Skip to content

Latest commit

 

History

History
13 lines (12 loc) · 1.56 KB

README.md

File metadata and controls

13 lines (12 loc) · 1.56 KB

In this section, we explore important use cases of access control for Solid and the type of reasoning needed on the client and the server for those to succeed. The idea is to see if one can think of intuitive reasoning strategies for individual cases and if there is a way to generalize those.

  • Basic looks at the basic authentication use cases using a public key and then extending it to a WebId to make it easier to maintain access control rules
  • Foaf explores the important social networking use cases that launched interest in this whole enterprise. We look at a simple friend network, followed by a friend of a friend of a friend. This last one brings up an unavoidable scale problem: assume each person has 100 non-overlapping friends, we would end up creating a social network 100100100=1 000 000=1 million people large
  • Client Auth looks at the problem of limiting Apps. We distinguish two types of limitations from the client and server sides. We show how these maps to says logic.
  • Delegation looks at Delegation use cases
  • Deepak Garg's Ph.D. Deepak Garg's 2009 Ph.D. built a detailed extension of the says logic for access control purposes with full proof-procedures. We want to see how far we can adapt those to the Web.
  • Verifiable Credentials looks at how one can use W3C Verifiable Credentials standards for access control
  • WoN.md The certificate-based examples often require a Web of Nations infrastructure. We look at examples of these.