Book of Proceedings

Total Page:16

File Type:pdf, Size:1020Kb

Book of Proceedings Book of Proceedings www.internetidentityworkshop.com Compiled by HEIDI NOBANTU SAUL, LISA HORWITCH AND EMMA GROSS Notes in this book can also be found online at http://iiw.idcommons.net/IIW_18_Notes May 6 -8, 2014 Computer History Museum Mountain View, CA IIW founded by Kaliya Hamlin, Phil Windley and Doc Searls Co-produced by Kaliya Hamlin, Phil Windley and Heidi Nobantu Saul Contents About IIW ʹ the Internet Identity Workshop ................................................................................... 3 Agenda Creation ............................................................................................................................... 4 IIW 18 Session Topics ....................................................................................................................... 5 Tuesday May 7.................................................................................................................................. 9 Respect Network Launch .............................................................................................................. 9 /ŶĚŝĞŽdž͗>Ğƚ͛ƐƌŝŶŐŽƵƌĂƚĂ,ŽŵĞ͊ ........................................................................................ 9 Improving the Mobile Federation Sign-In Experience ............................................................... 13 Phishing Blend Authentication & Authorization ........................................................................ 15 JOSE Can you see: technical overview of JWT and its JOSE underpinnings, which are poised to be the next generation identity token, and a look at using one open source implementation 16 ME Depot: Serving Billions ........................................................................................................ 16 Intentions vs Identity .................................................................................................................. 18 IoT: Internet of Things Unintended & Unexpected Consequences ........................................... 19 Customer Support for Personal Data Stores .............................................................................. 20 An Introduction to the INDIEWEB .............................................................................................. 21 ͞^/D͟EĞdžƚ^ƚĞƉƐʹ Planning Ahead: x Domain ID Management ........................................... 26 New OAuth2-WG: Multi-Party Federation! ............................................................................... 27 Open ID Connect Interop Testing Details ................................................................................... 28 Engaging End Users: How Do We Get Consumers to Participate in Identity Discussion? ......... 29 Ethical Data Handling: What is it? What are the obstacles? What is success?......................... 30 Platform Deep-Dive of QREDO ʹ /ͻWZ/sͻhd, ....................................................................... 30 How to Join the IndieWeb .......................................................................................................... 32 ^ŝůŝĐŽŶsĂůůĞLJ͞Ƶůƚure ŽĨzŽƵƚŚ͗͟džƉĞƌŝĞŶĐĞƐ͖>ĞƐƐŽŶƐΘĨĨĞĐƚƐ͖WƌĞĚŝĐŽƚƌƐΘ^ƚĞƉƐ ............ 34 Digital Traits for Strong Authentication ..................................................................................... 34 Open ID Connect: Session Management / Logout Discussion (Part 1 & Part 2) ....................... 35 Identify Theft: How do we preserve & protect identity (medical, financial, social) in era of big data ʹ ǁŚĞƌĞĂůŐŽƌŝƚŚŵƐƚŽĚĞƚĞĐƚĨƌĂƵĚͬƐƵƌǀĞŝůůĂŶĐĞĂƌĞŶ͛ƚǁŽƌŬŝŶŐ͘ .................................... 37 ĂŶ͛ƚĞǀŝů͊ ............................................................................................................................... 38 NSTIC: Update from NIST & Roundtable .................................................................................... 39 Fuse Architecture Picos & Connected Cars ................................................................................ 43 IndieAuth: Turn Your Personal Domain Into An OAuth Provider .............................................. 43 IIW 18 Page 1 Personal Sovereign Design ......................................................................................................... 46 Doxing as Vigilante Justice ......................................................................................................... 48 Respect Network & XDI .............................................................................................................. 48 Aging & Caregivers & Post Death Identity Management IoT Assisted Living ............................ 52 Wednesday May 8 .......................................................................................................................... 54 OAuth Security: Proof of Possession ......................................................................................... 54 ͞tĞƌĞdŚĞ>ĂƐƚ'ĞŶĞƌĂƚŝŽŶŽĨ&ƌĞĞWĞŽƉůĞ͟ .......................................................................... 56 VRM Adoptions Case Study: MYDEX cic (How we tell it; where we are; what Mydex looks like including: peek at UK IDAP) ........................................................................................................ 59 HTTPSY: Leave the Certificate Authority Behind. ...................................................................... 61 Data Inequality / Income Inequality ........................................................................................... 62 Channel Binding for Open ID Connect ....................................................................................... 64 Ad-hoc UMA Interop Testing Session ......................................................................................... 67 Mozilla Listens to IIW ................................................................................................................. 68 Real Estate Use Cases: Problems, Solutions, Opportunities ...................................................... 71 Shopping for an Identity Providers: What do I need to know before I put my identity in your provider? .................................................................................................................................... 74 Self ID: What technical problems or incentives do we need to make hosting your own IDP really a viable thing? .................................................................................................................. 75 Mobile Connect: What would you as an Rp/IoP attribute broker want from the carriers? ...... 78 Clarify & Learn About: Web Payments & Identity ..................................................................... 79 New Book: Extreme Relevancy .................................................................................................. 80 /ŽdĂŶĚKƉĞŶ^ƚĂŶĚĂƌĚƐ;KƵƚŚϮ͕hD͙Ϳ ................................................................................ 81 Timbl on UI offered by WebID: Getting WC3 People to come to IIW19 ................................... 83 OAuth SASL (OAuth for Non-Web Apps, ep.IMAP) .................................................................... 83 Be Ready for the Authpocalypse: Lightweight/Dynamic Client Registration for ImAP/SASL ... 86 10 Things you can do with a Freedom Box ................................................................................ 88 OIDC & SAML2: Dealing w/the case when the intended audience is not the relying party ...... 90 Lost Dog! Usercentric ID Management ..................................................................................... 91 Thursday May 9 .............................................................................................................................. 93 >Ğƚ͛ƐƌĞĂƚĞ^ŽŵĞWĞƌƚŝŶĞŶƚƌƚΕdŚĂƚ^ƉĞĂŬƐƚŽKƵr Condition & Brainstorming Ideas About Topics for Books for Children and Management ʹ (like SCADA & ME) ..................................... 93 Open Reputation Framework ..................................................................................................... 94 DNSSEC 101 (Intro: How it works? My War Stories!) ................................................................ 95 ACE: Authentication & Authorization for Constrained Environments ...................................... 95 The Maker Economy & Identity ................................................................................................. 96 What It Takes to Get a Customer-Centric Startup to Win Funding? ........................................ 100 Kitties are Fluffy! ...................................................................................................................... 101 Startups Pitching to VC Panel ................................................................................................... 102 Thank You to All the Fabulous Notes-takers! ............................................................................... 107 //ttŽŵĞŶ͛ƐtĞĚŶĞƐĚĂLJƌĞĂŬĨĂƐƚ ............................................................................................ 108 Demo Hour ................................................................................................................................... 109 //tys///ηϭϴWŚŽƚŽ͛ƐďLJŽĐ^ĞĂƌůƐ ............................................................................................. 112 IIW 18 Page 2 ABout IIW ² the Internet Identity Workshop The Internet Identity Workshop (IIW) was founded in the fall of 2005 by Phil Windley, Doc Searls and Kaliya Hamlin. IIW is a working group of Identity Commons. It has been a leading space of innovation and collaboration amongst the diverse
Recommended publications
  • Bibliography of Erik Wilde
    dretbiblio dretbiblio Erik Wilde's Bibliography References [1] AFIPS Fall Joint Computer Conference, San Francisco, California, December 1968. [2] Seventeenth IEEE Conference on Computer Communication Networks, Washington, D.C., 1978. [3] ACM SIGACT-SIGMOD Symposium on Principles of Database Systems, Los Angeles, Cal- ifornia, March 1982. ACM Press. [4] First Conference on Computer-Supported Cooperative Work, 1986. [5] 1987 ACM Conference on Hypertext, Chapel Hill, North Carolina, November 1987. ACM Press. [6] 18th IEEE International Symposium on Fault-Tolerant Computing, Tokyo, Japan, 1988. IEEE Computer Society Press. [7] Conference on Computer-Supported Cooperative Work, Portland, Oregon, 1988. ACM Press. [8] Conference on Office Information Systems, Palo Alto, California, March 1988. [9] 1989 ACM Conference on Hypertext, Pittsburgh, Pennsylvania, November 1989. ACM Press. [10] UNIX | The Legend Evolves. Summer 1990 UKUUG Conference, Buntingford, UK, 1990. UKUUG. [11] Fourth ACM Symposium on User Interface Software and Technology, Hilton Head, South Carolina, November 1991. [12] GLOBECOM'91 Conference, Phoenix, Arizona, 1991. IEEE Computer Society Press. [13] IEEE INFOCOM '91 Conference on Computer Communications, Bal Harbour, Florida, 1991. IEEE Computer Society Press. [14] IEEE International Conference on Communications, Denver, Colorado, June 1991. [15] International Workshop on CSCW, Berlin, Germany, April 1991. [16] Third ACM Conference on Hypertext, San Antonio, Texas, December 1991. ACM Press. [17] 11th Symposium on Reliable Distributed Systems, Houston, Texas, 1992. IEEE Computer Society Press. [18] 3rd Joint European Networking Conference, Innsbruck, Austria, May 1992. [19] Fourth ACM Conference on Hypertext, Milano, Italy, November 1992. ACM Press. [20] GLOBECOM'92 Conference, Orlando, Florida, December 1992. IEEE Computer Society Press. http://github.com/dret/biblio (August 29, 2018) 1 dretbiblio [21] IEEE INFOCOM '92 Conference on Computer Communications, Florence, Italy, 1992.
    [Show full text]
  • Extending the Webid Protocol with Access Delegation Sebastian Tramp, Henry Story, Andrei Sambra, Philipp Frischmuth, Michael Martin, Sören Auer
    Extending the WebID Protocol with Access Delegation Sebastian Tramp, Henry Story, Andrei Sambra, Philipp Frischmuth, Michael Martin, Sören Auer To cite this version: Sebastian Tramp, Henry Story, Andrei Sambra, Philipp Frischmuth, Michael Martin, et al.. Extending the WebID Protocol with Access Delegation. Proceedings of the Third International Workshop on Consuming Linked Data (COLD2012), 2012, Boston, United States. hal-00745355 HAL Id: hal-00745355 https://hal.archives-ouvertes.fr/hal-00745355 Submitted on 25 Oct 2012 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. Extending the WebID Protocol with Access Delegation Sebastian Tramp1, Henry Story2, Andrei Sambra3, Philipp Frischmuth1, Michael Martin1, and Sören Auer1 1 Universität Leipzig, Institut für Informatik, AKSW, Postfach 100920, D-04009 Leipzig, Germany, {lastname}@informatik.uni-leipzig.de http://aksw.org/FirstnameLastname (WebID) 2 Apache Foundation [email protected] http://bblfish.net/people/henry/card#me (WebID) 3 CNRS Samovar UMR 5157, Institut Mines-Telecom / Telecom SudParis [email protected] https://my-profile.eu/people/deiu/card#me (WebID) Abstract. The WebID protocol enables the global identication and authentication of agents in a distributed manner by combining asym- metric cryptography and Linked Data.
    [Show full text]
  • Technical Design of Open Social Web for Crowdsourced Democracy
    Project no. 610349 D-CENT Decentralised Citizens ENgagement Technologies Specific Targeted Research Project Collective Awareness Platforms D4.3 Technical Design of Open Social Web for Crowdsourced Democracy Version Number: 1 Lead beneficiary: OKF Due Date: 31 October 2014 Author(s): Pablo Aragón, Francesca Bria, Primavera de Filippi, Harry Halpin, Jaakko Korhonen, David Laniado, Smári McCarthy, Javier Toret Medina, Sander van der Waal Editors and reviewers: Robert Bjarnason, Joonas Pekkanen, Denis Roio, Guido Vilariño Dissemination level: PU Public X PP Restricted to other programme participants (including the Commission Services) RE Restricted to a group specified by the consortium (including the Commission Services) CO Confidential, only for members of the consortium (including the Commission Services) Approved by: Francesca Bria Date: 31 October 2014 This report is currently awaiting approval from the EC and cannot be not considered to be a final version. FP7 – CAPS - 2013 D-CENT D4.3 Technical Design of Open Social Web for Crowdsourced Democracy Contents 1 Executive Summary ........................................................................................................................................................ 6 Description of the D-CENT Open Democracy pilots ............................................................................................. 8 Description of the lean development process .......................................................................................................... 10 Hypotheses statements
    [Show full text]
  • People-Centric Natural Language Processing
    People-Centric Natural Language Processing David Bamman CMU-LTI-15-007 Language Technologies Institute School of Computer Science Carnegie Mellon University 5000 Forbes Ave., Pittsburgh, PA 15213 www.lti.cs.cmu.edu Thesis committee Noah Smith (chair), Carnegie Mellon University Justine Cassell, Carnegie Mellon University Tom Mitchell, Carnegie Mellon University Jacob Eisenstein, Georgia Institute of Technology Ted Underwood, University of Illinois Submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy In Language and Information Technologies © David Bamman, 2015 Contents 1 Introduction 3 1.1 Structure of this thesis . .5 1.1.1 Variation in content . .5 1.1.2 Variation in author and audience . .6 1.2 Evaluation . .6 1.3 Thesis statement . .8 2 Methods 9 2.1 Probabilistic graphical models . .9 2.2 Linguistic structure . 12 2.3 Conditioning on metadata . 13 2.4 Notation in this thesis . 15 I Variation in content 16 3 Learning personas in movies 18 3.1 Introduction . 18 3.2 Data . 19 3.2.1 Text . 19 3.2.2 Metadata . 20 3.3 Personas . 21 3.4 Models . 22 3.4.1 Dirichlet Persona Model . 22 3.4.2 Persona Regression . 24 3.5 Evaluation . 25 3.5.1 Character Names . 25 i CONTENTS ii 3.5.2 TV Tropes . 25 3.5.3 Variation of Information . 26 3.5.4 Purity . 27 3.6 Exploratory Data Analysis . 28 3.7 Conclusion and Future Work . 29 4 Learning personas in books 33 4.1 Introduction . 33 4.2 Literary Background . 34 4.3 Data . 35 4.3.1 Character Clustering .
    [Show full text]
  • The W3C Social Web Activity
    Standardizing the Social Web: The W3C Social Web Activity Harry Halpin World Wide Web Consortium/MIT, 32 Vassar Street Cambridge, MA 02139 USA [email protected] Abstract. The focus of the Social Activity is on making “social” a first-class citizen of the Open Web Platform by enabling standardized protocols, APIs, and an architecture for standardized communication among Social Web applications. These technologies are crucial for both federated social networking and the success of social business between and within the enterprise. Keywords: decentralization, social web, RDF 1Introduction The focus of the W3C Social Activity is on making “social” a first-class citizen of the Open Web Platform by enabling standardized protocols, APIs,andan architecture for standardized communication among Social Web applications. These technologies are crucial for both federated social networking and social business between and within the enterprise and can be built on top of Linked Data. This work will knit together via interoperable standards a number of industry platforms, including IBM Connections, SAP Jam, Jive, SugarCRM, and grassroots efforts such as IndieWeb.1 The mission of the Social Web Working Group,2 part of the Social Activ- ity,3 is to define the technical protocols, Semantic Web vocabularies, andAPIs to facilitate access to social functionality as part of the Open Web Platform. These technologies should allow communication between independent systems, federation (also called “decentralization”) being part of the design. The Working Group is chaired by Tantek Celik (Mozilla), Evan Prodromou (E14N), and Ar- naud Le Hors (IBM). Also part of the Social Activity is the Social Interest Group 4 focuses on messaging and co-ordination in the larger space.
    [Show full text]
  • Decentralized Identifier WG F2F Sessions
    Decentralized Identifier WG F2F Sessions Day 1: January 29, 2020 Chairs: Brent Zundel, Dan Burnett Location: Microsoft Schiphol 1 Welcome! ● Logistics ● W3C WG IPR Policy ● Agenda ● IRC and Scribes ● Introductions & Dinner 2 Logistics ● Location: “Spaces”, 6th floor of Microsoft Schiphol ● WiFi: SSID Publiek_theOutlook, pwd Hello2020 ● Dial-in information: +1-617-324-0000, Meeting ID ● Restrooms: End of the hall, turn right ● Meeting time: 8 am - 5 pm, Jan. 29-31 ● Breaks: 10:30-11 am, 12:30-1:30 pm, 2:30-3 pm ● DID WG Agenda: https://tinyurl.com/didwg-ams2020-agenda (HTML) ● Live slides: https://tinyurl.com/didwg-ams2020-slides (Google Slides) ● Dinner Details: See the “Dinner Tonight” slide at the end of each day 3 W3C WG IPR Policy ● This group abides by the W3C patent policy https://www.w3.org/Consortium/Patent-Policy-20040205 ● Only people and companies listed at https://www.w3.org/2004/01/pp-impl/117488/status are allowed to make substantive contributions to the specs ● Code of Conduct https://www.w3.org/Consortium/cepc/ 4 Today’s agenda 8:00 Breakfast 8:30 Welcome, Introductions, and Logistics Chairs 9:00 Level setting Chairs 9:30 Security issues Brent 10:15 DID and IoT Sam Smith 10:45 Break 11:00 Multiple Encodings/Different Syntaxes: what might we want to support Markus 11:30 Different encodings: model incompatibilities Manu 12:00 Abstract data modeling options Dan Burnett 12:30 Lunch (brief “Why Are We Here?” presentation) Christopher Allen 13:30 DID Doc Extensibility via Registries Mike 14:00 DID Doc Extensibility via JSON-LD Manu
    [Show full text]
  • User Controlled Trust and Security Level of Web Real-Time Communications Kevin CORRE
    User Controlled Trust and Security Level of Web Real-Time Communications THESE DE DOCTORAT DE L’UNIVERSITE DE RENNES 1 COMUE UNIVERSITE BRETAGNE LOIRE Ecole Doctorale N° 601 Mathèmatique et Sciences et Technologies de l’Information et de la Communication Spécialité : Informatique Thèse présentée et soutenue à RENNES, le 31 MAI 2018 par Kevin CORRE Unité de recherche : IRISA (UMR 6074) Institut de Recherche en Informatique et Systemes Aléatoires Thèse N° : Rapporteurs avant soutenance : Maryline LAURENT, Professeur, TELECOM SudParis Yvon KERMARREC, Professeur, IMT Atlantique Composition du jury : Présidente : Maryline LAURENT, Professeur, TELECOM SudParis Examinateurs : Yvon KERMARREC, Professeur, IMT Atlantique Walter RUDAMETKIN, Maître de Conférences, Université de Lille Dominique HAZAEL-MASSIEUX, Ingenieur de Recherche, W3C Vincent FREY, R&D Software Engineer, Orange Labs Dir. de thèse : Olivier BARAIS, Professeur, Université de Rennes 1 Co-dir. de thèse : Gerson SUNYÉ, Maître de Conférences, Université de Nantes “Fide, sed cui vide”. - Locution latine “Du père qui m’a donné la vie : la modestie et la virilité, du moins si je m’en rapporte à la réputation qu’il a laissée et au souvenir personnel qui m’en reste”. - Marcus Catilius Severus i Résumé en Français Contexte Communication, du latin communicatio [13], est défini par le dictionnaire Oxford comme étant “the imparting or exchanging of information” et “the means of sending or receiving information, such as telephone lines or computers” [14]. Face à une incertitude ou à un risque, un tel échange n’est possible que si une relation de confiance peut être établie entre l’émetteur et le récepteur. Cette relation de confiance doit aussi concerner les moyens utilisés pour communiquer.
    [Show full text]
  • Embed a Video with Schema Codes
    Embed A Video With Schema Codes When Hersch bredes his bloodletter sermonizes not sadly enough, is Nick mnemic? Perceptible and intriguing Vinny always prig abstemiously and bedrenches his intents. Ascertainable Alejandro wadsets priggishly while Arthur always rallying his hawksbill cubing extemporarily, he emoting so discerningly. Note that encloses all articles are video with database The user experience, look better understand seo benefits, too many other two clips shot at a schema markup was created specifically overridden by exiftool do? When publishing videos using the Media module you can past the player URL to preview the video or copy the iframe or the-page embed code. Now are we research how structured data codes function to them search engines to. Automating VideoObject Schema for On-Site Video SEO with Python In this continue in age. Note Embed codes will roof be usable until the video state is deployed. How this add HowTo Schema using Yoast SEO blocks Yoast. I'm frequently asked How magnificent I align my videos for SEO purposes. Google Drive Embed Widget. Editing content or video ids becomes visible on your videos, we use these allow you! How you Add Rich Snippets to WordPress in 2021 easy way. A video from the WordPress Media Library Embed code provided does a. Let it should include it possible, you want in branded searches, awards it is listed below are that rank. Available Options for the Advanced in-page Embed Code. Then you can help your authoring tool. Contains Schema markup simply project the following snippet of code to a. YouTube Embed Code Generator Don't Let Your Videos.
    [Show full text]
  • K-ICT · Ver.2017 –
    http://www.tta.or.kr K-ICT Ver.2017 – /SW/ SW· - ( / , / , ), SW( , SW ), SW· ( / , ) TTA - 16142 - SD Service offering ( | ) ~'19, JTC1 SC34, IDPF, W3C ( | ) ~'19, JTC1 SC29 WG11 AR/VR App. AV App. ( ) KS X 6070-1~5 (EPUB) 3.0 , (EPUB) 3.0, (EPUB) 3.0, e-Learning App. (TTA) TTA.KO-10.0611 - Digital Signage App. Web App. , 2016-118 ( | ) ~'18, JTC1 SC29 WG11, SC24 ( | ) ~'18, JTC1 SC29 WG11 (EPUB) 3.0, (EPUB) 3.0 / SNS App. (HMD) (TTA) TTAK.OT-10.0337 - EPUB 2 , .0338 - EPUB 3.0, .0339 - EPUB , 2016-119 PC (TTA) TTAK.KO-10.0874 – (TTA) TTAK.KO-10.0317- 3.0, .0340 - EPUB 3 , .0341 - EPUB 3.0, .0342 - EPUB A/V/Data Terminal Control, (HMD) / 3.0, .0727 - EPUB , KR04-1 - EPUB3 EDUPUB , -2 - EPUB Service Info. Management (JTC1) Exploration Part # 12(Free-viewpoint TV) 1.0, -3 - EPUB 1.0, -4 - EPUB 1.0 DRM Service (JTC1) ISO/IEC 23000-13 Information technology - Call for Evidence on Free-Viewpoint Television: (JTC1) ISO/IEC 14496-10:2012 , NTP/ (ODPF) KR03-1 - EPUB 3.0.1 , -2 - EPUB 3.0.1, -3 - EPUB 3.0.1, -4 - EPUB Discovery ID Network DHCP DNS IGMP - Multimedia application format (MPEG-A) -- Part Super-Multiview and Free Navigation – update, Information technology -- Coding of 3.0.1, -5 - EPUB 3.0.1, -6 - EPUB 3.0.1 ( | ) ~'19, Web3D, JTC1 SC24 WG6/WG9, JTC1 SC29, JTC1 SC35, JTC1 SC36 MPEG / H.264, 265 audio-visual objects -- Part 10: Advanced agent Provisioning SNTP 13: Augmented reality application format, ISO/IEC Exploration Part # 12(Free-viewpoint TV) - FTV HDR (ISO TC171 SC2) ISO 32000-1 - PDF(portable document format) 23005-5 Information
    [Show full text]
  • The Crosscloud Project and Decentralized Web Applications
    The Crosscloud Project and Decentralized Web Applications by Martin Martinez Rivera Submitted to the Department of Electrical Engineering and Computer Science in partial fulfillment of the requirements for the degree of Master of Engineering in Electrical Engineering and Computer Science at the MASSACHUSETTS INSTITUTE OF TECHNOLOGY September 2015 ○c 2015 Martin Martinez Rivera. The author hereby grants to MIT permission to reproduce and to distribute publicly paper and electronic copies of this thesis document in whole and in part in any medium now known or hereafter created. Author................................................................ Department of Electrical Engineering and Computer Science August 18, 2015 Certified by. Tim Berners-Lee Professor Thesis Supervisor Accepted by . Christopher J. Terman Chairman, Masters of Engineering Thesis Committee 2 The Crosscloud Project and Decentralized Web Applications by Martin Martinez Rivera Submitted to the Department of Electrical Engineering and Computer Science on August 18, 2015, in partial fulfillment of the requirements for the degree of Master of Engineering in Electrical Engineering and Computer Science Abstract Crosscloud is a project spearheaded by the Decentralized Information Group, aiming to create a platform that enables developers to build decentralized Web applications in which users have total control over their data. This thesis presents the results of my work: gojsonld, a library for the JSON-LD linked data format written in the Go programming language, and ldnode, a server developed on the Node.js framework which acts as a back-end for Web applications. gojsonld allows Crosscloud applications written in Go to use the JSON-LD format, which is based on the popular JSON format and is widely used in the design of Web application APIs.
    [Show full text]
  • CAUL Review of Australian Repository Infrastructure
    CAUL Fair, affordable and open access to knowledge program CAUL Review of Australian Repository Infrastructure Review of Australian Repository Infrastructure A project within the CAUL Fair, affordable and open access to knowledge program To: Director, FAIR Access to Research Program, CAUL From: Project Leader, Review of Australian Repository Infrastructure Subject: Report from the Review of Australian Repository Infrastructure Date: Version 15 March 2019 Dear Catherine, On behalf of the Project Team I am pleased to provide you with the report from the CAUL Review of Australian Repository Infrastructure, a project of the CAUL Fair, affordable and open access to knowledge program. The project was resourced using a large number of volunteers from across the CAUL member libraries. This model has proved to be successful. This final version of the report includes reports from work packages #1 - #7. All feedback provided by the 2/2018 CAUL Council meeting a community consultation process conducted in February/March 2019 were considered and incorporated into the document where possible. Suggested changes to project scope could not be incorporated into the project and the report at this stage. Best regards, Martin Borchert Project Lead Page 2 of 171 CAUL (Council of Australian University Librarians) +61 2 6125 2990 | [email protected] | www.caul.edu.au Table of Contents Project Overview……………………………………………………………………………………………………………………………. 4 #1 Review and Report on the current Australasian institutional research repository infrastructure…………………………………………………………………………………………………..................................
    [Show full text]
  • A Study on Organizing Heterogeneous Cultural Heritage Information in Networked Information Environments
    A Study on Organizing Heterogeneous Cultural Heritage Information in Networked Information Environments Chiranthi Jayampathini Wijesundara Graduate SChool of Library, Information and Media Studies University of Tsukuba August 2019 A Study on Organizing Heterogeneous Cultural Heritage Information in Networked Information Environments Abstract Cultural Heritage is a showcase of a particular human society which demonstrates its values, traditions and characteristics. Preserving cultural heritage is essential to bestow it to future generations. This study was initiated as a way of finding avenues to help support safeguarding cultural heritage via informational interventions. Basically, “information” is the key to understanding a specific cultural heritage entity, as well as giving it meaning and context. Therefore, the idea of organizing and linking cultural heritage information for better access and for more context is the foundation of this study. As digital information about cultural heritage is important in this research, the study introduces the term Cultural Heritage Information (CHI) which denotes digital information related to cultural heritage. Memory institutions are generally responsible for handling CHI; they organize digital archives as a collection of CHI and disseminate CHI on the Internet. CHI in digital archives is often based on individual cultural heritage objects, referred to as “item- centric” information in this research. Generally, a user’s information needs are diverse and complex, and they sometimes require additional information related to a certain cultural heritage object that conventional digital archives - composed of item-centric CHI - are unable to deliver. On the other hand, the Web provides a large amount of cultural information resources delivered by third-party, non-memory institutions, such as Wikipedia.
    [Show full text]