(12) United States Patent (10) Patent N0.: US 6,839,760 B1 Walters (45) Date of Patent: Jan

Total Page:16

File Type:pdf, Size:1020Kb

(12) United States Patent (10) Patent N0.: US 6,839,760 B1 Walters (45) Date of Patent: Jan US006839760B1 (12) United States Patent (10) Patent N0.: US 6,839,760 B1 Walters (45) Date of Patent: Jan. 4, 2005 (54) METHOD FOR PREVENTING DEEP 6,233,618 B1 * 5/2001 Shannon ................... .. 709/229 LINKING INTO A WEB SITE 6,256,739 B1 * 7/2001 Skopp et a1. .. 709/229 6,539,424 B1 * 3/2003 Dutta ....................... .. 709/219 (75) Inventor: Glen R. Walters, Hollywood, FL (US) * Cited by examiner (73) Assignee: International Business Machines Primary Examiner_Pau1 H, Kang COI‘POI‘HtiOII, Armonk, NY (US) (74) Attorney, Agent, or Firm—Akerman Senter?tt ( * ) Notice: Subject to any disclaimer, the term of this (57) ABSTRACT patent is extended or adjusted under 35 U‘SC' 154(k)) by 661 days‘ Amethod for preventmg access to a document in a server in a computer communications network can include the step of establishing a list of allowable source documents from (21) APP1~NO~309/587’228 which a request to access the document can originate. (22) Filed, Jun_ 2’ 2000 Furthermore, a request for the document can be received from a requesting client. An identity of a source document (51) Int. Cl.7 ...................... .. G06F 15/16; G06F 15/173 of the request can be detected in the request and compared (52) US. Cl. ...................... .. 709/229; 709/217; 709/225 With the list of allowable source documents from which a (58) Field of Search ............................... .. 709/201, 205, request to access the document can originate The request 709/206, 207, 217, 219, 225, 229, 227, can be serviced if the detected identi?er matches an allow 228; 707/104 able source document contained in the list of allowable source documents. Moreover, the request can be denied if (56) References Cited the detected identi?er does not match an allowable source document contained in the list of prohibited source docu U.S. PATENT DOCUMENTS ments 5,819,285 A * 10/1998 Damico et a1. ........ .. 707/104.1 6,199,102 B1 * 3/2001 Cobb ....................... .. 709/206 48 Claims, 8 Drawing Sheets 14A %an U.S. Patent Jan. 4,2005 Sheet 2 of 8 US 6,839,760 B1 f \ —-24 CPU // /_'_"26 RAM ' 32 \\ HDD / 34—""'_\\ DOCUMENTS /'__22 K30 NIC \ J FU@D 2 U.S. Patent Jan. 4,2005 Sheet 3 of 8 US 6,839,760 B1 l SERVER x14 1 0 HYPERTEXT SEESEE??SS DOCUMENT DEEP SERVER UNKING Filii, 3 U.S. Patent Jan. 4,2005 Sheet 5 of 8 US 6,839,760 B1 0/38 RECEIVE r50 REQUEST l REQUEST-HEADER”.EXTRACT - 52 FROM REQUEST REQUEST-HEADER CONTAIN A - ' REFERENT , URL 7 , EXTRACT URL {56 FROM REQUEST-HEADER EXTRACTED URL MATCH E , SERVICEv r62 DENY' REQUEST REQUEST FU@D 5A U.S. Patent Jan. 4,2005 Sheet 6 6f 8 US 6,839,760 B1 5/38 RECEIVE ,--50 REQUEST l EXTRACT 52 REQUEST-HEADER /' FROM REQUEST REQUEST-HEADER CONTAIN A REFERENTu§L V ,I " EXTRACT URL {56 FROM REQUEST-HEADER EXTRACTED URL MATCH /_ v . ‘i r60 SERVICE /'62 DENY REQUEST REQUEST , U.S. Patent Jan. 4,2005 Sheet 7 of 8 US 6,839,760 B1 0/38 RECEIVE REQUEST 1 EXTRACT 52 REQUESFHEADER" FROM REQUEST REQUEST-HEADER CONTAINA REFERENT a U§L ,- ' EXTRACT URL /. 55 FROM REQUEST-HEADER sERcE REQUEST REQUEST FU@U 5C2 U.S. Patent Jan. 4,2005 Sheet 8 of 8 US 6,839,760 B1 9/38 RECEIVE r50 REQUEST EXTRACT 52 REQU EST-HEADER " FROM REQUEST REQUEST-HEADER CONTAIN A " REFERENTU§L ' EXTRACT URL {56 FROM REQUEST-HEADER . v 1’- 6o SERVICE r62 DENY REQUEST REQUEST FUCEBU 5E1) US 6,839,760 B1 1 2 METHOD FOR PREVENTING DEEP broWser for the Web page denoted by the embedded URL. LINKING INTO A WEB SITE In this Way, the displayed. Web page is said to have been hyperlinked to the Web page denoted by the embedded URL. In consequence, a user can cause the Web broWser to retrieve CROSS REFERENCE TO RELATED a Web page not only by explicitly supplying a URL to the APPLICATIONS Web broWser, but also by selecting an embedded URL in a displayed Web page. Not APP licable URLs embedded in a Web page are traditionally referred STATEMENT REGARDING FEDERALLY to as hyperlinks. Hyperlinks are not merely limited to SPONSORED RESEARCH OR DEVELOPMENT 10 referencing Web pages. Rather, hyperlinks can reference several types of objects distributed on the Internet. For Not APP licable example, hyperlinks can refer to graphics ?les, sound ?les, BACKGROUND OF THE INVENTION audio and video recordings, and non-HTML documents, for example portable document format (PDF) documents. 1. Technical Field 15 Hyperlinks are often displayed in the form of text high The present invention relates to network based lighted in bold-face, different colors or by underlining. Still, technologies, and more particularly to a method for prevent the display of hyperlinks are typically not limited in this ing deep linking to a hypertext document in a hypertext regard. Rather, hyperlinks can be displayed in the form of a document distribution server. button or graphic that can be “activated” by the click of a 2. Description of Related Art mouse pointer. The Internet is a set of globally interconnected computers A hyperlink can refer to almost any other Web page in a through Which multiple users access data and programs from Web server on any other domain, including different Web around the World. As an informational sharing mechanism, pages stored in the same Web server or in an entirely it comprises a netWork of netWorks for interconnecting a different Web server. Signi?cantly, Web pages linked by 25 plurality of server computers (servers) and a plurality of hyperlinks, in of themselves, can include hyperlinks to yet client computers (clients). The Internet permits a Wide more Web pages thereby interconnecting almost every docu variety of communication and informational retrieval ment posted on the Internet With almost every other docu mechanisms, including electronic mail (e-mail), File Trans ment. Thus, by activating different hypertext links to a given fer Protocol (FTP), USENET, and the World Wide Web Web page, different readers can arrive at the same page by (Web). Notably, the Web permits users to retrieve and vieW a plurality of routes, each having vieWed different Web hypertext document containing not only text, but also pages along the Way. For example, a user can access any pictures, sound, animated images, and video-clips. given Web page on the Web by directly typing the corre Moreover, the Web permits user to interact With retrieved sponding URL into a broWser. Alternatively, the same user hypertext documents. can access the same Web page by folloWing a series of 35 The Web primarily consists of Web servers and Web hyperlinks from other Web pages leading thereto. broWsers. Whereas a Web server hosts hypertext documents, Web pages often are grouped in a Web site Wherein the knoWn as Web pages, by storing the Web pages and trans Web site can re?ect an overall theme. For example, a Web mitting those Web pages on command, a Web broWser site can include a car rental Web site in Which vieWers of Web pages in the Web site can survey available rental cars resides on a client computer, and both supplies requests to 40 Web servers for Web pages and displays the retrieved Web and consummate a rental car transaction. In another pages in a user interface. Each Web page stored in a Web example, a Web site can include a corporate marketing Web server has associated thereWith a Uniform Resource Locator site in Which vieWers of Web pages in the Web site can (URL) identifying both a particular domain on the Internet survey various corporate products, location and contact information and press releases relating to the company. As in Which the Web server can be located and a location in the 45 Web server Where the Web page is stored. The URL permits such, typically, Web sites have a preferred entry point any given Web page to be distinguished from all other Web referred to as a home page from Which a user can access pages. other Web pages in the Web site. In operation, a Web broWser can accept as input a URL of “Deep links” are hyperlinks Which can defeat a Web site’s a requested Web page Which can be provided by a user intended method of navigation. For example, many Web through any suitable means, but typically by keyboard or sites rely upon the home page as an intended initial entry hyperlink. The Web broWser can receive the URL and point to the Web pages Which comprise the site. The home transmit a request for the Web page to a Web server residing page can display contextually appropriate information, for at a domain speci?ed in the URL. Upon receiving the example a summary of the Web site, a table of contents, request, the Web server can identify in the URL the location 55 advertisements or Written disclaimers. Deep links are hyper of the requested Web page. If the requested Web page resides links specifying a Web page contained in a Web site Which at the location speci?ed in the URL, the Web server can normally can be accessed only by ?rst accessing the home serve the requested Web page to the requesting client. page of the Web site. A user performing “deep linking” can Subsequently, the Web broWser residing in the client can bypass the home page and effectively the display of the display the requested Web page. contextually appropriate information merely by specifying A Web page as described in the foregoing speci?cation the URL of the interior Web page.
Recommended publications
  • NODAL: Structure and Reference for Web Documents
    NODAL: Structure and Reference for Web Documents Lee Iverson1 University of British Columbia Dept. of ECE, 2356 Main Mall, Vancouver, BC Canada V6T 1Z4 [email protected], http://www.ece.ubc.ca/~leei Abstract. The Web has amply demonstrated the benefits of simple publishing and reference but these benefits are largely limited to the granularity of individual files. The potential for greater benefits that may derive from sub-document reference is currently being explored, but this exploration is limited by the fact that such references can only be used with a small portion of the Web’s content (i.e. that encoded in XML). We have developed a system, the Network-Oriented Docu- ment Abstraction Language (NODAL), that is designed to provide such a sub-document reference system for documents encoded in any format. Moreover, the data model can be mapped over database schemas and thus provide a common reference and access environment for structured, semi-structured and unstructured data. Finally, we outline a number of ways that this system can be extended to allow for composition, synchro- nization and reuse of documents and databases in this form and can thus form a hypertextual foundation for interactive application development without inhibiting interoperability with existing systems. 1 Overview The Web has created an unprecedented ability to publish and distribute docu- ments and other data and to augment this content with hypertextual references. However, the granularity of these references is, for the most part, limited to the file level. The combination of a need to reuse and/or quote sources smaller than a whole document (e.g.
    [Show full text]
  • Mark Tremayne University of Texas at Austin . Applying Network Theory To
    Mark Tremayne University of Texas at Austin . Applying Network Theory to the Use of External Links on News Web Sites Chapter 3 of the book Internet Newspapers: Making of a Mainstream Medium Lawrence Erlbaum Associates August 2004 Abstract This study tested emerging network theory against a sub-sample of the Web: stories on national news Web sites. It found that news Web stories contain links to external sites less frequently than just a few years ago. As each organization builds up its own archive of Web content, this material appears to be favored over content that is off- site. Key words: hypertext, news flow, Web growth, network, network theory, random graph theory, power law, power law distribution, power curve, Pareto’s law, preferred attachment, link, hyperlink, external link, link proportion, hub, context, preferred attachment, blog, bloggers, news topic, New York Times, Washington Post, USA Today, US News and World Report, Time, ABC, CBS, CNN, FOX News, MSNBC. Applying Network Theory to the Use of External Links on News Web Sites Compared to traditional media, the Web allows journalists greater flexibility in constructing sophisticated stories, stories that can be consumed in different ways by unique subsets of readers. Hypertext is allowing for stories that are less linear and more Use of External Links on News Web Sites 1 segmented than was possible before. As a result, news stories on the Web are more heavily linked every year (Tremayne, 2004b). The unique features of the Web were identified a decade ago as potential difference-makers in stimulating public dialogue of important issues (Rheingold, 1994; Rosen, 1995).
    [Show full text]
  • Aladdin: Automating Release of Deep-Link Apis on Android
    Aladdin: Automating Release of Deep-Link APIs on Android Yun Ma12, Ziniu Hu1, Yunxin Liu3, Tao Xie4, Xuanzhe Liu1∗ 1Key Lab of High-Confidence Software Technology, MoE (Peking University) 2Tsinghua University 3Microsoft Research 4University of Illinois at Urbana-Champaign {mayun,bull}@pku.edu.cn,[email protected],[email protected],[email protected] ABSTRACT fundamental role on the Web in various aspects, e.g., enabling users Compared to the Web where each web page has a global URL for ex- to navigate among web pages and add bookmarks to interested ternal access, a specific “page” inside a mobile app cannot be easily contents, and making search engines capable of crawling the web accessed unless the user performs several steps from the landing contents [18]. page of this app. Recently, the concept of “deep link” is expected to In the current era of mobile computing, mobile applications be a promising solution and has been advocated by major service (a.k.a., apps) have become the dominant entrance to access the providers to enable targeting and opening a specific page of an app Internet [11, 41]. However, compared to the Web, the support for externally with an accessible uniform resource identifier. In this “hyperlinks” is inherently missing in mobile apps so that users have paper, we present a large-scale empirical study to investigate how to perform tedious and trivial actions to access a specific in-app deep links are really adopted, over 25,000 Android apps. To our content. Other advantages from traditional Web hyperlinks are surprise, we find that deep links have quite low coverage, e.g., more naturally missing as well.
    [Show full text]
  • Liability for Providing Hyperlinks to Copyright-Infringing Content: International and Comparative Law Perspectives
    Columbia Law School Scholarship Archive Faculty Scholarship Faculty Publications 2018 Liability for Providing Hyperlinks to Copyright-Infringing Content: International and Comparative Law Perspectives Jane C. Ginsburg Columbia Law School, [email protected] Luke Ali Budiardjo Columbia Law School, [email protected] Follow this and additional works at: https://scholarship.law.columbia.edu/faculty_scholarship Part of the Comparative and Foreign Law Commons, Intellectual Property Law Commons, International Law Commons, Internet Law Commons, and the Science and Technology Law Commons Recommended Citation Jane C. Ginsburg & Luke A. Budiardjo, Liability for Providing Hyperlinks to Copyright-Infringing Content: International and Comparative Law Perspectives, 41 COLUM. J. L. & ARTS 153 (2018). Available at: https://scholarship.law.columbia.edu/faculty_scholarship/2063 This Article is brought to you for free and open access by the Faculty Publications at Scholarship Archive. It has been accepted for inclusion in Faculty Scholarship by an authorized administrator of Scholarship Archive. For more information, please contact [email protected]. GINSBURG AND BUDIARDJO, LIABILITY FOR HYPERLINKS TO INFRINGING CONTENT, 41 COLUM. J.L. & ARTS 153 (2018) Liability for Providing Hyperlinks to Copyright-Infringing Content: International and Comparative Law Perspectives Jane C. Ginsburg* and Luke Ali Budiardjo** ABSTRACT Hyperlinking, at once an essential means of navigating the Internet, but also a frequent means to enable infringement of copyright, challenges courts to articulate the legal norms that underpin domestic and international copyright law, in order to ensure effective enforcement of exclusive rights on the one hand, while preserving open communication on the Internet on the other. Several recent cases, primarily in the European Union, demonstrate the difficulties of enforcing the right of communication to the public (or, in U.S.
    [Show full text]
  • Measuring the Insecurity of Mobile Deep Links of Android
    Measuring the Insecurity of Mobile Deep Links of Android Fang Liu, Chun Wang, Andres Pico, Danfeng Yao, Gang Wang Department of Computer Science, Virginia Tech ffbeyond, wchun, andres, danfeng, [email protected] Abstract launch apps from websites with preloaded context, which becomes instrumental to many key user experiences. For Mobile deep links are URIs that point to specific loca- instance, from a restaurant’s home page, users can tap a tions within apps, which are instrumental to web-to-app hyperlink to launch the phone app and call the restaurant, communications. Existing “scheme URLs” are known to or launch Google Maps for navigation. Recently, users have hijacking vulnerabilities where one app can freely can even search in-app content with a web-based search register another app’s schemes to hijack the communi- engine (e.g., Google) and directly launch the target app cation. Recently, Android introduced two new meth- by clicking the search result [5]. ods “App links” and “Intent URLs” which were designed with security features, to replace scheme URLs. While The key enabler of web-to-mobile communication is the new mechanisms are secure in theory, little is known mobile deep links. Like web URLs, mobile deep links about how effective they are in practice. are universal resource identifiers (URI) for content and In this paper, we conduct the first empirical measure- functions within apps [49]. The most widely used deep ment on various mobile deep links across apps and web- link is scheme URL supported by both Android [7] and sites. Our analysis is based on the deep links extracted iOS [3] since 2008.
    [Show full text]
  • CDISC Library
    CDISC Library Sam Hume, Anthony Chow, Mike Hamidi Data Science, CDISC 21-Feb-2019 Introducing CDISC Library The metadata repository formerly known as CDISC SHARE 2.0 CDISC Library Launch • Formerly known as SHARE 2.0 • Built on a new technology stack based on a linked data model • Includes an expanded API • Includes new content not previously available • Broader membership access to the API • Launch includes lots of supporting activities 2/22/2019 3 Why Would a Standards Development Organization Use an MDR? • SDOs generally release “content standards” publications as PDF Challenges with PDFs that Interfere with Electronic Adoption Scale Parsing Extraction Possible Cost Issues Errors Metadata Loss • Uniquely, CDISC provides electronic standards to support your business processes 4 Why Use the CDISC Library? • Single, trusted, authoritative source for CDISC standards metadata • Model-based standards metadata improves quality • Support for an end-to-end standards model Quality • Maintains version traceability • API simplifies standards-based automation • New content published regularly Change Control • Only source for certain CDISC metadata • Aids in realizing full value from standards investment End-to-end Automation Expanding API Access • All members will have access to the CDISC Library API • Bandwidth and number of accounts allocated vary by membership level • Developers will have access to the CDISC Library API • Developers for pre-commercial use • Open source platforms and others for non-commercial use • Non-members can access the CDISC Library API through software tools provided by a vendor • Updating the EULA (terms of use) to make it simpler for vendors to embed the API in their applications 2/22/2019 6 CDISC Library Deployment • Early sneak peek release to Platinum members on Feb.
    [Show full text]
  • Link Liability: the Argument for Inline Links and Frames As Infringements of the Copyright Display Right
    Fordham Law Review Volume 68 Issue 3 Article 13 1999 Link Liability: The Argument for Inline Links and Frames As Infringements of the Copyright Display Right Allison Roarty Follow this and additional works at: https://ir.lawnet.fordham.edu/flr Part of the Law Commons Recommended Citation Allison Roarty, Link Liability: The Argument for Inline Links and Frames As Infringements of the Copyright Display Right, 68 Fordham L. Rev. 1011 (1999). Available at: https://ir.lawnet.fordham.edu/flr/vol68/iss3/13 This Article is brought to you for free and open access by FLASH: The Fordham Law Archive of Scholarship and History. It has been accepted for inclusion in Fordham Law Review by an authorized editor of FLASH: The Fordham Law Archive of Scholarship and History. For more information, please contact [email protected]. Link Liability: The Argument for Inline Links and Frames As Infringements of the Copyright Display Right Cover Page Footnote The author wishes to thank her parents, Audrey and James, her sister, Stacey, and brother, Richard, for their understanding and encouragement, and Professor Hugh Hansen for his valuable insights and support in writing this Note. This article is available in Fordham Law Review: https://ir.lawnet.fordham.edu/flr/vol68/iss3/13 LINK LIABILITY: THE ARGUMENT FOR INLINE LINKS AND FRAMES AS INFRINGEMENTS OF THE COPYRIGHT DISPLAY RIGHT Allison Roarty" INTRODUCTION As the Internet continues to expand exponentially, so do the corresponding legal issues. While this vast network was intended to be used to share information, the influx of companies using the Internet, and particularly the World Wide Web ("Web"), for marketing or commerce have blurred the lines between shared information and protected information.
    [Show full text]
  • Deep Linking in Mobile Unity Game
    Deep linking in mobile Unity game Jeremias Kuitunen Bachelor’s thesis December 2017 School of Technology, Communication and Transport Degree Programme in Media Engineering Description Author(s) Type of publication Date Kuitunen, Jeremias Bachelor’s thesis 10.12.2017 Language of publication: English Number of pages Permission for web publi- 51 cation: x Title of publication Deep linking in mobile Unity game Degree programme Media Engineering Supervisor(s) Manninen, Pasi Assigned by Traplight Ltd. Abstract The thesis was assigned by Traplight ltd., a mobile game development company that fo- cuses on creating high Quality user-generated content games (UGC). Traplight strives for being the industry leader in free mobile games where users generate the game content. The goal of the thesis was to develop a deep linking solution and deploy it in a game called Big Bang Racing prior to its launch in July 2016. In Big Bang Racing, deep linking capabilities allow users to share user-created levels with web URLs outside the game boundaries in- cluding social media platforms. Opening a deep link takes the user to the shared content or to a platform specific app store page in case the application was not preinstalled. A deep linking plugin was created for Unity game engine, and it supports iOS and Android platforms. The Unity plugin consists of procedures that enable communication between platform native code and Unity code. This allows presenting deep linked content in the game and sharing of deep links with system native sharing dialog. Providing deep link metadata for web crawlers allows rich and user friendly posts to social media channels.
    [Show full text]
  • The Application of Intellectual Property Law to Distance Education
    Vanderbilt Journal of Entertainment & Technology Law Volume 4 Issue 2 Issue 2 - 2002 Article 1 2002 The Electronic Jungle: The Application of Intellectual Property Law to Distance Education Jon Garon Follow this and additional works at: https://scholarship.law.vanderbilt.edu/jetlaw Part of the Intellectual Property Law Commons Recommended Citation Jon Garon, The Electronic Jungle: The Application of Intellectual Property Law to Distance Education, 4 Vanderbilt Journal of Entertainment and Technology Law 146 (2020) Available at: https://scholarship.law.vanderbilt.edu/jetlaw/vol4/iss2/1 This Article is brought to you for free and open access by Scholarship@Vanderbilt Law. It has been accepted for inclusion in Vanderbilt Journal of Entertainment & Technology Law by an authorized editor of Scholarship@Vanderbilt Law. For more information, please contact [email protected]. k a~a >~at <Tfl ~ I <a a ka ) a> a <a {a a a <a '<a a a' a ~< aj<aa a a" a a<a'><'< a a a )aX ~< a' a 'a a <a a a' a KA<a <a a K a a' a' <1 a I <a <'a a' a a a 'a <a a<a <a 'aaI' '<a <a a '<aa«'a <a a> a 'a' a'a<a a a<a 'a" <a a<a~~a~a~aa~ <a~a<a~aa'aa'a'K. a a> a GARON 21 Much of the growth in the distance learning market find courses online. As of yet, no portal for online will come from corporate training.14 University-based education presently exists that does much to serve the education will undoubtedly be more successful for distance learning community.
    [Show full text]
  • Protecting Against Liability for On-Line Practices in External E-Business By
    Protecting Against Liability for On-line Practices in External E-Business by M. Jean Connolly, Esq.1 One of the greatest strengths of the Internet is its interactivity between users and information as well as between one Web site and other Web sites. Any entity with an Internet presence can be exposed to liability for its data collection and other online practices relating to interactivity. Such potentially liable practices are related to Internet and computer technology which has emerged in the past few years, such as linking and framing; spiders, web crawlers and bots. and metatags. Additionally, the application of such technology to the World Wide Web has made it possible to gather and transmit data, especially data in which a third party possesses proprietary interests, more easily than ever before. As a result, there is now a much greater potential, whether intentional or inadvertent, for infringing such interests of third parties. The impact of such technologies will be discussed as well as how to avoid the liability associated with them. One caveat must be noted: a great deal of the law in this area is in the formative stages, and the rights of interested parties will be argued in and defined by the courts. A recent court decision summarizes this state of the law aptly: “This is a classic illustration of a new kind of litigation for which nothing in past experience comes even close to preparing trial judges and the advocates appearing before them.”2 This article will also detail how the law appears to be developing with respect to the various implications of using such technology and in light of such developments, I will 1 M.
    [Show full text]
  • A Linked Data Model and Hypermedia API for CDISC SHARE 2.0
    PhUSE US Connect 2019 Paper TT10 A Linked Data Model and Hypermedia API for CDISC SHARE 2.0 Sam Hume, CDISC, State College, PA, USA Frederik Malfait, Nurocor, Wolfenschiessen, Switzerland Julie Chason, CDISC, Exton, PA, USA ABSTRACT The CDISC SHARE Metadata Repository supports the curation and availability of the CDISC standards using a variety of media types and formats. In this paper we explain the architecture of SHARE 2.0 and its implementation of linked data principles. The SHARE 2.0 system supports a broader set of standards and content types, now including Questionnaires, Rating, Scales (QRS), value subsets, draft domains, and rules in addition to the full scope of foundational standards and controlled terminology. The SHARE 2.0 Model is based on the ISO 11179 standard for Metadata Registries (MDR) and implemented using the W3C Resource Description Framework (RDF). There is a natural fit between web-based HTTP requests for resources and information stored as resources in RDF. We show how RDF resources can be mapped and exposed through a REST based web API and how the graph-based nature of RDF translates into hypermedia capabilities of the SHARE 2.0 API. SHARE 2.0 OBJECTIVES AND SCOPE INTRODUCTION This paper introduces the technical foundations of the CDISC SHARE 2.0 metadata repository (MDR). CDISC plans to release SHARE 2.0 during the first quarter of 2019. The SHARE 2.0 release marks a significant upgrade over the first version featuring a new technology stack, an expanded model, and new content. SHARE 2.0 makes the CDISC data standards metadata available as a linked data model accessed via a hypermedia API.
    [Show full text]
  • Architecture of the World Wide Web
    Architecture of the World Wide Web http://www.w3.org/2001/tag/2003/webarch-20030926/ Architecture of the World Wide Web Editor’s Draft 26 September 2003 This version: http://www.w3.org/2001/tag/2003/webarch-20030926/ Latest editor's draft: http://www.w3.org/2001/tag/webarch/ Previous version: http://www.w3.org/2001/tag/2003/webarch-20030918/ Latest version: http://www.w3.org/TR/webarch/ Editor: Ian Jacobs, W3C Authors: See acknowledgments. ® Copyright © 2002-2003 W3C (MIT, ERCIM, Keio), All Rights Reserved. W3C liability, trademark, document use and software licensing rules apply. Your interactions with this site are in accordance with our public and Member privacy statements. Abstract The World Wide Web is an information space. This space consists of information objects collectively called "resources." Uniform Resource Identifiers (URIs) are used to identify these resources; URIs have global scope within this space. The information space is a network of Web resources that are interconnected via URIs and descriptive metadata. This information space is the basis of, and is shared by, a number of information systems. These systems include the "traditional" hyperlink Web (where users interact with resources via links) as well as emerging Semantic Web and Web Services technologies. Within each of these systems, agents (including browsers, servers, spiders, and proxies) provide, retrieve, create, analyze, or reason about resources. They do so via representations of resource state, which are constructed from data formats such as HTML, and descriptive metadata. Web architecture encompasses both protocols that define the information space by way of identification and representation, and protocols that define the interaction of agents within an information system making use of of the space.
    [Show full text]