2013
DOI: 10.1007/978-3-642-39200-9_44
|View full text |Cite
|
Sign up to set email alerts
|

Customized Views on Profiles in WebID-Based Distributed Social Networks

Abstract: WebID as an extensible and distributed identification approach enables users to globally authenticate themselves, connect to each other and manage their identity data at a self-defined place. Identity data stored in WebID profile documents can be protected from unauthorized access using appropriate access control methods. While existing methods are primarily about securing resources, they lack providing adequate mechanisms for controlling access to specific data within profiles. This paper presents our approac… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2013
2013
2015
2015

Publication Types

Select...
3
2

Relationship

3
2

Authors

Journals

citations
Cited by 6 publications
(7 citation statements)
references
References 1 publication
0
7
0
Order By: Relevance
“…Users should therefore host their WebID profiles only on servers they either own or trust, and protect it from unauthorized access. As a consequence, it seems logical to run an own server hosting the WebID profile or, at least, use a hosted WebID identity provider and management platform, like proposed in [26]. This would compensate the private key secrecy drawback, which does not exist when using the client-side or the hybrid generation mode because the private key is kept safe from unwanted disclosure.…”
Section: Characteristics Of Generation Modesmentioning
confidence: 94%
See 3 more Smart Citations
“…Users should therefore host their WebID profiles only on servers they either own or trust, and protect it from unauthorized access. As a consequence, it seems logical to run an own server hosting the WebID profile or, at least, use a hosted WebID identity provider and management platform, like proposed in [26]. This would compensate the private key secrecy drawback, which does not exist when using the client-side or the hybrid generation mode because the private key is kept safe from unwanted disclosure.…”
Section: Characteristics Of Generation Modesmentioning
confidence: 94%
“…As a WebID identity provider integrating the CaWICC approach, we use Sociddea [26]. With Sociddea, a user can automatically create a new WebID, a WebID profile, and a WebID certificate.…”
Section: Implementation and Integration Of Cawiccmentioning
confidence: 99%
See 2 more Smart Citations
“…They contain an identity owner's personal data described in a machine-readable way using Linked Data. With WebID, users are enabled to globally authenticate themselves, connect to each other, manage their profile data at a self-defined place and specify customized views [10]. In order to accommodate the data for a) within a WebID profile we introduce the following vocabulary: The RDF property vsrcm:experiencedIn connects a foaf:Person with a URI which represents this person's experience in something.…”
Section: The Crawl Approachmentioning
confidence: 99%