Hi Claude, For explanations, I'm on the end of a 6 month job, and during this time a big point of my work was a security module for triplestore, based on JENA API.
Seeing the news, that Jena will get a new module for security policy management, I want to know how this module will work to prepare migration from mine to Jena solution ( preparing migration before the end of the project :') ). So I asked how your security policy module works in order to prepare the field to my workmate (this phrase is probably bad in English, but I don't know how to say that...). At last, let me answer again, can you provide me please some additional bibliographic references that are used as base to propose this implementation ? Do you used the W3C WAC working group guidance ? Do you used some other recommendations/publications ? I'm really interested ! VAISSE-LESTEVEN Arthur. ________________________________ De : Claude Warren <[email protected]> À : [email protected]; Arthur Vaïsse-Lesteven <[email protected]> Envoyé le : Lundi 9 septembre 2013 10h31 Objet : Re: Approaching release : Jena 2.11.0 Arthur, The Security module does not provide an implementation of the Security Evaluator (other than in the example code). The Security Evaluator implementation determines how the security policy is encoded. The reason for this is that different applications require different security policies. In the example code the security policy is that only the sender and the receiver of a message may see the message. In a different system user may have a graph that they can update and all graphs are merged to answer queries. I have seen other cases where there were interactions with groups defined in the authentication system to determine if a user could see a specific triple. All of these are implementable in the SecurityEvaluator implementation. What are your requirements? Claude On Mon, Sep 9, 2013 at 8:33 AM, Arthur Vaïsse-Lesteven < [email protected]> wrote: > Hi, > > concerning the security policy module, > > > >* Security policy module > > http://jena.staging.apache.org/documentation/security/ > > developed by Claude Warren > > The description in the link give a quick overview of functionalities > expected, but do not give information about the way that security policy > will be encoded, and how the system work behind the scene. > Do it exists some bibliographic reference about this subject ? External > sources about this ? > > VAISSE-LESTEVEN Arthur. > > > > ________________________________ > De : Andy Seaborne <[email protected]> > À : "[email protected]" <[email protected]> > Envoyé le : Vendredi 6 septembre 2013 23h54 > Objet : Approaching release : Jena 2.11.0 > > > We're working towards a release. > > This will be Jena 2.11.0 and Fuseki 1.0.0. > > This release includes several new things: > (all links are to the staging site) > > * New website design > http://jena.staging.apache.org/ > with thanks to Samuel Croset > > * Text search > http://jena.staging.apache.org/documentation/query/text-query.html > > * Spatial search > http://jena.staging.apache.org/documentation/query/spatial-query.html > developed by Google summer of code student, Ying Jiang. > > * SPARQL over JDBC > http://jena.staging.apache.org/documentation/jdbc/index.html > developed by Rob Vesse > > * Security policy module > http://jena.staging.apache.org/documentation/security/ > developed by Claude Warren > > In addition, SDB will become part of release process and not a separate > download. SDB includes an adapter to SAP HANA contributed by Fergal > Monaghan. > > Andy > -- I like: Like Like - The likeliest place on the web<http://like-like.xenei.com> LinkedIn: http://www.linkedin.com/in/claudewarren
