skip to main content
10.1145/2993318.2993342acmotherconferencesArticle/Chapter ViewAbstractPublication PagessemanticsConference Proceedingsconference-collections
short-paper

Verifiability and Traceability in a Linked Data Based Messaging System

Authors Info & Claims
Published:12 September 2016Publication History

ABSTRACT

When linked data applications communicate, they commonly use messaging technologies in which the message exchange itself is not represented as linked data, since it takes place on a different architectural level. When a message cannot be verified and traced on the linked data level, trust in data is moved from message originators to service providers. However, there are use cases in which the actual message exchange and its verifiability are of importance. In such situations, the separation between application data and communication data is not desirable. To address this, we propose messaging based on linked data, where communicating entities and their messages are represented as interconnected Web resources, and we show how conversations can be made verifiable using digital signatures.

References

  1. Linked data signatures 1.0. Draft Community Group Specification, 11 May 2015.Google ScholarGoogle Scholar
  2. Web of needs on github. https://github.com/researchstudio-sat/webofneeds/, 2016.Google ScholarGoogle Scholar
  3. Jeremy J. Carroll, Christian Bizer, Pat Hayes, and Patrick Stickler. Named graphs, provenance and trust. In Proceedings of the 14th International Conference on World Wide Web, WWW '05, pages 613--622, New York, NY, USA, 2005. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Sebastian Dietzold, Jörg Unbehauen, and Sören Auer. xoperator - interconnecting the semantic web and instant messaging networks. In Proceedings of 5th European Semantic Web Conference (ESWC 2008), 1-5 June, 2008, Tenerife, Spain., pages 19--33, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Dominic DiFranzo and James Hendler. The semantic web and the next generation of human computation. In Pietro Michelucci, editor, Handbook of Human Computation, pages 523--530. Springer New York, 2013.Google ScholarGoogle ScholarCross RefCross Ref
  6. Jesus Arias Fisteus, Norberto Fernández García, Luis Sánchez Fernández, and Carlos Delgado Kloos. Hashing and canonicalizing notation 3 graphs. Journal of Computer and System Sciences, 76(7):663--685, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Jonas Halvorsen and Bjørn Jervell Hansen. Integrating military systems using semantic web technologies and lightweight agents. Technical Report 01851, Norwegian Defence Research Establishment (FFI), October 2011.Google ScholarGoogle Scholar
  8. Ragib Hasan, Radu Sion, and Marianne Winslett. The case of the fake picasso: Preventing history forgery with secure provenance. In Proccedings of the 7th Conference on File and Storage Technologies, FAST '09, pages 1--14, Berkeley, CA, USA, 2009. USENIX Association. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Andreas Kasten. A software framework for iterative signing of graph data. https://github.com/akasten/signingframework, 2015.Google ScholarGoogle Scholar
  10. Andreas Kasten, Ansgar Scherp, and Peter Schauß. A framework for iterative signing of graph data on the web. In The Semantic Web: Trends and Challenges, pages 146--160. Springer, 2014.Google ScholarGoogle Scholar
  11. Florian Kleedorfer, Christina Maria Busch, Christian Pichler, and Christian Huemer. The case for the web of needs. In 16th IEEE Conference on Business Informatics (CBI), volume 1, pages 94--101. IEEE, 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Paolo Missier Luc Moreau. Prov-overview. W3C Working Group Note, April 2013.Google ScholarGoogle Scholar
  13. Ralph C Merkle. A digital signature based on a conventional encryption function. In Advances in Cryptology -CRYPTO'87, pages 369--378. Springer, 1987. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Dennis Quan, Karun Bakshi, and David R Karger. A unified abstraction for messaging on the semantic web. In WWW (Posters), 2003.Google ScholarGoogle Scholar
  15. Andrei Sambra, Henry Story, and Tim Berners-Lee. Webid 1.0 - web identity and discovery, December 2013.Google ScholarGoogle Scholar
  16. Joshua Shrinavier. Rdfagents. Technical report, Rensselaer Polytechnic Institute, 2011.Google ScholarGoogle Scholar
  17. Xinlei Wang, Kai Zeng, K. Govindan, and P. Mohapatra. Chaining for securing data provenance in distributed information networks. In Military Communications Conference(MILCOM) 2012, Oct 2012.Google ScholarGoogle Scholar

Recommendations

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in
  • Published in

    cover image ACM Other conferences
    SEMANTiCS 2016: Proceedings of the 12th International Conference on Semantic Systems
    September 2016
    207 pages
    ISBN:9781450347525
    DOI:10.1145/2993318

    Copyright © 2016 ACM

    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    • Published: 12 September 2016

    Permissions

    Request permissions about this article.

    Request Permissions

    Check for updates

    Qualifiers

    • short-paper
    • Research
    • Refereed limited

    Acceptance Rates

    SEMANTiCS 2016 Paper Acceptance Rate18of85submissions,21%Overall Acceptance Rate40of182submissions,22%

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader