-
Notifications
You must be signed in to change notification settings - Fork 103
Security/provenance issue with Extended Profile #189
Comments
Any resource that a profile links to is subject being an issue for a consumer. Applications should take that as a given, and I think to some extent they do re AAA any way. A safer perspective may be to let applications simply decide for themselves what they do with data they encounter. Agreement can happen on one layer higher depending on use case and the data models or other protocols involved. |
Since the users control their own links to other profiles I'm not sure this is really a big deal. The databrowser (or whatever experience users end up with to manage their profiles) must have a very easy/clear way to manage these links though, in case one of their other profiles does go down or is compromised somehow. I suppose the fact that the spec says apps MUST access them is what makes this a bigger issue than any other link in the user's profile though. |
Exactly, that is the big deal here. rdfs:seeAlso MUST NOT mean any kind of trust or endorsement. Also, owl:sameAs SHOULD NOT imply that all triples in the other documents are to be treated on an equal level. Apart from that, the notion of "main" profile is flawed, but that's something else. |
What is needed is a general logic of how one merges linked data information. I have been working on this as part of my PhD on co-operating.systems (another angle on Solid) at the University of Southampton in Web Science, Cyber Security and Intelligent Agents groups. The second year report which details this was accepted just a few weeks ago. Perhaps there is a way to turn that into an Open Phd, so that what I am working on can be useful before I finish, as that risks being delayed because I am have used up all my own savings on this research (the UK did not pay my research because I did not live in the country for the required 3 preceeding years, and we got #Brexit too). I am not sure what the rules for sharing pre PhD documents are. My first task was to find the logics that are relevant to this question. The remaining task to come was to build up a set of use cases and see how these could applied to linked data reasoning on the web. The logic to consider here is the work that started in 1991 by Abadi, Burrows et al [1], which turns out to be a modal logic. The tricky thing here is that some semantic web founders state that there is no modal logic in RDF. But there need not be, we can add it as an orthogonal dimension. According to Robert Brandom, in "Making it Explicit" [2] and later work, Brandom argues that modal logic is an explicitation of what is already present in first order logic. Another way to look at it is to see that the semweb is logic+document acts, where document acts are the equivalent of speech acts in everyday language as made famous by Austin and developed by Searle. Speech acts are formalised by Abadi in the "S says P" relation. 17 years later he shows that this is an Indexed Strong Monad [3] - indexed on the subject - which can then be placed in a lattice to allow trust reasoning. More practically, That gives us some idea as to when we can clearly in access control situations flatten things. It should be quite easy for programmers more and more of which are now exposed to Functional Programming to understand. Developing this could allow us even to extend access control to incorporate descriptions of group using OWL, though that would need a lot more thinking through, and especially would require us to have what I think of as streaming OWL reasoners - ones that can give us partial results so we can draw our UI before we have the full information. (cwm does a bit of that, by counting iterations). By the way this monadic/modal way of looking at the problem also allows us to reason withing the brackets (using RDF inferencing or OWL) since a monad is an applicative, ie a structure which comes with the following function [1] "A calculus for access control in distributed systems." |
The spec draft currently states:
This is problematic, because people often link to old WebIDs, which they might not control anymore. So mandating that these triples MUST be loaded is troublesome. Especially for
seeAlso
, to which no semantics are attached.The text was updated successfully, but these errors were encountered: