WebBox: Supporting Decentralised and Privacy-respecting Micro-sharing with Existing Web Standards

نویسندگان

  • Daniel A. Smith
  • Max Van Kleek
  • Oshani Seneviratne
  • Alexandre Bertails
  • Tim Berners-Lee
  • Wendy Hall
  • Nigel Shadbolt
چکیده

The popularity and plurality of social sharing and collaboration platforms today demonstrates the demand for sharing information at a wide variety of granularities and scale — from public blogging of micro-data (e.g., microblogging posts, page“Likes”, and place-“check-ins”) to specific, full-on collaborative sharing of documents and projects. The centralised and fragmented nature of today’s sharing platforms, however, creates several problems, among which include issues of seamless access, ownership, and control. In this paper, we present an alternative approach that puts the user back in control over their data, and supports secure, private sharing and collaboration in a distributed, user-centric manner “out of the box”. This approach represents a novel configuration of Web-standard, non-novel components, which we demonstrate are sufficiently generic to support types of sharing offered by the most popular sharing platforms today. By offering a standards-compliant method of globally sharing triples, with known semantics about how they are received, our approach enables social applications to utilise the Web as the distributed system it has always promised to be. Beyond such sharing, we discuss what other capabilities such a platform enables, and its implication for future Web architectures and tools.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A decentralized architecture for consolidating personal information ecosystems: The WebBox

Most existing PIM tools either suffer from having data isolated by being siloed in an application or only interact with specific tools offered through specific services. The consequences are that what people can do with their own data becomes constrained by what services application developers afford. We propose a web-standards based architecture called WebBox to support easy maintenance and re...

متن کامل

Setting Access Permission through Transitive Relationship in Web-based Social Networks

The rising popularity of Web 2.0, such as blogs, forums, online calendars/diaries, etc., makes users more interested in keeping their data on the Web. Sharing of such data could make life more enjoyable and convenient. For example, posting new photos about activities or sharing views about an event can let friends know what a user cares about. However, some of these data (such as a person’s loc...

متن کامل

Privacy, security and policies: A review of problems and solutions with semantic web technologies

Semantic Web technologies aim to simplify the distribution, sharing and exploitation of information and knowledge, across multiple distributed actors on the Web. As with all technologies that manipulate information, there are privacy and security implications, and data policies (e.g., licenses and regulations) that may apply to both data and software artifacts. Additionally, semantic web techno...

متن کامل

میزان رعایت خلوت بیماران در طی مراقبت‌های پرستاری از دیدگاه پرستاران و بیماران

    Background and Aim: Privacy is a major human need and is being considered as the cornerstone of medical care. Nurses, because of the specific nature of their profession, have a substantial role in meeting the patients need for privacy. The aim of this study was to compare viewpoints of patients and nurses about respecting patient’s privacy during nursing care.   Material and Method: In this...

متن کامل

Distributed Agenda Management through Decentralised Vowels Co-ordination Approach

In this paper we present an application to a Distributed Agenda Management problem through a decentralised multi-agent coordination model. Each agent represents a user's personal agenda, which must to co-ordinate with other agendas in order to reach a joint commitment, such as a meeting scheduling, respecting user privacy and local constraints. Constraints represent personal preferences and com...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2011