Hi Claude,

For explanations, I'm on the end of a 6 month job, and during this time a big 
point of my work was a security module for triplestore, based on JENA API.

Seeing the news, that Jena will get a new module for security policy 
management, I want to know how this module will work to prepare migration from 
mine to Jena solution ( preparing migration before the end of the project :') ).


So I asked how your security policy module works in order to prepare the field 
to my workmate (this phrase is probably bad in English, but I don't know how to 
say that...).

At last, let me answer again, can you provide me please some additional 
bibliographic references that are used as base to propose this implementation ? 
Do you used the W3C WAC working group guidance ? Do you used some other 
recommendations/publications ?

I'm really interested !

VAISSE-LESTEVEN Arthur.




________________________________
 De : Claude Warren <[email protected]>
À : [email protected]; Arthur Vaïsse-Lesteven <[email protected]> 
Envoyé le : Lundi 9 septembre 2013 10h31
Objet : Re: Approaching release : Jena 2.11.0
 

Arthur,

The Security module does not provide an implementation of the Security
Evaluator (other than in the example code).  The Security Evaluator
implementation determines how the security policy is encoded.  The reason
for this is that different applications require different security policies.

In the example code the security policy is that only the sender and the
receiver of a message may see the message.  In a different system user may
have a graph that they can update and all graphs are merged to answer
queries.  I have seen other cases where there were interactions with groups
defined in the authentication system to determine if a user could see a
specific triple.  All of these are implementable in the SecurityEvaluator
implementation.

What are your requirements?

Claude


On Mon, Sep 9, 2013 at 8:33 AM, Arthur Vaïsse-Lesteven <
[email protected]> wrote:

> Hi,
>
> concerning the security policy module,
>
>
> >* Security policy module
> >  http://jena.staging.apache.org/documentation/security/
> >   developed by Claude Warren
>
> The description in the link give a quick overview of functionalities
> expected, but do not give information about the way that security policy
> will be encoded, and how the system work behind the scene.
> Do it exists some bibliographic reference about this subject ? External
> sources about this ?
>
> VAISSE-LESTEVEN Arthur.
>
>
>
> ________________________________
>  De : Andy Seaborne <[email protected]>
> À : "[email protected]" <[email protected]>
> Envoyé le : Vendredi 6 septembre 2013 23h54
> Objet : Approaching release : Jena 2.11.0
>
>
> We're working towards a release.
>
> This will be Jena 2.11.0 and Fuseki 1.0.0.
>
> This release includes several new things:
>    (all links are to the staging site)
>
> * New website design
>  http://jena.staging.apache.org/
>    with thanks to Samuel Croset
>
> * Text search
>  http://jena.staging.apache.org/documentation/query/text-query.html
>
> * Spatial search
>  http://jena.staging.apache.org/documentation/query/spatial-query.html
>    developed by Google summer of code student, Ying Jiang.
>
> * SPARQL over JDBC
>  http://jena.staging.apache.org/documentation/jdbc/index.html
>    developed by Rob Vesse
>
> * Security policy module
>  http://jena.staging.apache.org/documentation/security/
>    developed by Claude Warren
>
> In addition, SDB will become part of release process and not a separate
> download.  SDB includes an adapter to SAP HANA contributed by Fergal
> Monaghan.
>
>     Andy
>



-- 
I like: Like Like - The likeliest place on the web<http://like-like.xenei.com>
LinkedIn: http://www.linkedin.com/in/claudewarren

Reply via email to