diglib.org/forums/2014forum/program/60z/
The workflows for the ingest of digital objects into a repository/digital l...Hong (Jenny) Jing
The document discusses best practices and considerations for developing workflows for ingesting digital objects into repositories and digital libraries. It covers key aspects of ingest workflows including standards, quality assurance procedures, metadata, tools and software. Example ingest workflows are provided using systems like Archivematica, DSpace and DataVerse to illustrate the ingest process.
The document discusses UNLV Libraries' project to transform their digital collection metadata into linked open data. It describes how the project started as a study group and literature review in 2012. The goals were to preserve metadata richness when converting to a standard like Dublin Core and improve discoverability by publishing in the Linked Data Cloud. Technologies used included ContentDM, OpenRefine, Karma, Mulgara/Virtuoso triplestores, and SPARQL. The process involved cleaning, exporting, reconciling, generating RDF triples, importing to a triplestore, publishing, and querying the data. Visualizations were created using PivotViewer and RelFinder to showcase relationships. Next steps include transforming all collections and increasing linkages to other datasets.
Ruby codemetric automation server - Putne IntroductionDaegwon Kim
This document discusses code metrics and the Putne automation server. It provides an overview of code metrics including complexity, duplication, and code smells. It also discusses Ruby code metrics gems and tools for collecting metrics. Putne is introduced as an open source, self-hosted automation server that can run code metrics and visualizations. It connects to code repositories through push hooks and the GitHub API. Visualizations provided include complexity sunbursts, activity calendars, and other exploratory reports.
This document discusses data visualization and mapping variables to visual elements in graphs. It explains how to create bar plots in R using the barplot() and ggplot2 packages. Examples are provided to map class, score, and category variables from sample data to the x-axis, y-axis, bar names, bar heights, and bar colors. The document also covers concepts like the grammar of graphics, scales, coordinates, and the process of creating graphs with variables, algebra, geometry, aesthetics and dimensions beyond the standard two-dimensional XY space.
This document introduces portlets and discusses their key characteristics. Portlets are self-contained components that can be placed on web pages and portals to provide modular functionality like weather, feeds, etc. They run in a portlet container on top of the servlet API and provide modes and states. The standard portlet API lacks MVC and data binding capabilities, which frameworks like Spring Portlet address. Best practices include treating portlets as view-only technologies and separating business logic into services.
The document discusses key concepts in the Ruby programming language including its emphasis on reducing surprises, syntax sugars like optional parentheses, and features like string interpolation. It also covers Ruby conventions like variables, methods marked with ? or !, and magic comments as well as data types like arrays, symbols, strings, hashes, and keyword parameters. Inheritance and mix-ins are compared to includes and self.
이미지 기반의 배포 패러다임 Immutable infrastructureDaegwon Kim
- The document discusses immutable infrastructure and immutable images in cloud computing.
- Immutable infrastructure uses configuration management tools like Chef and Docker to build stateless, reproducible server images.
- When servers are deployed from these images, they are configured automatically and can be replaced easily without losing state.
RIOXX is a metadata application profile intended to allow repositories to report on open access publications in a way that satisfies UK funder requirements. Version 2.0 of RIOXX is nearing release following feedback on the beta version. It focuses on publications and represents key metadata elements like authors, projects, and licenses in a consistent way. Repositories will soon be able to implement RIOXX through funded plugin development to facilitate reporting for funders like RCUK and HEFCE.
Kurento: a media server architecture and API for WebRTCLuis Lopez
Introducing Kurento for WebRTC Expo 2013 (Paris). Kurento is an Open Source multimedia framework, which provides a Java EE compatible API suitable for adding real-time communication capabilities to any WWW application in a simple and seamless way.
Making your Repository or Open Access Journal OpenAIRE compatible with OA Hor...OpenAIRE
Webinar: "Making your OA repository or OA journal OpenAIRE compatible with OA Horizon 2020 requirements" - Thursday 26 November 2015, 11:00am - 12:00pm.
The webinar is a part of FOSTER e-learning course “Making your OA repository or OA journal OpenAIRE compatible with OA Horizon 2020 requirements”.
This document discusses caching patterns and strategies for digital data. It provides an overview of common caching patterns including read-through caching, write-through caching, pre-fetch caching, side caching, and publisher/refresh ahead caching. For each pattern there is a brief description of how it works and examples of suitable uses cases. The document also discusses how to distribute data across different caching layers from content delivery networks to the database layer.
Talk from 05 June 2014 NYLUG meeting at Bloomberg NYC. Short history of where Ceph came from, an architectural overview, and the current state of the community.
This document discusses security in Hadoop clusters using Apache Ranger. It provides an overview of Hadoop security, describes the components of Ranger and how it implements authorization, auditing and central policy management. The document demonstrates typical authorization workflows with Ranger for HDFS and Hive, and best practices for configuring Ranger and its integration with LDAP. It also includes a demo of Ranger controlling access to HDFS directories and Hive tables.
Talk given by @atreloar and @hvdsomp at workshop sponsored by http://dans.knaw.nl/ with title "Riding the Wave and the Scholarly Archive of the Future". NOTE: This reflects thinking in progress which may well change in the future.
A 30 minute presentation given to the Toronto Web Performance Meetup about Google's PageSpeed and the SPDY Protocol.
This presentation covers the following topics.
- What is PageSpeed, how to use and install.
- Should you use SPDY? Or wait for HTTP 2?
- Shortcomings of HTTP 1.1
Jon W. Dunn presented this overview of the Avalon Media System at the start of the "Avalon Media System: Implementation and Community" session at the 2014 Digital Library Federation (DLF) Forum on October 28, 2014.
See session description and community notes: http://www.diglib.org/forums/2014forum/program/60z/
The workflows for the ingest of digital objects into a repository/digital l...Hong (Jenny) Jing
The document discusses best practices and considerations for developing workflows for ingesting digital objects into repositories and digital libraries. It covers key aspects of ingest workflows including standards, quality assurance procedures, metadata, tools and software. Example ingest workflows are provided using systems like Archivematica, DSpace and DataVerse to illustrate the ingest process.
The document discusses UNLV Libraries' project to transform their digital collection metadata into linked open data. It describes how the project started as a study group and literature review in 2012. The goals were to preserve metadata richness when converting to a standard like Dublin Core and improve discoverability by publishing in the Linked Data Cloud. Technologies used included ContentDM, OpenRefine, Karma, Mulgara/Virtuoso triplestores, and SPARQL. The process involved cleaning, exporting, reconciling, generating RDF triples, importing to a triplestore, publishing, and querying the data. Visualizations were created using PivotViewer and RelFinder to showcase relationships. Next steps include transforming all collections and increasing linkages to other datasets.
Research Data Management at the University of SalfordDavid Clay
The document summarizes the University of Salford's research data management project. It describes the drivers for the project including funder policies requiring open data. It outlines the requirements gathering and policy development process. It then details the proposed solution architecture including online storage, a data repository, source code management, and support services. Finally it discusses the pilot infrastructure launched in 2015 using Figshare and describes next steps to evaluate scaling up the RDM service.
Developing rich multimedia applications with Kurento: a tutorial for Java Dev...Luis Lopez
This presentation contains a tutorial devoted to showing how Java developers can create rich multimedia applications with Kurento. Java developers will find natural Kurento development model, which is based on standard Java EE technologies and is inspired on the WWW Servlet model.
If you have ever developed a Web application, you may be familiar with this scheme. At the browser, HTML and JavaScript code is in charge of user interaction and generates HTTP requests to the server. This code is usually programmed with the help of APIs such as jQuery, DOM, XHR or others. Upon reception, HTTP requests are processed by some kind of server side technology (e. g.. PHP, Java, Ruby, etc.) using service APIs providing features such as DB access, communications, transactions, XML parsing, and others. As a result, an HTTP response is issued and sent back to the client. Following this scheme, both server and client side APIs are just capabilities simplifying developer work and providing abstractions for programming faster and more efficiently.
Kurento technologies adapt to the Web development model so that, from a programmer perspective, Kurento can be seen just as an additional set of APIs. Developers does not need to learn novel programming schemes and can reuse all their knowledge and previous background on WWW application development. When you need multimedia, just use Kurento APIs. For the rest, use your preferred APIs or reuse previous code. Kurento APIs have been designed for simplicity and Web developers will find them familiar and intuitive. Most of the low level details related to codecs, formats, protocols, profiles and containers are abstracted by the framework. Programmers just concentrate on specifying the sequence of processing steps that they want to execute on the media flows.
iRODS 4.0 and Beyond (DDN UK User Group Meeting, September 2014)Daniel Bedard
These slides present a vision of iRODS configuration management and the technologies that have been implemented to this point in order to realize that vision.
- The document discusses a strategy for connecting resources across open access repositories and services by passing references rather than full copies of content.
- It proposes using asynchronous messaging and activity streams to notify repositories and services of related actions and resources.
- An example use case described is a repository requesting peer review of a pre-print from a review service, with notifications sent as the pre-print moves between draft, under review, and reviewed states.
Capture All the URLs: First Steps in Web ArchivingKristen Yarmey
The document summarizes a webinar on getting started with web archiving. It discusses making the case for a web archiving program, selecting content, crawling and scoping websites, providing access to archived content, and building a sustainable program through policies, metadata, quality control, and addressing challenges. The webinar covered lessons learned and next steps such as additional outreach and exploring new technologies and uses for archived web content.
Slides from our tutorial on Linked Data generation in the energy domain, presented at the Sustainable Places 2014 conference on October 2nd in Nice, France
Presentation by Todd Carpenter given at the American Library Association Conference on June 25, 2017 about the Resource Access in the 21st Century (RA21) project. The RA21 project is focused on improving the access control systems for digital content subscribed to by libraries.
Similar to Privon'2014 - How To Publish Privately (20)
1. How to Publish Privately
October 20, 2014 @ Riva Del Garda, Italy
Presented at Privacy Online Workshop (PrivOn’2014)
Collocated with the 13th International Semantic Web Conference (ISWC’2014)
GECAD – Knowledge Engineering and Decision Support
Research Group (Polytechnic Institute of Porto – Portugal)
http://www.gecad.isep.ipp.pt
Nuno Bettencourt
http://paginas.isep.ipp.pt/nmb
nmb@isep.ipp.pt
2. Outline
• Background and Overview
• Objectives
• Proposal
• Test bed
• Related Work
• Conclusions
• Future Work
October 20, 2014 @ Riva Del Garda, Italy 1
3. Outline
• Background and Overview
• Objectives
• Proposal
• Test bed
• Related Work
• Conclusions
• Future Work
October 20, 2014 @ Riva Del Garda, Italy 2
4. Background & Overview (i)
• Web domains
• Social Networks
• User Identities
• Accountability
• Architecture Overview
October 20, 2014 @ Riva Del Garda, Italy 3
5. upload
Background & Overview (ii)
watch
write/read
WebID Authentication and Authorisation
download
FOAF Profile: http://foafserver.com/profiles/johndoe.rdf#me
like
October 20, 2014 @ Riva Del Garda, Italy 4
6. Background & Overview (iii)
Access to
Resource
Decision
Web Server
Get Resource
Get Resource’s
Author Data
Administration
Application Server
rules
Information
resources
Enforcement
Get
Access
Policies
Access
Policies
Get extra Data
Get Resources (WebId)
Get User’s Social Network (WebId)
Manage Access
Control Policies
Ask for Access
HTTP
Client
photo.png
ownerOf
Resource
Author
October 20, 2014 @ Riva Del Garda, Italy 5
7. Background & Overview (iii)
Access to
Resource
Decision
Web Server
Get Resource
Get Resource’s
Author Data
Administration
Application Server
rules
Information
resources
Enforcement
Get
Access
Policies
Access
Policies
Get extra Data
Get Resources (WebId)
Get User’s Social Network (WebId)
Manage Access
Control Policies
Ask for Access
HTTP
Client
photo.png
ownerOf
Resource
Author
October 20, 2014 @ Riva Del Garda, Italy 5
8. Background & Overview (iii)
Access to
Resource
Decision
Web Server
Get Resource
Get Resource’s
Author Data
Administration
Application Server
rules
Information
resources
Enforcement
Get
Access
Policies
Access
Policies
Get extra Data
Get Resources (WebId)
Get User’s Social Network (WebId)
Manage Access
Control Policies
Ask for Access
HTTP
Client
photo.png
ownerOf
Resource
Author
October 20, 2014 @ Riva Del Garda, Italy 5
9. Background & Overview (iii)
Access to
Resource
Decision
Web Server
Get Resource
Get Resource’s
Author Data
Administration
Application Server
rules
Information
resources
Enforcement
Get
Access
Policies
Access
Policies
Get extra Data
Get Resources (WebId)
Get User’s Social Network (WebId)
Manage Access
Control Policies
Ask for Access
HTTP
Client
photo.png
ownerOf
Resource
Author
October 20, 2014 @ Riva Del Garda, Italy 5
10. Background & Overview (iii)
Access to
Resource
Decision
Web Server
Get Resource
Get Resource’s
Author Data
Administration
Application Server
rules
Information
resources
Enforcement
Get
Access
Policies
Access
Policies
Get extra Data
Get Resources (WebId)
Get User’s Social Network (WebId)
Manage Access
Control Policies
Ask for Access
HTTP
Client
photo.png
ownerOf
Resource
Author
October 20, 2014 @ Riva Del Garda, Italy 5
11. Background & Overview (iii)
Access to
Resource
Decision
Web Server
Get Resource
Get Resource’s
Author Data
Administration
Application Server
rules
Information
resources
Enforcement
Get
Access
Policies
Access
Policies
Get extra Data
Get Resources (WebId)
Get User’s Social Network (WebId)
Manage Access
Control Policies
Ask for Access
HTTP
Client
photo.png
ownerOf
Resource
Author
October 20, 2014 @ Riva Del Garda, Italy
5
12. Background & Overview (iii)
Access to
Resource
Decision
Web Server
Get Resource
Get Resource’s
Author Data
Administration
Application Server
rules
Information
resources
Enforcement
Get
Access
Policies
Access
Policies
Get extra Data
Get Resources (WebId)
Get User’s Social Network (WebId)
Manage Access
Control Policies
Ask for Access
HTTP
Client
photo.png
ownerOf
Resource
Author
October 20, 2014 @ Riva Del Garda, Italy
5
13. Background & Overview (iii)
Application Server
Enforcement
HTTP
Client
photo.png
ownerOf
October 20, 2014 @ Riva Del Garda, Italy
5
Access to
Resource
Decision
Web Server
Get Resource
Get Resource’s
Author Data
Administration
rules
Information
resources
Get
Access
Policies
Access
Policies
Get extra Data
Get Resources (WebId)
Get User’s Social Network (WebId)
Manage Access
Control Policies
Ask for Access
Resource
Author
14. Outline
• Background and Overview
• Objectives
• Proposal
• Test bed
• Related Work
• Conclusions
• Future Work
October 20, 2014 @ Riva Del Garda, Italy 6
15. Objectives (i)
• Store a resource in a single place
• Share a resource for multiple web domains
• Definition of access policies in a single place
• A single access policy management system
not only for public resources
• Corollary
– User unique identity
– A hyperlinked Web again…
October 20, 2014 @ Riva Del Garda, Italy 7
16. Objectives (ii)
• Based on
– FOAF Profiles
– WebID Authentication + Authorization
– Provenance Ontologies
– Semantic Rules
• Triggers
– User’s uploading of resources
– User’s sharing of resources
– ….
October 20, 2014 @ Riva Del Garda, Italy 8
17. Outline
• Background and Overview
• Objectives
• Proposal
• Test bed
• Related Work
• Conclusions
• Future Work
October 20, 2014 @ Riva Del Garda, Italy 9
18. Proposal
Access to
Resource
Decision
Web Server
Get Resource
Get Resource’s
Author Data
Administration
Application Server
rules
Information
resources
Enforcement
Get
Access
Policies
Access
Policies
Get extra Data
Get Resources (WebId)
Get User’s Social Network (WebId)
Manage Access
Control Policies
Ask for Access
HTTP
Client
photo.png
ownerOf
Resource
Author
October 20, 2014 @ Riva Del Garda, Italy 10
19. Distributed Resource Broker
Web Server
PEP
Upload
Sensor
Authentication
Module
Authorisation
Module
Distributed
Resource Broker
Web
Application 1
Web
Application 2
Web
<uses>
<uses>
Application n <uses>
October 20, 2014 @ Riva Del Garda, Italy 11
20. Upload Workflow
Applicational Web Server
PEP
Web
Application
PIP
Photo Hosting Server
Photo Web Application
ownerOf
photo.png
PEP
photo.png
FOAF
Profiles
3. Upload
Server URI
4. Resource
Upload
2. Retrieve Resource
Upload Domain
5. Resource
URI
User 6. Link to Resource URI
Distributed Resource Broker
1. Resource
Upload
Resource
October 20, 2014 @ Riva Del Garda, Italy 12
21. User_A User_B User_C
raw provenance info
Web Server 1
Resource_A
Policy Enforcement Point
....
Preferred Upload
Server
Upload
Server
Web
Server 1
Web
Server 2
Web
Server 3
....
FOAF + SSL
uploads
Resource_A
isFriendOf isFriendOf
Resource
Repository
Authentication &
Authorisation Module
has read access to Resource A
Preferred Upload Server
Resource_A
User_A
uploads
Resource_B
uploads
Resource_A1
Web
Server n
Distributed Resource
Broker
action
friendship level
Publishing
WebServer
Policy Information Point
Provenance
Generator
structured provenance info
message exchange
graphed information
Publisher
Web Application 1
Publishing
Server
Legend
Publishing
Agent
Metadata
Genarator
isOwnerOf
October 20, 2014 @ Riva Del Garda, Italy 13
22. Outline
• Background and Overview
• Objectives
• Proposal
• Test bed
• Related Work
• Conclusions
• Future Work
October 20, 2014 @ Riva Del Garda, Italy 14
23. Management
System
foafserver.*
• WebID
Authentication
• Authorisation
• Identity Provider
• Resource Hosting
• Social Relationships
• Access Policy
Management
Test bed (i)
Wordpress
Instance A
wordpress.foafserver.*
Wordpress
Instance B
test.foafserver.*
• WebID
Authentication
+Authorisation
• Distributed
Resource
Broker
isFriendOf isFriendOf
• WebID
Authentication
• Authorisation
• Distributed
Resource
Broker
User A User B User C
October 20, 2014 @ Riva Del Garda, Italy 15
24. Test bed (ii)
• http://foafserver.dei.isep.ipp.pt
• http://wordpress.foafserver.dei.isep.ipp.pt/
• http://test.foafserver.dei.isep.ipp.pt/
October 20, 2014 @ Riva Del Garda, Italy 16
25. Outline
• Background and Overview
• Objectives
• Proposal
• Test bed
• Related Work
• Conclusions
• Future Work
October 20, 2014 @ Riva Del Garda, Italy 17
26. Related Work
• Priv.ly
– Client side approach
• Client Browser
dependent
– Slow adoption
• Depends solely on
users
– Focus only on text
data
• Presented Approach
– Server side approach
• Apache web server
dependent
– Quick adoption
• Depends on web
domain owners
– Focus on indivisible
resources
October 20, 2014 @ Riva Del Garda, Italy 18
27. Outline
• Background and Overview
• Objectives
• Proposal
• Test bed
• Related Work
• Conclusions
• Future Work
October 20, 2014 @ Riva Del Garda, Italy 19
28. Conclusions
• Publish resources privately
– Cross-domain perspective
– Manage access policies independently of each web
domain
• Resources can be located anywhere
• Different renderings of the same web page,
according to each user access permissions
• Keeps every resource trustworthy
October 20, 2014 @ Riva Del Garda, Italy 20
29. Outline
• Background and Overview
• Objectives
• Proposal
• Test bed
• Related Work
• Conclusions
• Future Work
October 20, 2014 @ Riva Del Garda, Italy 21
30. Future Work
• Address parts of resources
• Public-key encryption per resource, per
identity
• Blacklisting resources or certain user
resources
October 20, 2014 @ Riva Del Garda, Italy 22
31. ?
GECAD – Knowledge Engineering and Decision Support
Research Group (Polytechnic Institute of Porto – Portugal)
http://www.gecad.isep.ipp.pt
Nuno Bettencourt
http://paginas.isep.ipp.pt/nmb
nmb@isep.ipp.pt