<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">User-Defined Rules in a Distributed Address Book</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">Hannes</forename><surname>Mühleisen</surname></persName>
							<affiliation key="aff0">
								<orgName type="department">Department of Computer Science</orgName>
								<orgName type="institution">Freie Universität Berlin</orgName>
								<address>
									<addrLine>Königin-Luise-Str. 24/26</addrLine>
									<postCode>14195</postCode>
									<settlement>Berlin</settlement>
									<country key="DE">Germany</country>
								</address>
							</affiliation>
						</author>
						<author role="corresp">
							<persName><forename type="first">Adrian</forename><surname>Paschke</surname></persName>
							<email>paschke@inf.fu-berlin.de</email>
							<affiliation key="aff0">
								<orgName type="department">Department of Computer Science</orgName>
								<orgName type="institution">Freie Universität Berlin</orgName>
								<address>
									<addrLine>Königin-Luise-Str. 24/26</addrLine>
									<postCode>14195</postCode>
									<settlement>Berlin</settlement>
									<country key="DE">Germany</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">User-Defined Rules in a Distributed Address Book</title>
					</analytic>
					<monogr>
						<imprint>
							<date/>
						</imprint>
					</monogr>
					<idno type="MD5">BA04F5451749EF46CADEBEA93E17DD2C</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2023-03-24T03:42+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>The Semantic Web as an evolution of the World Wide Web allows its users to share content over the boundaries of applications and web sites. However, current web-based systems for the controlled distribution of private information require the presence of information on centralized systems. A potential risk for the user is the central system operator which has full access to all stored information. Moreover, if a malicious user gets unauthorized access to the operator's management rights, the information stored by all users is exposed. In this paper, we demonstrate our alternative approach of a distributed address book, where users can store their information on a system under their own control. A special focus in our implementation was on the usability, in particular for the complex rule generation and processing chain, so that any user familiar with social network software is able to formulate access policies.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1">Introduction and Motivation</head><p>The Semantic Web as an evolution of the World Wide Web allows its users to share content over the boundaries of applications and web sites. To achieve this goal, the resources of the WWW are annotated using machine-readable meta data. The principles of Linked Data <ref type="bibr" target="#b1">[2]</ref> describe a set of conventions how this meta data should be structured and published, so information can be re-combined and processed at an arbitrary location.</p><p>Conventional web-based systems for the controlled distribution of private information require the presence of information on centralized systems. In order to control the access to the managed information, these systems usually support secured data storage, access policies for the stored data and user authentication. Examples for such systems include various social networks: all users sign in on a central website to store their information there. Users configure their privacy settings on that website, for instance to reveal their telephone number only to a particular group of authorized users. However, a potential risk for the user is the central system operator which has full access to all stored user information. The user cannot necessarily trust the operator. Moreover, if a malicious user gets unauthorized access to the operator's management rights, the information stored by all users is exposed and each user's privacy is endangered.</p><p>We have developed a decentralized method for enforcing distributed user-defined access policies on Semantic Web data encoded in the Resource Description Format (RDF) <ref type="bibr" target="#b3">[4]</ref> in a concept called the "Policy enabled Linked Data Server" PeLDS <ref type="bibr" target="#b5">[6,</ref><ref type="bibr" target="#b4">5]</ref>. In this paper, we demonstrate our alternative approach of a distributed address book, where users can store their information on a system under their own control. Integration with other users on other systems is easily possible, and the access to the stored information can be controlled by the users themselves.</p><p>The remainder of this paper is structured as follows: Section 2 describes the basic concepts for protecting information published as linked data with the definition and enforcement of access policies. Our back-end system, the Policy-enabled Linked Data Server is introduced shortly. Subsequently, Section 3 describes our Distributed Address Book application, its system architecture and user interaction concept. Finally, Section 4 concludes this paper.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2">Linked Data with Access Policies</head><p>Access policies are rules which describe the situations in which different pieces of information are made available to others. In order to express access policies for an RDF graph, the user has to describe those parts of the graph to be affected by a particular rule. This process can be compared to a "classification" of a document with sensitive contents. We have identified two levels for feasible data classification in Semantic Web data: the data model level and the semantic level. RDF Graphs can be decomposed into triples containing a subject, a predicate and an object element. These triples belong to the data model level. Resource descriptions, their affiliation with concepts and relationships to other resources are on the semantic level.</p><p>The Semantic Web Rule Language (SWRL) is a W3C member submission of the RuleML Datalog rule interchange language with additional OWL literals for Semantic Web ontology data <ref type="bibr" target="#b2">[3]</ref>. SWRL rules can be evaluated by a reasoning program such as Pellet<ref type="foot" target="#foot_0">1</ref> , KAON2 or RacerPro. SWRL rules can be represented using an RDF graph, and thus allow easy rule handling along with the RDF graphs containing the information to be protected. SWRL supports a number of predicates designed to enable access to the information encoded in RDF. Our PeLDS concept uses SWRL for the expression of access policies.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.1">The Policy enabled Linked Data Server</head><p>The main feature for our concept of a Policy-enabled Linked Data Server is to provide a semantic storage system which allows its users to specify which elements of their RDF graphs are published to which user. This is achieved by calculating a temporary constructive view on the stored graphs that contains only those elements the querying user has been authorized to retrieve by the publishing user. To facilitate the easy description of access policies, we have developed a rule-based access policy format based on SWRL <ref type="bibr" target="#b5">[6,</ref><ref type="bibr">Sec. 4.1]</ref>.</p><p>Users publishing data on the system can define an access policy for each dataset they have created. The system guarantees the enforcement of a valid policy during each operation involving this dataset. Each rule consists of a label, a rule antecedent describing the condition under which the rule is satisfied and a consequent. Both the antecedent and the consequent contain a collection of logical predicates joined by the logical AND condition. In addition to all of SWRL's predicates, our policy language supports custom predicates enabling data classification for single triples and resources as well as instances of specific classes.</p><p>Listing 1.1 gives an example of an access policy containing a single rule. The rule expresses the following notion: the user "Bob" is permitted to access the phone number of the user "Alice"'. The rule is labeled phoneRule and contains two antecedent predicates. The first predicate specifies the ?action resource to be an instance of the concept QueryAction, the second predicate requires the actor resource to have http://example.com/bob as the value for its actor property. The consequent consists of a data classification predicate covering all triples with resource http://example.com-/alice, property ex:phone, and arbitrary values. p h o n e R u l e : Q u e r y A c t i o n ( ? a c t i o n ) &amp;&amp; a c t o r ( ? a c t i o n , h t t p : / / e x a m p l e . com / bob ) =&gt; p e r m i t t r i p l e ( h t t p : / / e x a m p l e . com / a l i c e , ex : phone , * ) ; Listing 1.1. Example access policy</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3">The Distributed Address Book</head><p>Our demonstration application is a distributed address book designed as a web-based application which is run from a standard web browser. As one would expect from an address book application, users can add, view and remove contacts, and also organize their contacts into groups. Users are able to change their own address book entry. In contrast to most previous systems, users are able to securely integrate their contact information with other users using different installations of the application without any form of previous setup. A special focus in our implementation was on the usability, in particular for the complex rule generation and processing chain, so that any user familiar with social network software is able to formulate access policies. The address book is using the PeLDS system only as a storage back-end, and all data concerning other users is retrieved on-the-fly using Linked Data concepts. Users define access policies using a set of pre-defined building blocks to secure their data.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.1">System Architecture</head><p>Fig. <ref type="figure" target="#fig_0">1</ref> shows the two main parts of the Distributed Address Book: Addressbook Client is a JavaScript application running inside the user's web browser. The common combination of HTML and CSS is used to present information to the user. The client is sending HTTP requests to the corresponding Addressbook Server. This server is a PHP application which uses the ARC RDF library 2 for dereferencing and the access to the PeLDS back-end storage. The PHP interpreter is run in an instance of the Apache HTTP server. All persistent user data as well as access policies are stored inside a PeLDS instance. The access to this data is performed using the RDF query language SPARQL <ref type="bibr" target="#b6">[7]</ref> for query operations and SPARQL/Update <ref type="bibr" target="#b7">[8]</ref> for update operations. </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.2">Contact Information and Access Policy Input</head><p>User profiles consist of various fields, and the application is generating the input form using a configuration file. This configuration defines the following properties for each field: (1) the form elements the user inputs his data in, (2) a method to check whether these inputs are valid, (3) a method to convert the data given by the user into RDF, (4) a method to load the form data from RDF, and (5) a method to generate a rule consequence fitting to the RDF snippet of this field. This way, the entire process of loading the current values into the generated profile form, validating all values, and creating the RDF graph corresponding to the submitted values is very flexible and customizable. The application itself on the other hand defines various visibility levels, which then form the rule antecedents. At the moment, five visibility levels are implemented and selectable for each field:</p><p>1. Public -Field entries are made available to all users and clients, even without authentication. 2. All contacts -Field entries are only visible to users, who have been added as a contact by the current user. 3. Group (requires group selection) -Field entries are only visible to users which have been added to the selected contacts group by the current user. 4. Contact (requires contact selection) -Field entries are only visible to the selected user. 5. hidden -Field entries are only visible to the user that has created them. Fig. <ref type="figure" target="#fig_1">2</ref> shows an example for the profile view for the user "Bob". Three fields are defined, "Name", "Phone", and "GPS-Position". Bob has chosen for his name to be visible to everybody, his phone number to be visible to all his contacts, and his GPS Position only to be visible to the members of the contacts group "Family" he has defined. From this input, the address book generates an RDF graph shown in Listing 1.2 encoded in the N3 RDF format <ref type="bibr" target="#b0">[1]</ref> and an access policy consisting of three rules shown in Listing 1.3 in the PsSF language that can be evaluated by the PeLDS system. The first rule in the access policy, AddressbookDocument [. . . ] name, defines Bob's phone number to be publicly available. The rule condition sets no constraint on the client, it just specifies the request (?action) to be a query operation. The consequence consists of a data classification predicate permit triple, this way the triple (http://[...]/ruleml,foaf:name,"Bob RuleML") containing Bob's full name is marked to be affected by this rule using the wild card "*" and is thus made available to all other users.</p><p>The second rule, AddressbookDocument [. . . ] phone makes Bob's phone available to contacts. The rule conditions therefore contain not only the restriction for the current request to be a query in the first predicate (as before), but also puts constraints on the querying user (actor), who has to be the entity responsible for the current action according to the second predicate. The third condition predicate then requires a triple defining the querying user to be known by Bob. The consequence is defined analog to the first rule.</p><p>Finally, the third rule AddressbookDocument [. . . ] pos describes the access conditions for Bob's GPS position, which only members of the "Family" contact group are able to see. As in the second rule, the first three predicates of the rule condition only match if the querying user is in the contact list of Bob, the fourth predicate then checks for the membership of the contact in the "Family" group. The consequence contains a more complex data classification: Since the position is a complex object consisting of latitude and longitude, it is more efficient to perform a instance-classification on the class geo:Point. The reference to this instance is classified using a simple triple pattern with the foaf:based near predicate. </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.3">Access to Contact Information</head><p>Users can add contacts to their address book using their URL as an identifier and link to the remote contact data. Contrary to current systems, our Distributed Address Book allows the addition of users on different Addressbook servers. Data retrieval is then performed on the fly using Linked Data dereferencing. The information retrieved is controlled by the respective PeLDS instances, and the Addressbook Client component authenticates itself against every remote node it retrieves data from using the FOAF+SSL verification method.</p><p>As shown in Fig. <ref type="figure" target="#fig_4">3</ref>, the Addressbook client displays a contact and a group list to the user, which can then choose a contact to display his or her details. Continuing our example from the previous section, Alice has successfully logged into the Distributed Address Book and added Bob as a contact using his URL. Also, she has created a group "Family", and added Bob to it. Now, she selected the group "Family" in the left column to list all contacts, and then chose the contact "Bob RuleML" in the center colum to display Bob's contact details in the right column. Bob's name, phone number, and current positions are displayed. Alice is able to see all this, because Bob's access policy permits her to see this information. </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4">Conclusion</head><p>We have motivated the need for an architectural change in web-based computer systems storing private information. We have introduced our concept of protecting information published as Linked Data using access policies consisting of declarative access rules. Our concept of the Policy enabled Linked Data Server was described shortly. The main topic of this paper was the architecture and user interaction of our prototype of a Distributed Address Book. The Distributed Address Book enables its users to store contact information on a system they trust, and also makes secure integration with users of other systems possible. Users are able to create access policies themselves by following the template structure offered to them in the application. From the user's choices, an individual access policy is compiled, stored, and enforced. The described system is available on-line at http://contacts.pelds.org, its source code can be downloaded at http://www.pelds.org.</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head>Fig. 1 .</head><label>1</label><figDesc>Fig. 1. Distributed Address Book -Components</figDesc><graphic coords="4,308.92,253.75,107.20,132.26" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_1"><head>Fig. 2 .</head><label>2</label><figDesc>Fig. 2. Bob's Account Settings</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_2"><head>&lt;</head><label></label><figDesc>h t t p : / / c o n t a c t s . p e l d s . o r g / r u l e m l &gt; f o a f : name " Bob RuleML " . &lt; h t t p : / / c o n t a c t s . p e l d s . o r g / r u l e m l &gt; f o a f : phone "+1 −(617) −253 −5702" . &lt; h t t p : / / c o n t a c t s . p e l d s . o r g / r u l e m l &gt; f o a f : b a s e d n e a r : p o s . : p o s r d f : t y p e geo : P o i n t . : p o s geo : l a t " 3 8 . 8 3 " . : p o s geo : l o n g " −77.11" . &lt; h t t p : / / c o n t a c t s . p e l d s . o r g / r u l e m l &gt; f o a f : knows &lt; h t t p : / / c o n t a c t s . p e l d s . o r g / a l i c e 2 &gt; . Listing 1.2. RDF graph created for Bob</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_3"><head></head><label></label><figDesc>A d d r e s s b o o k D o c u m e n t R d f I n p u t T e x t R d f V i s i b i l i t y W o r l d n a m e : p e l d s : Q u e r y A c t i o n ( ? a c t i o n ) =&gt; p e r m i t t r i p l e ( h t t p : / / c o n t a c t s . p e l d s . o r g / r u l e m l , f o a f : name , * ) ; A d d r e s s b o o k D o c u m e n t R d f I n p u t T e x t R d f V i s i b i l i t y A l l C o n t a c t s p h o n e : p e l d s : Q u e r y A c t i o n ( ? a c t i o n ) &amp;&amp; p e l d s : a c t o r ( ? a c t i o n , ? a c t o r ) &amp;&amp; f o a f : knows ( h t t p : / / c o n t a c t s . p e l d s . o r g / r u l e m l , ? a c t o r ) =&gt; p e r m i t t r i p l e ( h t t p : / / c o n t a c t s . p e l d s . o r g / r u l e m l , f o a f : phone , * ) ; A d d r e s s b o o k D o c u m e n t R d f I n p u t P o s R d f V i s i b i l i t y G r o u p p o s : p e l d s : Q u e r y A c t i o n ( ? a c t i o n ) &amp;&amp; p e l d s : a c t o r ( ? a c t i o n , ? a c t o r ) &amp;&amp; f o a f : knows ( h t t p : / / c o n t a c t s . p e l d s . o r g / r u l e m l , ? a c t o r ) &amp;&amp; f o a f : member ( h t t p : / / c o n t a c t s . p e l d s . o r g / r u l e m l / g r o u p / f a m i l y , ? a c t o r ) =&gt; p e r m i t t r i p l e ( h t t p : / / c o n t a c t s . p e l d s . o r g / r u l e m l , f o a f : b a s e d n e a r , * ) &amp;&amp; p e r m i t i n s t a n c e ( geo : P o i n t ) ; Listing 1.3. Access Policy for Bob</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_4"><head>Fig. 3 .</head><label>3</label><figDesc>Fig. 3. Alice's Contacts View</figDesc></figure>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="1" xml:id="foot_0">http://clarkparsia.com/pellet</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="2" xml:id="foot_1">http://arc.semsol.org</note>
		</body>
		<back>

			<div type="acknowledgement">
<div xmlns="http://www.tei-c.org/ns/1.0"><p>Acknowledgments We would like to acknowledge the contributions of Martin Kost and Johann-Christoph Freytag. This work has been partially supported by the "Inno-Profile Corporate Semantic Web" project funded by the German Federal Ministry of Education and Research (BMBF) and the BMBF Innovation Initiative for the New German Laender -Entrepreneurial Regions.</p></div>
			</div>

			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<monogr>
		<author>
			<persName><forename type="first">T</forename><surname>Berners-Lee</surname></persName>
		</author>
		<ptr target="http://www.w3.org/DesignIssues/Notation3.html" />
		<title level="m">Notation 3</title>
				<imprint>
			<date type="published" when="1998">1998. 2010-04-20</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<monogr>
		<title level="m" type="main">Linked data</title>
		<author>
			<persName><forename type="first">T</forename><surname>Berners-Lee</surname></persName>
		</author>
		<ptr target="http://www.w3.org/DesignIssues/LinkedData.html" />
		<imprint>
			<date type="published" when="2006">2006. 2010-04-20</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<monogr>
		<title level="m" type="main">SWRL: A semantic web rule language</title>
		<author>
			<persName><forename type="first">I</forename><surname>Horrocks</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><forename type="middle">F</forename><surname>Patel-Schneider</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Boley</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Tabet</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Grosof</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Dean</surname></persName>
		</author>
		<ptr target="http://www.w3.org/Submission/SWRL" />
		<imprint>
			<date type="published" when="2004">2004. 2010-04-20</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<monogr>
		<title level="m" type="main">RDF primer</title>
		<author>
			<persName><forename type="first">F</forename><surname>Manola</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Miller</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Mcbride</surname></persName>
		</author>
		<ptr target="http://www.w3.org/TR/rdf-primer/" />
		<imprint>
			<date type="published" when="2004">2004</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<monogr>
		<author>
			<persName><forename type="first">H</forename><surname>Mühleisen</surname></persName>
		</author>
		<ptr target="http://muehleisen.org/da-hm-ld.pdf" />
		<title level="m">Zugriffsrichtlinien und Authentifizierung für Linked-Data-Systeme</title>
				<imprint>
			<date type="published" when="2009">2009</date>
		</imprint>
		<respStmt>
			<orgName>Humboldt-Universität zu Berlin</orgName>
		</respStmt>
	</monogr>
	<note type="report_type">Master&apos;s thesis</note>
</biblStruct>

<biblStruct xml:id="b5">
	<analytic>
		<title level="a" type="main">SWRL-based Access Policies for Linked Data</title>
		<author>
			<persName><forename type="first">H</forename><surname>Mühleisen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Kost</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">C</forename><surname>Freytag</surname></persName>
		</author>
		<ptr target="http://CEUR-WS.org/Vol-576/paper1.pdf" />
	</analytic>
	<monogr>
		<title level="m">Proceedings of the Second Workshop on Trust and Privacy on the Social and Semantic Web (SPOT2010)</title>
				<editor>
			<persName><forename type="first">P</forename><surname>Kärger</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">D</forename><surname>Olmedilla</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">A</forename><surname>Passant</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">A</forename><surname>Polleres</surname></persName>
		</editor>
		<meeting>the Second Workshop on Trust and Privacy on the Social and Semantic Web (SPOT2010)</meeting>
		<imprint>
			<date type="published" when="2010">2010</date>
			<biblScope unit="volume">576</biblScope>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<monogr>
		<title level="m" type="main">SPARQL query language for RDF</title>
		<author>
			<persName><forename type="first">E</forename><surname>Prud'hommeaux</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Seaborne</surname></persName>
		</author>
		<ptr target="http://www.w3.org/TR/rdf-sparql-query/" />
		<imprint>
			<date type="published" when="2008">2008</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<monogr>
		<author>
			<persName><forename type="first">A</forename><surname>Seaborne</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Manjunath</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Bizer</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Breslin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Das</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Davis</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Harris</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Idehen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Corby</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Kjernsmo</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Nowack</surname></persName>
		</author>
		<ptr target="http://www.w3.org/Submission/2008/SUBM-SPARQL-Update-20080715/" />
		<title level="m">SPARQL Update</title>
				<imprint>
			<date type="published" when="2008">2008</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<analytic>
		<title level="a" type="main">FOAF+SSL: RESTful authentication for the social web</title>
		<author>
			<persName><forename type="first">H</forename><surname>Story</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Harbulot</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Jacobi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Jones</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">submitted to Semantic Web Conference</title>
				<imprint>
			<date type="published" when="2009">2009. 2009</date>
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
