ABSTRACT
When linked data applications communicate, they commonly use messaging technologies in which the message exchange itself is not represented as linked data, since it takes place on a different architectural level. When a message cannot be verified and traced on the linked data level, trust in data is moved from message originators to service providers. However, there are use cases in which the actual message exchange and its verifiability are of importance. In such situations, the separation between application data and communication data is not desirable. To address this, we propose messaging based on linked data, where communicating entities and their messages are represented as interconnected Web resources, and we show how conversations can be made verifiable using digital signatures.
- Linked data signatures 1.0. Draft Community Group Specification, 11 May 2015.Google Scholar
- Web of needs on github. https://github.com/researchstudio-sat/webofneeds/, 2016.Google Scholar
- Jeremy J. Carroll, Christian Bizer, Pat Hayes, and Patrick Stickler. Named graphs, provenance and trust. In Proceedings of the 14th International Conference on World Wide Web, WWW '05, pages 613--622, New York, NY, USA, 2005. ACM. Google ScholarDigital Library
- Sebastian Dietzold, Jörg Unbehauen, and Sören Auer. xoperator - interconnecting the semantic web and instant messaging networks. In Proceedings of 5th European Semantic Web Conference (ESWC 2008), 1-5 June, 2008, Tenerife, Spain., pages 19--33, 2008. Google ScholarDigital Library
- Dominic DiFranzo and James Hendler. The semantic web and the next generation of human computation. In Pietro Michelucci, editor, Handbook of Human Computation, pages 523--530. Springer New York, 2013.Google ScholarCross Ref
- Jesus Arias Fisteus, Norberto Fernández García, Luis Sánchez Fernández, and Carlos Delgado Kloos. Hashing and canonicalizing notation 3 graphs. Journal of Computer and System Sciences, 76(7):663--685, 2010. Google ScholarDigital Library
- Jonas Halvorsen and Bjørn Jervell Hansen. Integrating military systems using semantic web technologies and lightweight agents. Technical Report 01851, Norwegian Defence Research Establishment (FFI), October 2011.Google Scholar
- Ragib Hasan, Radu Sion, and Marianne Winslett. The case of the fake picasso: Preventing history forgery with secure provenance. In Proccedings of the 7th Conference on File and Storage Technologies, FAST '09, pages 1--14, Berkeley, CA, USA, 2009. USENIX Association. Google ScholarDigital Library
- Andreas Kasten. A software framework for iterative signing of graph data. https://github.com/akasten/signingframework, 2015.Google Scholar
- Andreas Kasten, Ansgar Scherp, and Peter Schauß. A framework for iterative signing of graph data on the web. In The Semantic Web: Trends and Challenges, pages 146--160. Springer, 2014.Google Scholar
- Florian Kleedorfer, Christina Maria Busch, Christian Pichler, and Christian Huemer. The case for the web of needs. In 16th IEEE Conference on Business Informatics (CBI), volume 1, pages 94--101. IEEE, 2014. Google ScholarDigital Library
- Paolo Missier Luc Moreau. Prov-overview. W3C Working Group Note, April 2013.Google Scholar
- Ralph C Merkle. A digital signature based on a conventional encryption function. In Advances in Cryptology -CRYPTO'87, pages 369--378. Springer, 1987. Google ScholarDigital Library
- Dennis Quan, Karun Bakshi, and David R Karger. A unified abstraction for messaging on the semantic web. In WWW (Posters), 2003.Google Scholar
- Andrei Sambra, Henry Story, and Tim Berners-Lee. Webid 1.0 - web identity and discovery, December 2013.Google Scholar
- Joshua Shrinavier. Rdfagents. Technical report, Rensselaer Polytechnic Institute, 2011.Google Scholar
- Xinlei Wang, Kai Zeng, K. Govindan, and P. Mohapatra. Chaining for securing data provenance in distributed information networks. In Military Communications Conference(MILCOM) 2012, Oct 2012.Google Scholar
Recommendations
Design of an Instant Messaging System Using Identity Based Cryptosystems
EIDWT '13: Proceedings of the 2013 Fourth International Conference on Emerging Intelligent Data and Web TechnologiesThe rapid development of instant messaging changes the people's communication, collaboration and entertainment manner radically. Unfortunately, the existing instant messaging technology does not provide built-in support for security features. The ...
Pandora Messaging: An Enhanced Self-Message-Destructing Secure Instant Messaging Architecture for Mobile Devices
WAINA '12: Proceedings of the 2012 26th International Conference on Advanced Information Networking and Applications WorkshopsWe propose the Pandora Messaging, an enhanced secure instant messaging architecture which is equipped with a self-message-destructing feature for sensitive personal information applications in a mobile environment. We design the Pandora Message ...
Comments