Re: Access Control Lists, Policies and Business Models

2012-08-17 Thread Adrian Walker
Hi Kingsley,

To look at the Executable English source code of the SocialAccess1 example
, please visit

www.reengineeringllc.com/demo_agents/SocialAccess1.agent

To run it please:

  1.  Point a Firefox or Chrome browser to
http://www.reengineeringllc.com

  2.  Click on Internet Business Logic

  3.  Click the GO button

  4.  Select *SocialAccess1* from the list in the middle of the page

  5.  Check that the action at the top of the page says
"Choose an agent and Go to its Question menu"

  6.  Click the Go button

  7.  You should now see a Question Menu

  8.  Click on the first sentence

  9.  You should now see a new window with an "Ask" button

  10. Click the Ask button

  11. You should now see an Answer Table

  12. Click on "Go To the Question Menu" hold down the mouse button,
  select "Get an Explanation of the Selected Line" and release the
button

  13. You should now see a step-by-step explanation of how the system
  used the rules and facts in the example to get the answer

  14. Click on "Go to the Answer Page" hold down the mouse button,
  select "Go to View or Change the Agent" and release the button

  15. You should now see the application "program" that you have just
used.
  It's written in Executable English, and it's editable.
  (If you'd like to make changes, please make a copy first, using
the
   menu on the start page, then make changes only to your copy.)

  16. Please use the Help button on each page to see how to navigate
further

  17. The tutorials show how to write and run your own examples.

I hope this helps.  Thanks for further comments and questions.


-- Adrian

Internet Business Logic
A Wiki and SOA Endpoint for Executable Open Vocabulary English Q/A over SQL
and RDF
Online at www.reengineeringllc.com
Shared use is free, and there are no advertisements

Adrian Walker
Reengineering



On Fri, Aug 17, 2012 at 7:14 PM, Kingsley Idehen wrote:

>  On 8/17/12 7:05 PM, Adrian Walker wrote:
>
>
> Here's how your example looks in Executable English.  You can view, run
> and change the example by pointing a browser to www.reengineeringllc.comand 
> choosing SocialAccess1 .
>
> Sorta lost me at "no URL" for the resource in question. Anyway, I went to
> your site's home page (as per above) and couldn't find "SocialAccess1".
>
> Can't you give me a URL for the resource in question?
>
> --
>
> Regards,
>
> Kingsley Idehen   
> Founder & CEO
> OpenLink Software
> Company Web: http://www.openlinksw.com
> Personal Weblog: http://www.openlinksw.com/blog/~kidehen
> Twitter/Identi.ca handle: @kidehen
> Google+ Profile: https://plus.google.com/112399767740508618350/about
> LinkedIn Profile: http://www.linkedin.com/in/kidehen
>
>
>
>


Re: Access Control Lists, Policies and Business Models

2012-08-17 Thread Kingsley Idehen

On 8/17/12 7:05 PM, Adrian Walker wrote:


Here's how your example looks in Executable English.  You can view, 
run and change the example by pointing a browser to 
www.reengineeringllc.com  and 
choosing SocialAccess1 .
Sorta lost me at "no URL" for the resource in question. Anyway, I went 
to your site's home page (as per above) and couldn't find "SocialAccess1".


Can't you give me a URL for the resource in question?

--

Regards,

Kingsley Idehen 
Founder & CEO
OpenLink Software
Company Web: http://www.openlinksw.com
Personal Weblog: http://www.openlinksw.com/blog/~kidehen
Twitter/Identi.ca handle: @kidehen
Google+ Profile: https://plus.google.com/112399767740508618350/about
LinkedIn Profile: http://www.linkedin.com/in/kidehen






smime.p7s
Description: S/MIME Cryptographic Signature


Re: Access Control Lists, Policies and Business Models

2012-08-17 Thread Adrian Walker
Hi Kingsley,

Here's how your example looks in Executable English.  You can view, run and
change the example by pointing a browser to www.reengineeringllc.com and
choosing SocialAccess1 .

|  Kingsley wrote:
|  1. you can only sign up if you are no greater than 1 degree of
separation from TimBL, in a social network
|  2. you can only access a resource if you are known by TimBL
|  3. you can alter (e.g. extend membership) a resource ACL rule if
you claim to know TimBL and he also claims to know you.
|
|  Here's how to specify that in Executable English


a-person and TimBL are at 1 degree of separation in a social network

1. that-person is permitted to sign up


TimBL knows a-person
--
2. that-person is allowed to access a resource


a-person claims to know TimBL
TimBL claims to know that-person

3. that-person can alter a resource ACL rule


a-person and an-other-person are friends in Facebook
---
that-person and that-other-person are at 1 degree of separation in a
social network


an-other-person and a-person are friends in Facebook
---
that-person and that-other-person are at 1 degree of separation in a
social network


this-person and this-other-person are friends in Facebook
==
   TimBL   Kinglsey
   Adrian  Kinglsey


TimBL knows this-person

  Kingsley


this-person claims to know this-other-person

  TimBL Kingsley
  Kingsley  TimBL


| This file is an application written in the language Executable English.
| You can view, run and change it by pointing a browser
| to www.reengineeringllc.com and selecting SocialAccess1.


Thanks for comments.

-- Adrian

Internet Business Logic
A Wiki and SOA Endpoint for Executable Open Vocabulary English Q/A over SQL
and RDF
Online at www.reengineeringllc.com
Shared use is free, and there are no advertisements

Adrian Walker
Reengineering

On Fri, Aug 17, 2012 at 9:14 AM, Kingsley Idehen wrote:

>  On 8/17/12 9:00 AM, Adrian Walker wrote:
>
> Hi Kingsley & All,
>
> Facebook Access Tokens have a fairly fine grain, but for flexibility, and
> for explaining complex access decisions, the reasoning approach in the
> following example may be worth a look:
>
>   www.reengineeringllc.com/demo_agents/Access.agent
>
> As you may see, with this approach one can reason about an organization
> chart, and about which roles can delegate which permissions.
>
>
> Simple example, how do I express the following:
>
> 1. you can only sign up if you are no greater than 1 degree of separation
> from TimBL, in a social network
> 2. you can only access a resource if you are known by TimBL
> 3. you can alter (e.g. extend membership) a resource ACL rule if you claim
> to know TimBL and he also claims to know you.
>
> Those rules are just the elementary level stuff. I can assure you that
> there are no OAuth solutions in the Web 2.0 realm that can handle that, let
> alone the kind of dexterity that Linked Data, WebID, and the SPARQL
> protocol bring to the table re. ACLs and data access policies :-)
>
> Links:
>
> 1. https://plus.google.com/s/acl%20webid%20sparql%20idehen -- posts about
> WebID, ACLs, Linked Data, and SPARQL .
>
> Kingsley
>
>
> Cheers,  -- Adrian
>
> Internet Business Logic
> A Wiki and SOA Endpoint for Executable Open Vocabulary English Q/A over
> SQL and RDF
> Online at www.reengineeringllc.com
> Shared use is free, and there are no advertisements
>
> Adrian Walker
> Reengineering
>
>
> On Thu, Aug 16, 2012 at 7:39 PM, Kingsley Idehen 
> wrote:
>
>> All,
>>
>> Here's Twitter pretty much expressing the inevitable reality re.
>> Web-scale business models:
>> https://dev.twitter.com/blog/changes-coming-to-twitter-api
>>
>> There's no escaping the importance of access control lists and policy
>> based data access.
>>
>> --
>>
>> Regards,
>>
>> Kingsley Idehen
>> Founder & CEO
>> OpenLink Software
>> Company Web: http://www.openlinksw.com
>> Personal Weblog: http://www.openlinksw.com/blog/~kidehen
>> Twitter/Identi.ca handle: @kidehen
>> Google+ Profile: https://plus.google.com/112399767740508618350/about
>> LinkedIn Profile: http://www.linkedin.com/in/kidehen
>>
>>
>>
>>
>>
>>
>
>
> --
>
> Regards,
>
> Kingsley Idehen   
> Founder & CEO
> OpenLink Software
> Company Web: http://www.openlinksw.com
> Personal Weblog: http://www.openlinksw.com/blog/~kidehen
> Twitter/Identi.ca handle: @kidehen
> Google+ Profile: https://plus.google.com/112399767740508618350/about
> LinkedIn Profile: http://www.linkedin.com/in/kidehen
>
>
>
>

Re: Access Control Lists, Policies and Business Models

2012-08-17 Thread Kingsley Idehen

On 8/17/12 9:00 AM, Adrian Walker wrote:

Hi Kingsley & All,

Facebook Access Tokens have a fairly fine grain, but for flexibility, 
and for explaining complex access decisions, the reasoning approach in 
the following example may be worth a look:


www.reengineeringllc.com/demo_agents/Access.agent 



As you may see, with this approach one can reason about an 
organization chart, and about which roles can delegate which permissions.


Simple example, how do I express the following:

1. you can only sign up if you are no greater than 1 degree of 
separation from TimBL, in a social network

2. you can only access a resource if you are known by TimBL
3. you can alter (e.g. extend membership) a resource ACL rule if you 
claim to know TimBL and he also claims to know you.


Those rules are just the elementary level stuff. I can assure you that 
there are no OAuth solutions in the Web 2.0 realm that can handle that, 
let alone the kind of dexterity that Linked Data, WebID, and the SPARQL 
protocol bring to the table re. ACLs and data access policies :-)


Links:

1. https://plus.google.com/s/acl%20webid%20sparql%20idehen -- posts 
about WebID, ACLs, Linked Data, and SPARQL .


Kingsley


Cheers,  -- Adrian

Internet Business Logic
A Wiki and SOA Endpoint for Executable Open Vocabulary English Q/A 
over SQL and RDF

Online at www.reengineeringllc.com 
Shared use is free, and there are no advertisements

Adrian Walker
Reengineering


On Thu, Aug 16, 2012 at 7:39 PM, Kingsley Idehen 
mailto:kide...@openlinksw.com>> wrote:


All,

Here's Twitter pretty much expressing the inevitable reality re.
Web-scale business models:
https://dev.twitter.com/blog/changes-coming-to-twitter-api

There's no escaping the importance of access control lists and
policy based data access.

-- 


Regards,

Kingsley Idehen
Founder & CEO
OpenLink Software
Company Web: http://www.openlinksw.com
Personal Weblog: http://www.openlinksw.com/blog/~kidehen

Twitter/Identi.ca handle: @kidehen
Google+ Profile: https://plus.google.com/112399767740508618350/about
LinkedIn Profile: http://www.linkedin.com/in/kidehen









--

Regards,

Kingsley Idehen 
Founder & CEO
OpenLink Software
Company Web: http://www.openlinksw.com
Personal Weblog: http://www.openlinksw.com/blog/~kidehen
Twitter/Identi.ca handle: @kidehen
Google+ Profile: https://plus.google.com/112399767740508618350/about
LinkedIn Profile: http://www.linkedin.com/in/kidehen






smime.p7s
Description: S/MIME Cryptographic Signature


Re: Access Control Lists, Policies and Business Models

2012-08-17 Thread Adrian Walker
Hi Kingsley & All,

Facebook Access Tokens have a fairly fine grain, but for flexibility, and
for explaining complex access decisions, the reasoning approach in the
following example may be worth a look:

  www.reengineeringllc.com/demo_agents/Access.agent

As you may see, with this approach one can reason about an organization
chart, and about which roles can delegate which permissions.

Cheers,  -- Adrian

Internet Business Logic
A Wiki and SOA Endpoint for Executable Open Vocabulary English Q/A over SQL
and RDF
Online at www.reengineeringllc.com
Shared use is free, and there are no advertisements

Adrian Walker
Reengineering


On Thu, Aug 16, 2012 at 7:39 PM, Kingsley Idehen wrote:

> All,
>
> Here's Twitter pretty much expressing the inevitable reality re. Web-scale
> business models: https://dev.twitter.com/blog/**
> changes-coming-to-twitter-api
>
> There's no escaping the importance of access control lists and policy
> based data access.
>
> --
>
> Regards,
>
> Kingsley Idehen
> Founder & CEO
> OpenLink Software
> Company Web: http://www.openlinksw.com
> Personal Weblog: 
> http://www.openlinksw.com/**blog/~kidehen
> Twitter/Identi.ca handle: @kidehen
> Google+ Profile: 
> https://plus.google.com/**112399767740508618350/about
> LinkedIn Profile: 
> http://www.linkedin.com/in/**kidehen
>
>
>
>
>
>