infrastructure working group. infrastructure vs. services securityauthentication service...
TRANSCRIPT
![Page 1: Infrastructure Working Group. Infrastructure vs. Services SecurityAuthentication Service Infrastructure](https://reader036.vdocuments.net/reader036/viewer/2022081821/5514e0a8550346a80c8b45d1/html5/thumbnails/1.jpg)
Infrastructure Working Group
![Page 2: Infrastructure Working Group. Infrastructure vs. Services SecurityAuthentication Service Infrastructure](https://reader036.vdocuments.net/reader036/viewer/2022081821/5514e0a8550346a80c8b45d1/html5/thumbnails/2.jpg)
Infrastructure vs. Services
Security Authentication Authentication
Service
Infrastructure
![Page 3: Infrastructure Working Group. Infrastructure vs. Services SecurityAuthentication Service Infrastructure](https://reader036.vdocuments.net/reader036/viewer/2022081821/5514e0a8550346a80c8b45d1/html5/thumbnails/3.jpg)
Processing Model Storage, Optimization, Query Distribution
![Page 4: Infrastructure Working Group. Infrastructure vs. Services SecurityAuthentication Service Infrastructure](https://reader036.vdocuments.net/reader036/viewer/2022081821/5514e0a8550346a80c8b45d1/html5/thumbnails/4.jpg)
Security of Web Services
Systems for more exposed: Confidentiality Safety Policy Privacy
![Page 5: Infrastructure Working Group. Infrastructure vs. Services SecurityAuthentication Service Infrastructure](https://reader036.vdocuments.net/reader036/viewer/2022081821/5514e0a8550346a80c8b45d1/html5/thumbnails/5.jpg)
Trust Model of trust
Symbolic trust (proofs, logic) Subsymbolic (ebay, epinions )
![Page 6: Infrastructure Working Group. Infrastructure vs. Services SecurityAuthentication Service Infrastructure](https://reader036.vdocuments.net/reader036/viewer/2022081821/5514e0a8550346a80c8b45d1/html5/thumbnails/6.jpg)
Transformation Syntactic transformations (structure) Semantic transformations (ontology) Transformation services (mediators) Library of transformations (shared
repository) Properties of transformations Merge and articulation
![Page 7: Infrastructure Working Group. Infrastructure vs. Services SecurityAuthentication Service Infrastructure](https://reader036.vdocuments.net/reader036/viewer/2022081821/5514e0a8550346a80c8b45d1/html5/thumbnails/7.jpg)
Localization and Identification Identity of objects (on the web) How to establish object identity?
(different URI for same object) Malicious use of the same URI
different things Link to other naming models (e.g.,
TopicMaps)
![Page 8: Infrastructure Working Group. Infrastructure vs. Services SecurityAuthentication Service Infrastructure](https://reader036.vdocuments.net/reader036/viewer/2022081821/5514e0a8550346a80c8b45d1/html5/thumbnails/8.jpg)
Relationships Databases W3C Agents Web security
![Page 9: Infrastructure Working Group. Infrastructure vs. Services SecurityAuthentication Service Infrastructure](https://reader036.vdocuments.net/reader036/viewer/2022081821/5514e0a8550346a80c8b45d1/html5/thumbnails/9.jpg)
Recommendations Encourage Open Source development of
high quality components (aka Apache) (Technology Transition!) Software Ontologies (maybe?)
Non-commercial organization for development software development (aka Apache.org)
New Approach to Technology Transfer for Funding Organizations!