You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
How can interoperating systems, e.g., intelligent agents in multi-agent systems, each having their own databases or knowledge graphs, provide access control with respect to their resources? Could verifying and validating each structured query, in these regards, be simplified?
The idea presented here is to use templates to transform structured queries into objects more resembling remote procedure calls or actions so that verifying and validating these, for well-known query types, could be performed more efficiently.
Interestingly, in this approach, the transmitted objects describe those processes with which to obtain their corresponding structured query-language representations, e.g., SPARQL or SQL.
Text-based templates could be processed, alongside bindings for their parameters, into structured queries. Such templates could, for example, utilize a notation like {{name}} or {{name type}} to indicate those positions in them to be replaced by those arguments bound to their template parameters.
Examples
XML
Let us consider a templated SPARQL query, a resource at https://resource.org/1.hbs, which might resemble:
Here is an example which provides alternatives between two templating formats available. That is, there could be more than one text-based templating format.
Here is the first example revisited to show that additional attributes could be provided upon parameters, e.g., categorizing or describing them. The expressiveness for additional attributes on parameters could enhance scenarios involving the description of constraints, e.g., with ODRL.
The indicated techniques map the processing, the verification and validation, of structured queries into the processing of objects more resembling remote procedure calls.
With caching, recipients of templated queries could efficiently retrieve any recognized templates from their caches.
In some cases, software functions could be developed for well-known URLs to handle instances of templated queries.
In other cases, runtime code generation could be of use.
Developed, generated or emitted functions – these functions perhaps involving compiled query representations or optimized query plans – could be indexed by the well-known URLs and subsequently invoked with the provided arguments, after these were validated.
The indicated techniques could contribute to making both transmission and computation more efficient when securing or providing access control systems for databases and knowledge graphs, in particular when the expected structured queries are to be from a well-known, extensible set of possibilities.
The indicated techniques could simplify providing access control for incoming queries based upon their compression patterns, well-known URIs, or "verbs", for instance using ODRL.
Conclusion
Thank you for any feedback on these ideas.
Bibliography
Kirrane, Sabrina, Alessandra Mileo, and Stefan Decker. "Access control and the resource description framework: A survey." Semantic Web 8, no. 2 (2016): 311-352.
The text was updated successfully, but these errors were encountered:
Introduction
How can interoperating systems, e.g., intelligent agents in multi-agent systems, each having their own databases or knowledge graphs, provide access control with respect to their resources? Could verifying and validating each structured query, in these regards, be simplified?
The idea presented here is to use templates to transform structured queries into objects more resembling remote procedure calls or actions so that verifying and validating these, for well-known query types, could be performed more efficiently.
Interestingly, in this approach, the transmitted objects describe those processes with which to obtain their corresponding structured query-language representations, e.g., SPARQL or SQL.
Text-based templates could be processed, alongside bindings for their parameters, into structured queries. Such templates could, for example, utilize a notation like
{{name}}
or{{name type}}
to indicate those positions in them to be replaced by those arguments bound to their template parameters.Examples
XML
Let us consider a templated SPARQL query, a resource at
https://resource.org/1.hbs
, which might resemble:Next, the following markup:
indicates to process the templated query, replacing
{{author}}
withBob Smith
so that the resultant SPARQL query would be:Here is an example with a template that could be processed into SQL:
Here is an example which provides alternatives between two templating formats available. That is, there could be more than one text-based templating format.
Here is an example showing how a cryptographic hash could be used to further describe a template resource.
Here is the first example revisited to show that additional attributes could be provided upon parameters, e.g., categorizing or describing them. The expressiveness for additional attributes on parameters could enhance scenarios involving the description of constraints, e.g., with ODRL.
Alternatively, for some templating languages, descriptions of templates' parameters could be placed in the template resources.
JSON
Here is what the templating-based compression model could resemble, expressed in JSON:
Discussion
The indicated techniques map the processing, the verification and validation, of structured queries into the processing of objects more resembling remote procedure calls.
With caching, recipients of templated queries could efficiently retrieve any recognized templates from their caches.
In some cases, software functions could be developed for well-known URLs to handle instances of templated queries.
In other cases, runtime code generation could be of use.
Developed, generated or emitted functions – these functions perhaps involving compiled query representations or optimized query plans – could be indexed by the well-known URLs and subsequently invoked with the provided arguments, after these were validated.
The indicated techniques could contribute to making both transmission and computation more efficient when securing or providing access control systems for databases and knowledge graphs, in particular when the expected structured queries are to be from a well-known, extensible set of possibilities.
The indicated techniques could simplify providing access control for incoming queries based upon their compression patterns, well-known URIs, or "verbs", for instance using ODRL.
Conclusion
Thank you for any feedback on these ideas.
Bibliography
Kirrane, Sabrina, Alessandra Mileo, and Stefan Decker. "Access control and the resource description framework: A survey." Semantic Web 8, no. 2 (2016): 311-352.
The text was updated successfully, but these errors were encountered: