SlideShare uma empresa Scribd logo
1 de 18
Baixar para ler offline
Digital Enterprise Research Institute                                                     www.deri.ie




               An architecture for privacy-enabled user profile
                        portability on the Web of Data

                                                 Benjamin Heitmann, James G. Kim,
                                           Alexandre Passant, Conor Hayes, Hong-Gee Kim




              Funded by Science Foundation Ireland under
                  Grant No. SFI/08/CE/I1380 (Líon-2)

 Copyright 2009 Digital Enterprise Research Institute. All rights reserved.
                                                                               Chapter
Motivation
Digital Enterprise Research Institute                                                      www.deri.ie


                                                                   Rec. Systems can
                                                                   benefit from external
                                                                   data sources:
                                                                    e.g. for cold-start
                                                                    problem




                         ?
                                                                   New paradigm shifts
                                                                   require external data:
                                                                    beyond single site
                                                                    context
                         data
                                             recommendations
                                                                      beyond single domain
                        sharing
                                                                Challenge: sharing of
                                                                profile data
                                                                Maintain privacy of
                                                                user (“public by
                                                                default” is not enough)

Benjamin.Heitmann
                             slide 2 of 11
@deri.org
Outline
Digital Enterprise Research Institute                         www.deri.ie



         The challenge: portable and private user profiles

         Background: Introducing Linked Data

         An architecture to enable portable and private
         user profiles
            Foundation standards
            Roles
            Communication pattern


         Qualitative evaluation
         Related work

Benjamin.Heitmann
                             slide 3 of 11
@deri.org
The challenge:
       portable and private user profiles
Digital Enterprise Research Institute                                                         www.deri.ie


                                                                        Current eco-systems:
                                                                          hub site: centralised
                                                express                    user profile storage
                                               preference
                 authentication                                            e.g. Facebook, Twitter
                 for user action                                            users profiles: secure
                                                                            and private, but no
                                                              web site
                                                            interaction     portability.
                                                                            third party services: can
cross domain
 data sharing                                                               access user profile if
if authorised                                                               authorised, e.g.
    by user                                                                 TweetMeme or Flickr
                                                                         closed system
                                                                         Users are locked into an
                                                                          ecosystem, no portability
                                                                         Challenge: open
                               recommendations for                        alternative with portability
                              external site provided by                   and privacy!
                                     facebook
                                                                         (at the same time)


 Benjamin.Heitmann
                             slide 4 of 11
 @deri.org
Background:
       The Web of Data and Linked Data
Digital Enterprise Research Institute                                         www.deri.ie


    the Web of Data provides:
      structured data, collaboratively
      created, about object centred
      sociality
      domain knowledge through
      ontologies (e.g. DBpedia ontology)
      cross-domain links between
      sources
    Linked Data principles:
     1. use URIs “for everything”
     2. allow HTTP access to all URIs
     3. when accessing a URI, provide
      relevant data in RDF
     4. include links to URIs from third     Linking Open Data (LOD) cloud,
                                                    as of October 2010
      parties (background knowledge)

Benjamin.Heitmann
                             slide 5 of 11
@deri.org
Foundation standards
Digital Enterprise Research Institute                                                          www.deri.ie




                                                      no logo




 WebIDs:                                     WebAccess                    FOAF profiles:
        user                                 Control (WAC)                      domain
        authentication                        vocabulary:                        independent user
        without passwords                                                        profiles
                                                  resource access
        publish public key                       authorisation                  described using
        in FOAF profile                                                          the Friend-of-a-
                                                  defines whitelist
        store private key in                                                    Friend (FOAF)
                                                  for a resource
        browser                                                                  vocabulary
                                                  access by third
        decentralised                            parties                        can contain any
        authentication                                                           structured data,
                                                  can be used for
        schema                                                                   e.g. activity streams
                                                  “private by default”
                                                  mode


Benjamin.Heitmann
                             slide 6 of 11
@deri.org
Alternative: architecture for private and
       portable user profiles
Digital Enterprise Research Institute                                                             www.deri.ie


     User profile:
        Profile data expressed                                            WebID
        using RDF (FOAF+SIOC)
        WebID provides identity
                                                             private key           public key
        (2 parts)
          – private SSL Key in user
           agent
          – public SSL Key in FOAF            user agent
                                                                                           FOAF Profile
           profile
     Roles:                                                                             stored
        user agents: manage user                                                          in
        identities
        profile storage service:
                                                                retrieves user profile
        stores 1 or many profiles                                if user authorises it profile storage site
                                             data consumer
        data consumers: provide
        services for users


Benjamin.Heitmann
                             slide 7 of 11
@deri.org
Communication pattern of the proposed
       architecture
Digital Enterprise Research Institute                                                        www.deri.ie




                                                                        WebID



                                                          private key           public key
                                                          Storage URI



                                             user agent
                                                                                        FOAF Profile

                                                                                                    stored
                                                                                                      in




                                                                                     profile storage site




Benjamin.Heitmann
                             slide 8 of 11
@deri.org
Communication pattern of the proposed
       architecture
Digital Enterprise Research Institute                                                        www.deri.ie


  Scenario: recommend patients
  with similar treatments                                               WebID
  Assumption: user is logged into
  Openbook
                                                          private key           public key
                                                          Storage URI



                                             user agent
                                                                                        FOAF Profile

                                                                                                    stored
                                                                                                      in




                                                                                     profile storage site




Benjamin.Heitmann
                             slide 8 of 11
@deri.org
Communication pattern of the proposed
       architecture
Digital Enterprise Research Institute                                                           www.deri.ie


  Scenario: recommend patients
  with similar treatments                                                  WebID
  Assumption: user is logged into
  Openbook
                                                             private key           public key
 1. User searches for PatiensLikeMe                          Storage URI



                                               user agent
                                                                                           FOAF Profile

                                                        Any patients                                   stored
                                                         like me?                                        in




                                                                                        profile storage site

                                             data consumer



Benjamin.Heitmann
                             slide 8 of 11
@deri.org
Communication pattern of the proposed
       architecture
Digital Enterprise Research Institute                                                                www.deri.ie


  Scenario: recommend patients
  with similar treatments                                                       WebID
  Assumption: user is logged into
  Openbook
                                                                  private key           public key
 1. User searches for PatiensLikeMe                               Storage URI
 2. PatientsLikeMe (PLM) gets
  profile storage URI via Firefox
                                                     user agent
                                                                                                FOAF Profile

                                                Firefox                                                     stored
                                               provides                                                       in
                                             storage URI




                                                                                             profile storage site

                                                  data consumer



Benjamin.Heitmann
                             slide 8 of 11
@deri.org
Communication pattern of the proposed
       architecture
Digital Enterprise Research Institute                                                           www.deri.ie


  Scenario: recommend patients
  with similar treatments                                                  WebID
  Assumption: user is logged into
  Openbook
                                                             private key           public key
 1. User searches for PatiensLikeMe                          Storage URI
 2. PatientsLikeMe (PLM) gets
  profile storage URI via Firefox
                                               user agent
 3. PLM redirects Firefox to                                                               FOAF Profile
  Openbook for authorisation
                                                         redirect to                                   stored
                                                          openbook                                       in
                                                      for authorisation



                                                                                        profile storage site

                                             data consumer



Benjamin.Heitmann
                             slide 8 of 11
@deri.org
Communication pattern of the proposed
       architecture
Digital Enterprise Research Institute                                                            www.deri.ie


  Scenario: recommend patients
  with similar treatments                                                  WebID
  Assumption: user is logged into
  Openbook
                                                             private key            public key
 1. User searches for PatiensLikeMe                          Storage URI
 2. PatientsLikeMe (PLM) gets
  profile storage URI via Firefox
                                               user agent
 3. PLM redirects Firefox to                                                                FOAF Profile
  Openbook for authorisation                                                       User authorises      stored
 4. User authorises Openbook to                                                     Openbook to           in
                                                                                    show parts of
  show some profile parts to PLM                                                   profile to PLM
  (new WAC entry gets created)

                                                                                         profile storage site

                                             data consumer



Benjamin.Heitmann
                             slide 8 of 11
@deri.org
Communication pattern of the proposed
       architecture
Digital Enterprise Research Institute                                                           www.deri.ie


  Scenario: recommend patients
  with similar treatments                                                  WebID
  Assumption: user is logged into
  Openbook
                                                             private key           public key
 1. User searches for PatiensLikeMe                          Storage URI
 2. PatientsLikeMe (PLM) gets
  profile storage URI via Firefox
                                               user agent
 3. PLM redirects Firefox to                                                               FOAF Profile
  Openbook for authorisation
                                                                                                       stored
 4. User authorises Openbook to                                                                          in
  show some profile parts to PLM
  (new WAC entry gets created)
 5.Openbook redirects to PLM
                                                                 redirect back to       profile storage site
                                                                  PatientsLikeMe
                                             data consumer



Benjamin.Heitmann
                             slide 8 of 11
@deri.org
Communication pattern of the proposed
       architecture
Digital Enterprise Research Institute                                                           www.deri.ie


  Scenario: recommend patients
  with similar treatments                                                  WebID
  Assumption: user is logged into
  Openbook
                                                             private key           public key
 1. User searches for PatiensLikeMe                          Storage URI
 2. PatientsLikeMe (PLM) gets
  profile storage URI via Firefox
                                               user agent
 3. PLM redirects Firefox to                                                               FOAF Profile
  Openbook for authorisation
                                                                                                       stored
 4. User authorises Openbook to                                                                          in
  show some profile parts to PLM                            PatientsLikeMe retrieves profile
  (new WAC entry gets created)                                         parts now
 5.Openbook redirects to PLM
                                                                                        profile storage site
 6.Now PLM accesses parts of
  profile data on openbook                   data consumer



Benjamin.Heitmann
                             slide 8 of 11
@deri.org
Qualitative evaluation
Digital Enterprise Research Institute                                        www.deri.ie



      Based on evaluation framework for privacy enhanced
      technologies by Wang+Kobsa [20,15]
      Protection of identity:
            user can create and choose identities without constraints
            allows pseudonymity, unobservability, deniability, anonymity
            alternatively identities can be assigned by organisations
        Control over user data:
            profile data can be optionally self-hosted
            open standards allow portability, no lock-in to any ecosystem
        Non-functional requirements:
            Universality: one universal, standards based eco-system
            Scalability: no bottlenecks or central points of failure
           Reuse of infrastructure: standards from WWW and Web of Data
           are reused


Benjamin.Heitmann
                             slide 9 of 11
@deri.org
Related work (“the competition”)
Digital Enterprise Research Institute                                                              www.deri.ie




                                                                                       no logo



 OpenID:                                      OAuth:                         OpenID attribute
       user authentication                        resource access            exchange:
        without passwords                          authorisation                   protocol for
       1 billion accounts, 9                      defines protocol for           exchanging profile
        million sites                              3rd parties to access           data
        requires user                             resources                       very limited
        interaction                                manages access via             vocabulary
        not scalable, due to                      tokens                          inflexible and hard to
        number of HTTP                             high HTTP                      extend
        connections required                       connection overhead             has not reached
                                                   fragmentation                  industry adoption
                                                   (Twitter vs Facebook)




Benjamin.Heitmann
                             slide 10 of 11
@deri.org
Summary
Digital Enterprise Research Institute                                    www.deri.ie



         coming paradigm shifts towards
         social eco-systems:
            recommendations in a multi-site and cross-domain context
      current eco-systems are built around centralised
      and closed hub sites
      alternative: eco-systems centred around secure
      and portable user profiles (“private by default”)
            foundation: WebIDs and FOAF profiles
            provides incentives for users to share their profile data
            can enable a universal, decentralised social eco-system
        Future work: implement and evaluate prototype
         with all parties in a cross-domain setting


Benjamin.Heitmann
                             slide 11 of 11
@deri.org

Mais conteúdo relacionado

Mais procurados

Turning social disputes into knowledge representations DERI reading group 201...
Turning social disputes into knowledge representations DERI reading group 201...Turning social disputes into knowledge representations DERI reading group 201...
Turning social disputes into knowledge representations DERI reading group 201...jodischneider
 
Leveraging Matching Dependencies for Guided User Feedback in Linked Data Appl...
Leveraging Matching Dependencies for Guided User Feedback in Linked Data Appl...Leveraging Matching Dependencies for Guided User Feedback in Linked Data Appl...
Leveraging Matching Dependencies for Guided User Feedback in Linked Data Appl...Umair ul Hassan
 
LEAD - Learning Design – Design For Learning -project presentation
LEAD - Learning Design – Design For Learning -project presentationLEAD - Learning Design – Design For Learning -project presentation
LEAD - Learning Design – Design For Learning -project presentationTeemu Leinonen
 
RDFa: putting RDF on the Web
RDFa: putting RDF on the WebRDFa: putting RDF on the Web
RDFa: putting RDF on the WebBenjamin Heitmann
 
Presentation of current research: distributed architecture for recommendation...
Presentation of current research: distributed architecture for recommendation...Presentation of current research: distributed architecture for recommendation...
Presentation of current research: distributed architecture for recommendation...Benjamin Heitmann
 
Swap2010 agave
Swap2010 agaveSwap2010 agave
Swap2010 agavejuanaya
 
Twitter and research impact
Twitter and research impactTwitter and research impact
Twitter and research impactMarie Boran
 
Internet Science
Internet ScienceInternet Science
Internet Sciencei_scienceEU
 
Self-service Linked Government Data
Self-service Linked Government DataSelf-service Linked Government Data
Self-service Linked Government DataFadi Maali
 
Towards Social semantic journalism
Towards Social semantic journalismTowards Social semantic journalism
Towards Social semantic journalismBahareh Heravi
 
Federating Distributed Social Data to Build an Interlinked Online Information...
Federating Distributed Social Data to Build an Interlinked Online Information...Federating Distributed Social Data to Build an Interlinked Online Information...
Federating Distributed Social Data to Build an Interlinked Online Information...Alexandre Passant
 
Making sense out of disagreement, University of Limerick Interaction Design C...
Making sense out of disagreement, University of Limerick Interaction Design C...Making sense out of disagreement, University of Limerick Interaction Design C...
Making sense out of disagreement, University of Limerick Interaction Design C...jodischneider
 
Service Integration - A Web of Things Perspective
Service Integration - A Web of Things PerspectiveService Integration - A Web of Things Perspective
Service Integration - A Web of Things PerspectiveSimon Mayer
 
Enterprise Energy Management using a Linked Dataspace for Energy Intelligence
Enterprise Energy Management using a Linked Dataspace for Energy IntelligenceEnterprise Energy Management using a Linked Dataspace for Energy Intelligence
Enterprise Energy Management using a Linked Dataspace for Energy IntelligenceEdward Curry
 
Knowledge management on the desktop
Knowledge management on the desktopKnowledge management on the desktop
Knowledge management on the desktopLaura Dragan
 
Open data showcase
Open data showcaseOpen data showcase
Open data showcaseFadi Maali
 
IUI 2010: An Informal Summary of the International Conference on Intelligent ...
IUI 2010: An Informal Summary of the International Conference on Intelligent ...IUI 2010: An Informal Summary of the International Conference on Intelligent ...
IUI 2010: An Informal Summary of the International Conference on Intelligent ...J S
 
6 - Making Information Pay 2011 -- SOLOMON, MADI (Pearson)
6 - Making Information Pay 2011 -- SOLOMON, MADI (Pearson)6 - Making Information Pay 2011 -- SOLOMON, MADI (Pearson)
6 - Making Information Pay 2011 -- SOLOMON, MADI (Pearson)bisg
 

Mais procurados (20)

Turning social disputes into knowledge representations DERI reading group 201...
Turning social disputes into knowledge representations DERI reading group 201...Turning social disputes into knowledge representations DERI reading group 201...
Turning social disputes into knowledge representations DERI reading group 201...
 
Leveraging Matching Dependencies for Guided User Feedback in Linked Data Appl...
Leveraging Matching Dependencies for Guided User Feedback in Linked Data Appl...Leveraging Matching Dependencies for Guided User Feedback in Linked Data Appl...
Leveraging Matching Dependencies for Guided User Feedback in Linked Data Appl...
 
LEAD - Learning Design – Design For Learning -project presentation
LEAD - Learning Design – Design For Learning -project presentationLEAD - Learning Design – Design For Learning -project presentation
LEAD - Learning Design – Design For Learning -project presentation
 
RDFa: putting RDF on the Web
RDFa: putting RDF on the WebRDFa: putting RDF on the Web
RDFa: putting RDF on the Web
 
Presentation of current research: distributed architecture for recommendation...
Presentation of current research: distributed architecture for recommendation...Presentation of current research: distributed architecture for recommendation...
Presentation of current research: distributed architecture for recommendation...
 
Swap2010 agave
Swap2010 agaveSwap2010 agave
Swap2010 agave
 
Twitter and research impact
Twitter and research impactTwitter and research impact
Twitter and research impact
 
Internet Science
Internet ScienceInternet Science
Internet Science
 
Itgs scheme 2011-2012
Itgs scheme 2011-2012Itgs scheme 2011-2012
Itgs scheme 2011-2012
 
Self-service Linked Government Data
Self-service Linked Government DataSelf-service Linked Government Data
Self-service Linked Government Data
 
Towards Social semantic journalism
Towards Social semantic journalismTowards Social semantic journalism
Towards Social semantic journalism
 
Federating Distributed Social Data to Build an Interlinked Online Information...
Federating Distributed Social Data to Build an Interlinked Online Information...Federating Distributed Social Data to Build an Interlinked Online Information...
Federating Distributed Social Data to Build an Interlinked Online Information...
 
Making sense out of disagreement, University of Limerick Interaction Design C...
Making sense out of disagreement, University of Limerick Interaction Design C...Making sense out of disagreement, University of Limerick Interaction Design C...
Making sense out of disagreement, University of Limerick Interaction Design C...
 
Service Integration - A Web of Things Perspective
Service Integration - A Web of Things PerspectiveService Integration - A Web of Things Perspective
Service Integration - A Web of Things Perspective
 
Enterprise Energy Management using a Linked Dataspace for Energy Intelligence
Enterprise Energy Management using a Linked Dataspace for Energy IntelligenceEnterprise Energy Management using a Linked Dataspace for Energy Intelligence
Enterprise Energy Management using a Linked Dataspace for Energy Intelligence
 
A PLATFORM FOR LEARNING INTERNET OF THINGS
A PLATFORM FOR LEARNING INTERNET OF THINGSA PLATFORM FOR LEARNING INTERNET OF THINGS
A PLATFORM FOR LEARNING INTERNET OF THINGS
 
Knowledge management on the desktop
Knowledge management on the desktopKnowledge management on the desktop
Knowledge management on the desktop
 
Open data showcase
Open data showcaseOpen data showcase
Open data showcase
 
IUI 2010: An Informal Summary of the International Conference on Intelligent ...
IUI 2010: An Informal Summary of the International Conference on Intelligent ...IUI 2010: An Informal Summary of the International Conference on Intelligent ...
IUI 2010: An Informal Summary of the International Conference on Intelligent ...
 
6 - Making Information Pay 2011 -- SOLOMON, MADI (Pearson)
6 - Making Information Pay 2011 -- SOLOMON, MADI (Pearson)6 - Making Information Pay 2011 -- SOLOMON, MADI (Pearson)
6 - Making Information Pay 2011 -- SOLOMON, MADI (Pearson)
 

Semelhante a An architecture for privacy-enabled user profile portability on the Web of Data

Aggregated, Interoperable and Multi-Domain User Profiles for the Social Web
Aggregated, Interoperable and Multi-Domain User Profiles for the Social WebAggregated, Interoperable and Multi-Domain User Profiles for the Social Web
Aggregated, Interoperable and Multi-Domain User Profiles for the Social WebFabrizio Orlandi
 
Multi-Source Provenance-Aware User Interest Profiling on the Social Semantic Web
Multi-Source Provenance-Aware User Interest Profiling on the Social Semantic WebMulti-Source Provenance-Aware User Interest Profiling on the Social Semantic Web
Multi-Source Provenance-Aware User Interest Profiling on the Social Semantic WebFabrizio Orlandi
 
Research, the Cloud, and the IRB
Research, the Cloud, and the IRBResearch, the Cloud, and the IRB
Research, the Cloud, and the IRBMichael Zimmer
 
Linked Building (Energy) Data
Linked Building (Energy) DataLinked Building (Energy) Data
Linked Building (Energy) DataEdward Curry
 
Security in Web 2.0, Social Web and Cloud
Security in Web 2.0, Social Web and CloudSecurity in Web 2.0, Social Web and Cloud
Security in Web 2.0, Social Web and CloudITDogadjaji.com
 
Social Sharing In a Web of Things
Social Sharing In a Web of ThingsSocial Sharing In a Web of Things
Social Sharing In a Web of ThingsDominique Guinard
 
Linked Data: opportunities and challenges
Linked Data: opportunities and challengesLinked Data: opportunities and challenges
Linked Data: opportunities and challengesMichael Hausenblas
 
Everything Self-Service:Linked Data Applications with the Information Workbench
Everything Self-Service:Linked Data Applications with the Information WorkbenchEverything Self-Service:Linked Data Applications with the Information Workbench
Everything Self-Service:Linked Data Applications with the Information WorkbenchPeter Haase
 
Cloud computing in academic libraries
Cloud computing in academic librariesCloud computing in academic libraries
Cloud computing in academic librariesErik Mitchell
 
AIIM Cloud Collaboration Presentation Jan. 2012
AIIM Cloud Collaboration Presentation Jan. 2012AIIM Cloud Collaboration Presentation Jan. 2012
AIIM Cloud Collaboration Presentation Jan. 2012Porter-Roth Associates
 
Preserving Privacy Policy- Preserving public auditing for data in the cloud
	Preserving Privacy Policy- Preserving public auditing for data in the cloud	Preserving Privacy Policy- Preserving public auditing for data in the cloud
Preserving Privacy Policy- Preserving public auditing for data in the cloudinventionjournals
 
InfoFusion Overview And Roadmap
InfoFusion Overview And RoadmapInfoFusion Overview And Roadmap
InfoFusion Overview And RoadmapMarten den Haring
 
Dcat - Machine Accessible Data Catalogues
Dcat - Machine Accessible Data CataloguesDcat - Machine Accessible Data Catalogues
Dcat - Machine Accessible Data CataloguesFadi Maali
 
Ensuring distributed accountability for data sharing in the cloud
Ensuring distributed accountability for data sharing in the cloudEnsuring distributed accountability for data sharing in the cloud
Ensuring distributed accountability for data sharing in the cloudGowthami Konakanchi
 
WikiSym2012 Deletion Discussions in Wikipedia: Decision Factors and Outcomes
WikiSym2012 Deletion Discussions in Wikipedia: Decision Factors and OutcomesWikiSym2012 Deletion Discussions in Wikipedia: Decision Factors and Outcomes
WikiSym2012 Deletion Discussions in Wikipedia: Decision Factors and Outcomesjodischneider
 
CISO's Guide to Securing SharePoint
CISO's Guide to Securing SharePointCISO's Guide to Securing SharePoint
CISO's Guide to Securing SharePointImperva
 
Towards Lightweight Cyber-Physical Energy Systems using Linked Data, the Web ...
Towards Lightweight Cyber-Physical Energy Systems using Linked Data, the Web ...Towards Lightweight Cyber-Physical Energy Systems using Linked Data, the Web ...
Towards Lightweight Cyber-Physical Energy Systems using Linked Data, the Web ...Edward Curry
 

Semelhante a An architecture for privacy-enabled user profile portability on the Web of Data (20)

Aggregated, Interoperable and Multi-Domain User Profiles for the Social Web
Aggregated, Interoperable and Multi-Domain User Profiles for the Social WebAggregated, Interoperable and Multi-Domain User Profiles for the Social Web
Aggregated, Interoperable and Multi-Domain User Profiles for the Social Web
 
Multi-Source Provenance-Aware User Interest Profiling on the Social Semantic Web
Multi-Source Provenance-Aware User Interest Profiling on the Social Semantic WebMulti-Source Provenance-Aware User Interest Profiling on the Social Semantic Web
Multi-Source Provenance-Aware User Interest Profiling on the Social Semantic Web
 
Research, the Cloud, and the IRB
Research, the Cloud, and the IRBResearch, the Cloud, and the IRB
Research, the Cloud, and the IRB
 
Lgd 2
Lgd 2Lgd 2
Lgd 2
 
Linked Building (Energy) Data
Linked Building (Energy) DataLinked Building (Energy) Data
Linked Building (Energy) Data
 
Security in Web 2.0, Social Web and Cloud
Security in Web 2.0, Social Web and CloudSecurity in Web 2.0, Social Web and Cloud
Security in Web 2.0, Social Web and Cloud
 
Social Sharing In a Web of Things
Social Sharing In a Web of ThingsSocial Sharing In a Web of Things
Social Sharing In a Web of Things
 
How to Publish Open Data
How to Publish Open DataHow to Publish Open Data
How to Publish Open Data
 
Linked Data: opportunities and challenges
Linked Data: opportunities and challengesLinked Data: opportunities and challenges
Linked Data: opportunities and challenges
 
Everything Self-Service:Linked Data Applications with the Information Workbench
Everything Self-Service:Linked Data Applications with the Information WorkbenchEverything Self-Service:Linked Data Applications with the Information Workbench
Everything Self-Service:Linked Data Applications with the Information Workbench
 
Cloud computing in academic libraries
Cloud computing in academic librariesCloud computing in academic libraries
Cloud computing in academic libraries
 
AIIM Cloud Collaboration Presentation Jan. 2012
AIIM Cloud Collaboration Presentation Jan. 2012AIIM Cloud Collaboration Presentation Jan. 2012
AIIM Cloud Collaboration Presentation Jan. 2012
 
Preserving Privacy Policy- Preserving public auditing for data in the cloud
	Preserving Privacy Policy- Preserving public auditing for data in the cloud	Preserving Privacy Policy- Preserving public auditing for data in the cloud
Preserving Privacy Policy- Preserving public auditing for data in the cloud
 
InfoFusion Overview And Roadmap
InfoFusion Overview And RoadmapInfoFusion Overview And Roadmap
InfoFusion Overview And Roadmap
 
Dcat - Machine Accessible Data Catalogues
Dcat - Machine Accessible Data CataloguesDcat - Machine Accessible Data Catalogues
Dcat - Machine Accessible Data Catalogues
 
Ensuring distributed accountability for data sharing in the cloud
Ensuring distributed accountability for data sharing in the cloudEnsuring distributed accountability for data sharing in the cloud
Ensuring distributed accountability for data sharing in the cloud
 
WikiSym2012 Deletion Discussions in Wikipedia: Decision Factors and Outcomes
WikiSym2012 Deletion Discussions in Wikipedia: Decision Factors and OutcomesWikiSym2012 Deletion Discussions in Wikipedia: Decision Factors and Outcomes
WikiSym2012 Deletion Discussions in Wikipedia: Decision Factors and Outcomes
 
CISO's Guide to Securing SharePoint
CISO's Guide to Securing SharePointCISO's Guide to Securing SharePoint
CISO's Guide to Securing SharePoint
 
JeromeDL Tutorial
JeromeDL TutorialJeromeDL Tutorial
JeromeDL Tutorial
 
Towards Lightweight Cyber-Physical Energy Systems using Linked Data, the Web ...
Towards Lightweight Cyber-Physical Energy Systems using Linked Data, the Web ...Towards Lightweight Cyber-Physical Energy Systems using Linked Data, the Web ...
Towards Lightweight Cyber-Physical Energy Systems using Linked Data, the Web ...
 

Mais de Benjamin Heitmann

A new direction for recommender systems: balancing privacy and personalisation
A new direction for recommender systems: balancing privacy and personalisationA new direction for recommender systems: balancing privacy and personalisation
A new direction for recommender systems: balancing privacy and personalisationBenjamin Heitmann
 
Benjamin Heitmann, PhD defence talk: An Open Framework for Multi-source, Cro...
Benjamin Heitmann, PhD defence talk: An Open Framework for Multi-source, Cro...Benjamin Heitmann, PhD defence talk: An Open Framework for Multi-source, Cro...
Benjamin Heitmann, PhD defence talk: An Open Framework for Multi-source, Cro...Benjamin Heitmann
 
Representing discourse and argumentation as an application of Web Science
Representing discourse and argumentation as an application of Web ScienceRepresenting discourse and argumentation as an application of Web Science
Representing discourse and argumentation as an application of Web ScienceBenjamin Heitmann
 
Web Science: Motivation, Goals and Contributions
Web Science: Motivation, Goals and ContributionsWeb Science: Motivation, Goals and Contributions
Web Science: Motivation, Goals and ContributionsBenjamin Heitmann
 
Lessons learned from Futures Studies: Towards a method for Web Science
Lessons learned from Futures Studies: Towards a method for Web ScienceLessons learned from Futures Studies: Towards a method for Web Science
Lessons learned from Futures Studies: Towards a method for Web ScienceBenjamin Heitmann
 
Applying the scientific method in Software Evaluation
Applying the scientific method in Software EvaluationApplying the scientific method in Software Evaluation
Applying the scientific method in Software EvaluationBenjamin Heitmann
 

Mais de Benjamin Heitmann (6)

A new direction for recommender systems: balancing privacy and personalisation
A new direction for recommender systems: balancing privacy and personalisationA new direction for recommender systems: balancing privacy and personalisation
A new direction for recommender systems: balancing privacy and personalisation
 
Benjamin Heitmann, PhD defence talk: An Open Framework for Multi-source, Cro...
Benjamin Heitmann, PhD defence talk: An Open Framework for Multi-source, Cro...Benjamin Heitmann, PhD defence talk: An Open Framework for Multi-source, Cro...
Benjamin Heitmann, PhD defence talk: An Open Framework for Multi-source, Cro...
 
Representing discourse and argumentation as an application of Web Science
Representing discourse and argumentation as an application of Web ScienceRepresenting discourse and argumentation as an application of Web Science
Representing discourse and argumentation as an application of Web Science
 
Web Science: Motivation, Goals and Contributions
Web Science: Motivation, Goals and ContributionsWeb Science: Motivation, Goals and Contributions
Web Science: Motivation, Goals and Contributions
 
Lessons learned from Futures Studies: Towards a method for Web Science
Lessons learned from Futures Studies: Towards a method for Web ScienceLessons learned from Futures Studies: Towards a method for Web Science
Lessons learned from Futures Studies: Towards a method for Web Science
 
Applying the scientific method in Software Evaluation
Applying the scientific method in Software EvaluationApplying the scientific method in Software Evaluation
Applying the scientific method in Software Evaluation
 

Último

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 

Último (20)

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 

An architecture for privacy-enabled user profile portability on the Web of Data

  • 1. Digital Enterprise Research Institute www.deri.ie An architecture for privacy-enabled user profile portability on the Web of Data Benjamin Heitmann, James G. Kim, Alexandre Passant, Conor Hayes, Hong-Gee Kim Funded by Science Foundation Ireland under Grant No. SFI/08/CE/I1380 (Líon-2)  Copyright 2009 Digital Enterprise Research Institute. All rights reserved. Chapter
  • 2. Motivation Digital Enterprise Research Institute www.deri.ie  Rec. Systems can benefit from external data sources:  e.g. for cold-start problem ?  New paradigm shifts require external data:  beyond single site context data recommendations  beyond single domain sharing  Challenge: sharing of profile data  Maintain privacy of user (“public by default” is not enough) Benjamin.Heitmann slide 2 of 11 @deri.org
  • 3. Outline Digital Enterprise Research Institute www.deri.ie  The challenge: portable and private user profiles  Background: Introducing Linked Data  An architecture to enable portable and private user profiles  Foundation standards  Roles  Communication pattern  Qualitative evaluation  Related work Benjamin.Heitmann slide 3 of 11 @deri.org
  • 4. The challenge: portable and private user profiles Digital Enterprise Research Institute www.deri.ie  Current eco-systems:  hub site: centralised express user profile storage preference authentication e.g. Facebook, Twitter for user action  users profiles: secure and private, but no web site interaction portability.  third party services: can cross domain data sharing access user profile if if authorised authorised, e.g. by user TweetMeme or Flickr  closed system  Users are locked into an ecosystem, no portability  Challenge: open recommendations for alternative with portability external site provided by and privacy! facebook (at the same time) Benjamin.Heitmann slide 4 of 11 @deri.org
  • 5. Background: The Web of Data and Linked Data Digital Enterprise Research Institute www.deri.ie  the Web of Data provides:  structured data, collaboratively created, about object centred sociality  domain knowledge through ontologies (e.g. DBpedia ontology)  cross-domain links between sources  Linked Data principles: 1. use URIs “for everything” 2. allow HTTP access to all URIs 3. when accessing a URI, provide relevant data in RDF 4. include links to URIs from third Linking Open Data (LOD) cloud, as of October 2010 parties (background knowledge) Benjamin.Heitmann slide 5 of 11 @deri.org
  • 6. Foundation standards Digital Enterprise Research Institute www.deri.ie no logo  WebIDs:  WebAccess  FOAF profiles:  user Control (WAC)  domain authentication vocabulary: independent user without passwords profiles  resource access  publish public key authorisation  described using in FOAF profile the Friend-of-a-  defines whitelist  store private key in Friend (FOAF) for a resource browser vocabulary access by third  decentralised parties  can contain any authentication structured data,  can be used for schema e.g. activity streams “private by default” mode Benjamin.Heitmann slide 6 of 11 @deri.org
  • 7. Alternative: architecture for private and portable user profiles Digital Enterprise Research Institute www.deri.ie  User profile:  Profile data expressed WebID using RDF (FOAF+SIOC)  WebID provides identity private key public key (2 parts) – private SSL Key in user agent – public SSL Key in FOAF user agent FOAF Profile profile  Roles: stored  user agents: manage user in identities  profile storage service: retrieves user profile stores 1 or many profiles if user authorises it profile storage site data consumer  data consumers: provide services for users Benjamin.Heitmann slide 7 of 11 @deri.org
  • 8. Communication pattern of the proposed architecture Digital Enterprise Research Institute www.deri.ie WebID private key public key Storage URI user agent FOAF Profile stored in profile storage site Benjamin.Heitmann slide 8 of 11 @deri.org
  • 9. Communication pattern of the proposed architecture Digital Enterprise Research Institute www.deri.ie  Scenario: recommend patients with similar treatments WebID  Assumption: user is logged into Openbook private key public key Storage URI user agent FOAF Profile stored in profile storage site Benjamin.Heitmann slide 8 of 11 @deri.org
  • 10. Communication pattern of the proposed architecture Digital Enterprise Research Institute www.deri.ie  Scenario: recommend patients with similar treatments WebID  Assumption: user is logged into Openbook private key public key 1. User searches for PatiensLikeMe Storage URI user agent FOAF Profile Any patients stored like me? in profile storage site data consumer Benjamin.Heitmann slide 8 of 11 @deri.org
  • 11. Communication pattern of the proposed architecture Digital Enterprise Research Institute www.deri.ie  Scenario: recommend patients with similar treatments WebID  Assumption: user is logged into Openbook private key public key 1. User searches for PatiensLikeMe Storage URI 2. PatientsLikeMe (PLM) gets profile storage URI via Firefox user agent FOAF Profile Firefox stored provides in storage URI profile storage site data consumer Benjamin.Heitmann slide 8 of 11 @deri.org
  • 12. Communication pattern of the proposed architecture Digital Enterprise Research Institute www.deri.ie  Scenario: recommend patients with similar treatments WebID  Assumption: user is logged into Openbook private key public key 1. User searches for PatiensLikeMe Storage URI 2. PatientsLikeMe (PLM) gets profile storage URI via Firefox user agent 3. PLM redirects Firefox to FOAF Profile Openbook for authorisation redirect to stored openbook in for authorisation profile storage site data consumer Benjamin.Heitmann slide 8 of 11 @deri.org
  • 13. Communication pattern of the proposed architecture Digital Enterprise Research Institute www.deri.ie  Scenario: recommend patients with similar treatments WebID  Assumption: user is logged into Openbook private key public key 1. User searches for PatiensLikeMe Storage URI 2. PatientsLikeMe (PLM) gets profile storage URI via Firefox user agent 3. PLM redirects Firefox to FOAF Profile Openbook for authorisation User authorises stored 4. User authorises Openbook to Openbook to in show parts of show some profile parts to PLM profile to PLM (new WAC entry gets created) profile storage site data consumer Benjamin.Heitmann slide 8 of 11 @deri.org
  • 14. Communication pattern of the proposed architecture Digital Enterprise Research Institute www.deri.ie  Scenario: recommend patients with similar treatments WebID  Assumption: user is logged into Openbook private key public key 1. User searches for PatiensLikeMe Storage URI 2. PatientsLikeMe (PLM) gets profile storage URI via Firefox user agent 3. PLM redirects Firefox to FOAF Profile Openbook for authorisation stored 4. User authorises Openbook to in show some profile parts to PLM (new WAC entry gets created) 5.Openbook redirects to PLM redirect back to profile storage site PatientsLikeMe data consumer Benjamin.Heitmann slide 8 of 11 @deri.org
  • 15. Communication pattern of the proposed architecture Digital Enterprise Research Institute www.deri.ie  Scenario: recommend patients with similar treatments WebID  Assumption: user is logged into Openbook private key public key 1. User searches for PatiensLikeMe Storage URI 2. PatientsLikeMe (PLM) gets profile storage URI via Firefox user agent 3. PLM redirects Firefox to FOAF Profile Openbook for authorisation stored 4. User authorises Openbook to in show some profile parts to PLM PatientsLikeMe retrieves profile (new WAC entry gets created) parts now 5.Openbook redirects to PLM profile storage site 6.Now PLM accesses parts of profile data on openbook data consumer Benjamin.Heitmann slide 8 of 11 @deri.org
  • 16. Qualitative evaluation Digital Enterprise Research Institute www.deri.ie  Based on evaluation framework for privacy enhanced technologies by Wang+Kobsa [20,15]  Protection of identity:  user can create and choose identities without constraints  allows pseudonymity, unobservability, deniability, anonymity  alternatively identities can be assigned by organisations  Control over user data:  profile data can be optionally self-hosted  open standards allow portability, no lock-in to any ecosystem  Non-functional requirements:  Universality: one universal, standards based eco-system  Scalability: no bottlenecks or central points of failure  Reuse of infrastructure: standards from WWW and Web of Data are reused Benjamin.Heitmann slide 9 of 11 @deri.org
  • 17. Related work (“the competition”) Digital Enterprise Research Institute www.deri.ie no logo  OpenID:  OAuth:  OpenID attribute  user authentication  resource access exchange: without passwords authorisation  protocol for  1 billion accounts, 9  defines protocol for exchanging profile million sites 3rd parties to access data  requires user resources  very limited interaction  manages access via vocabulary  not scalable, due to tokens  inflexible and hard to number of HTTP  high HTTP extend connections required connection overhead  has not reached  fragmentation industry adoption (Twitter vs Facebook) Benjamin.Heitmann slide 10 of 11 @deri.org
  • 18. Summary Digital Enterprise Research Institute www.deri.ie  coming paradigm shifts towards social eco-systems:  recommendations in a multi-site and cross-domain context  current eco-systems are built around centralised and closed hub sites  alternative: eco-systems centred around secure and portable user profiles (“private by default”)  foundation: WebIDs and FOAF profiles  provides incentives for users to share their profile data  can enable a universal, decentralised social eco-system  Future work: implement and evaluate prototype with all parties in a cross-domain setting Benjamin.Heitmann slide 11 of 11 @deri.org