SlideShare una empresa de Scribd logo
1 de 18
Descargar para leer sin conexión
Digital Enterprise Research Institute                                                     www.deri.ie




               An architecture for privacy-enabled user profile
                        portability on the Web of Data

                                                 Benjamin Heitmann, James G. Kim,
                                           Alexandre Passant, Conor Hayes, Hong-Gee Kim




              Funded by Science Foundation Ireland under
                  Grant No. SFI/08/CE/I1380 (Líon-2)

 Copyright 2009 Digital Enterprise Research Institute. All rights reserved.
                                                                               Chapter
Motivation
Digital Enterprise Research Institute                                                      www.deri.ie


                                                                   Rec. Systems can
                                                                   benefit from external
                                                                   data sources:
                                                                    e.g. for cold-start
                                                                    problem




                         ?
                                                                   New paradigm shifts
                                                                   require external data:
                                                                    beyond single site
                                                                    context
                         data
                                             recommendations
                                                                      beyond single domain
                        sharing
                                                                Challenge: sharing of
                                                                profile data
                                                                Maintain privacy of
                                                                user (“public by
                                                                default” is not enough)

Benjamin.Heitmann
                             slide 2 of 11
@deri.org
Outline
Digital Enterprise Research Institute                         www.deri.ie



         The challenge: portable and private user profiles

         Background: Introducing Linked Data

         An architecture to enable portable and private
         user profiles
            Foundation standards
            Roles
            Communication pattern


         Qualitative evaluation
         Related work

Benjamin.Heitmann
                             slide 3 of 11
@deri.org
The challenge:
       portable and private user profiles
Digital Enterprise Research Institute                                                         www.deri.ie


                                                                        Current eco-systems:
                                                                          hub site: centralised
                                                express                    user profile storage
                                               preference
                 authentication                                            e.g. Facebook, Twitter
                 for user action                                            users profiles: secure
                                                                            and private, but no
                                                              web site
                                                            interaction     portability.
                                                                            third party services: can
cross domain
 data sharing                                                               access user profile if
if authorised                                                               authorised, e.g.
    by user                                                                 TweetMeme or Flickr
                                                                         closed system
                                                                         Users are locked into an
                                                                          ecosystem, no portability
                                                                         Challenge: open
                               recommendations for                        alternative with portability
                              external site provided by                   and privacy!
                                     facebook
                                                                         (at the same time)


 Benjamin.Heitmann
                             slide 4 of 11
 @deri.org
Background:
       The Web of Data and Linked Data
Digital Enterprise Research Institute                                         www.deri.ie


    the Web of Data provides:
      structured data, collaboratively
      created, about object centred
      sociality
      domain knowledge through
      ontologies (e.g. DBpedia ontology)
      cross-domain links between
      sources
    Linked Data principles:
     1. use URIs “for everything”
     2. allow HTTP access to all URIs
     3. when accessing a URI, provide
      relevant data in RDF
     4. include links to URIs from third     Linking Open Data (LOD) cloud,
                                                    as of October 2010
      parties (background knowledge)

Benjamin.Heitmann
                             slide 5 of 11
@deri.org
Foundation standards
Digital Enterprise Research Institute                                                          www.deri.ie




                                                      no logo




 WebIDs:                                     WebAccess                    FOAF profiles:
        user                                 Control (WAC)                      domain
        authentication                        vocabulary:                        independent user
        without passwords                                                        profiles
                                                  resource access
        publish public key                       authorisation                  described using
        in FOAF profile                                                          the Friend-of-a-
                                                  defines whitelist
        store private key in                                                    Friend (FOAF)
                                                  for a resource
        browser                                                                  vocabulary
                                                  access by third
        decentralised                            parties                        can contain any
        authentication                                                           structured data,
                                                  can be used for
        schema                                                                   e.g. activity streams
                                                  “private by default”
                                                  mode


Benjamin.Heitmann
                             slide 6 of 11
@deri.org
Alternative: architecture for private and
       portable user profiles
Digital Enterprise Research Institute                                                             www.deri.ie


     User profile:
        Profile data expressed                                            WebID
        using RDF (FOAF+SIOC)
        WebID provides identity
                                                             private key           public key
        (2 parts)
          – private SSL Key in user
           agent
          – public SSL Key in FOAF            user agent
                                                                                           FOAF Profile
           profile
     Roles:                                                                             stored
        user agents: manage user                                                          in
        identities
        profile storage service:
                                                                retrieves user profile
        stores 1 or many profiles                                if user authorises it profile storage site
                                             data consumer
        data consumers: provide
        services for users


Benjamin.Heitmann
                             slide 7 of 11
@deri.org
Communication pattern of the proposed
       architecture
Digital Enterprise Research Institute                                                        www.deri.ie




                                                                        WebID



                                                          private key           public key
                                                          Storage URI



                                             user agent
                                                                                        FOAF Profile

                                                                                                    stored
                                                                                                      in




                                                                                     profile storage site




Benjamin.Heitmann
                             slide 8 of 11
@deri.org
Communication pattern of the proposed
       architecture
Digital Enterprise Research Institute                                                        www.deri.ie


  Scenario: recommend patients
  with similar treatments                                               WebID
  Assumption: user is logged into
  Openbook
                                                          private key           public key
                                                          Storage URI



                                             user agent
                                                                                        FOAF Profile

                                                                                                    stored
                                                                                                      in




                                                                                     profile storage site




Benjamin.Heitmann
                             slide 8 of 11
@deri.org
Communication pattern of the proposed
       architecture
Digital Enterprise Research Institute                                                           www.deri.ie


  Scenario: recommend patients
  with similar treatments                                                  WebID
  Assumption: user is logged into
  Openbook
                                                             private key           public key
 1. User searches for PatiensLikeMe                          Storage URI



                                               user agent
                                                                                           FOAF Profile

                                                        Any patients                                   stored
                                                         like me?                                        in




                                                                                        profile storage site

                                             data consumer



Benjamin.Heitmann
                             slide 8 of 11
@deri.org
Communication pattern of the proposed
       architecture
Digital Enterprise Research Institute                                                                www.deri.ie


  Scenario: recommend patients
  with similar treatments                                                       WebID
  Assumption: user is logged into
  Openbook
                                                                  private key           public key
 1. User searches for PatiensLikeMe                               Storage URI
 2. PatientsLikeMe (PLM) gets
  profile storage URI via Firefox
                                                     user agent
                                                                                                FOAF Profile

                                                Firefox                                                     stored
                                               provides                                                       in
                                             storage URI




                                                                                             profile storage site

                                                  data consumer



Benjamin.Heitmann
                             slide 8 of 11
@deri.org
Communication pattern of the proposed
       architecture
Digital Enterprise Research Institute                                                           www.deri.ie


  Scenario: recommend patients
  with similar treatments                                                  WebID
  Assumption: user is logged into
  Openbook
                                                             private key           public key
 1. User searches for PatiensLikeMe                          Storage URI
 2. PatientsLikeMe (PLM) gets
  profile storage URI via Firefox
                                               user agent
 3. PLM redirects Firefox to                                                               FOAF Profile
  Openbook for authorisation
                                                         redirect to                                   stored
                                                          openbook                                       in
                                                      for authorisation



                                                                                        profile storage site

                                             data consumer



Benjamin.Heitmann
                             slide 8 of 11
@deri.org
Communication pattern of the proposed
       architecture
Digital Enterprise Research Institute                                                            www.deri.ie


  Scenario: recommend patients
  with similar treatments                                                  WebID
  Assumption: user is logged into
  Openbook
                                                             private key            public key
 1. User searches for PatiensLikeMe                          Storage URI
 2. PatientsLikeMe (PLM) gets
  profile storage URI via Firefox
                                               user agent
 3. PLM redirects Firefox to                                                                FOAF Profile
  Openbook for authorisation                                                       User authorises      stored
 4. User authorises Openbook to                                                     Openbook to           in
                                                                                    show parts of
  show some profile parts to PLM                                                   profile to PLM
  (new WAC entry gets created)

                                                                                         profile storage site

                                             data consumer



Benjamin.Heitmann
                             slide 8 of 11
@deri.org
Communication pattern of the proposed
       architecture
Digital Enterprise Research Institute                                                           www.deri.ie


  Scenario: recommend patients
  with similar treatments                                                  WebID
  Assumption: user is logged into
  Openbook
                                                             private key           public key
 1. User searches for PatiensLikeMe                          Storage URI
 2. PatientsLikeMe (PLM) gets
  profile storage URI via Firefox
                                               user agent
 3. PLM redirects Firefox to                                                               FOAF Profile
  Openbook for authorisation
                                                                                                       stored
 4. User authorises Openbook to                                                                          in
  show some profile parts to PLM
  (new WAC entry gets created)
 5.Openbook redirects to PLM
                                                                 redirect back to       profile storage site
                                                                  PatientsLikeMe
                                             data consumer



Benjamin.Heitmann
                             slide 8 of 11
@deri.org
Communication pattern of the proposed
       architecture
Digital Enterprise Research Institute                                                           www.deri.ie


  Scenario: recommend patients
  with similar treatments                                                  WebID
  Assumption: user is logged into
  Openbook
                                                             private key           public key
 1. User searches for PatiensLikeMe                          Storage URI
 2. PatientsLikeMe (PLM) gets
  profile storage URI via Firefox
                                               user agent
 3. PLM redirects Firefox to                                                               FOAF Profile
  Openbook for authorisation
                                                                                                       stored
 4. User authorises Openbook to                                                                          in
  show some profile parts to PLM                            PatientsLikeMe retrieves profile
  (new WAC entry gets created)                                         parts now
 5.Openbook redirects to PLM
                                                                                        profile storage site
 6.Now PLM accesses parts of
  profile data on openbook                   data consumer



Benjamin.Heitmann
                             slide 8 of 11
@deri.org
Qualitative evaluation
Digital Enterprise Research Institute                                        www.deri.ie



      Based on evaluation framework for privacy enhanced
      technologies by Wang+Kobsa [20,15]
      Protection of identity:
            user can create and choose identities without constraints
            allows pseudonymity, unobservability, deniability, anonymity
            alternatively identities can be assigned by organisations
        Control over user data:
            profile data can be optionally self-hosted
            open standards allow portability, no lock-in to any ecosystem
        Non-functional requirements:
            Universality: one universal, standards based eco-system
            Scalability: no bottlenecks or central points of failure
           Reuse of infrastructure: standards from WWW and Web of Data
           are reused


Benjamin.Heitmann
                             slide 9 of 11
@deri.org
Related work (“the competition”)
Digital Enterprise Research Institute                                                              www.deri.ie




                                                                                       no logo



 OpenID:                                      OAuth:                         OpenID attribute
       user authentication                        resource access            exchange:
        without passwords                          authorisation                   protocol for
       1 billion accounts, 9                      defines protocol for           exchanging profile
        million sites                              3rd parties to access           data
        requires user                             resources                       very limited
        interaction                                manages access via             vocabulary
        not scalable, due to                      tokens                          inflexible and hard to
        number of HTTP                             high HTTP                      extend
        connections required                       connection overhead             has not reached
                                                   fragmentation                  industry adoption
                                                   (Twitter vs Facebook)




Benjamin.Heitmann
                             slide 10 of 11
@deri.org
Summary
Digital Enterprise Research Institute                                    www.deri.ie



         coming paradigm shifts towards
         social eco-systems:
            recommendations in a multi-site and cross-domain context
      current eco-systems are built around centralised
      and closed hub sites
      alternative: eco-systems centred around secure
      and portable user profiles (“private by default”)
            foundation: WebIDs and FOAF profiles
            provides incentives for users to share their profile data
            can enable a universal, decentralised social eco-system
        Future work: implement and evaluate prototype
         with all parties in a cross-domain setting


Benjamin.Heitmann
                             slide 11 of 11
@deri.org

Más contenido relacionado

La actualidad más candente

Turning social disputes into knowledge representations DERI reading group 201...
Turning social disputes into knowledge representations DERI reading group 201...Turning social disputes into knowledge representations DERI reading group 201...
Turning social disputes into knowledge representations DERI reading group 201...jodischneider
 
Leveraging Matching Dependencies for Guided User Feedback in Linked Data Appl...
Leveraging Matching Dependencies for Guided User Feedback in Linked Data Appl...Leveraging Matching Dependencies for Guided User Feedback in Linked Data Appl...
Leveraging Matching Dependencies for Guided User Feedback in Linked Data Appl...Umair ul Hassan
 
LEAD - Learning Design – Design For Learning -project presentation
LEAD - Learning Design – Design For Learning -project presentationLEAD - Learning Design – Design For Learning -project presentation
LEAD - Learning Design – Design For Learning -project presentationTeemu Leinonen
 
RDFa: putting RDF on the Web
RDFa: putting RDF on the WebRDFa: putting RDF on the Web
RDFa: putting RDF on the WebBenjamin Heitmann
 
Presentation of current research: distributed architecture for recommendation...
Presentation of current research: distributed architecture for recommendation...Presentation of current research: distributed architecture for recommendation...
Presentation of current research: distributed architecture for recommendation...Benjamin Heitmann
 
Swap2010 agave
Swap2010 agaveSwap2010 agave
Swap2010 agavejuanaya
 
Twitter and research impact
Twitter and research impactTwitter and research impact
Twitter and research impactMarie Boran
 
Internet Science
Internet ScienceInternet Science
Internet Sciencei_scienceEU
 
Self-service Linked Government Data
Self-service Linked Government DataSelf-service Linked Government Data
Self-service Linked Government DataFadi Maali
 
Towards Social semantic journalism
Towards Social semantic journalismTowards Social semantic journalism
Towards Social semantic journalismBahareh Heravi
 
Federating Distributed Social Data to Build an Interlinked Online Information...
Federating Distributed Social Data to Build an Interlinked Online Information...Federating Distributed Social Data to Build an Interlinked Online Information...
Federating Distributed Social Data to Build an Interlinked Online Information...Alexandre Passant
 
Making sense out of disagreement, University of Limerick Interaction Design C...
Making sense out of disagreement, University of Limerick Interaction Design C...Making sense out of disagreement, University of Limerick Interaction Design C...
Making sense out of disagreement, University of Limerick Interaction Design C...jodischneider
 
Service Integration - A Web of Things Perspective
Service Integration - A Web of Things PerspectiveService Integration - A Web of Things Perspective
Service Integration - A Web of Things PerspectiveSimon Mayer
 
Enterprise Energy Management using a Linked Dataspace for Energy Intelligence
Enterprise Energy Management using a Linked Dataspace for Energy IntelligenceEnterprise Energy Management using a Linked Dataspace for Energy Intelligence
Enterprise Energy Management using a Linked Dataspace for Energy IntelligenceEdward Curry
 
Knowledge management on the desktop
Knowledge management on the desktopKnowledge management on the desktop
Knowledge management on the desktopLaura Dragan
 
Open data showcase
Open data showcaseOpen data showcase
Open data showcaseFadi Maali
 
IUI 2010: An Informal Summary of the International Conference on Intelligent ...
IUI 2010: An Informal Summary of the International Conference on Intelligent ...IUI 2010: An Informal Summary of the International Conference on Intelligent ...
IUI 2010: An Informal Summary of the International Conference on Intelligent ...J S
 
6 - Making Information Pay 2011 -- SOLOMON, MADI (Pearson)
6 - Making Information Pay 2011 -- SOLOMON, MADI (Pearson)6 - Making Information Pay 2011 -- SOLOMON, MADI (Pearson)
6 - Making Information Pay 2011 -- SOLOMON, MADI (Pearson)bisg
 

La actualidad más candente (20)

Turning social disputes into knowledge representations DERI reading group 201...
Turning social disputes into knowledge representations DERI reading group 201...Turning social disputes into knowledge representations DERI reading group 201...
Turning social disputes into knowledge representations DERI reading group 201...
 
Leveraging Matching Dependencies for Guided User Feedback in Linked Data Appl...
Leveraging Matching Dependencies for Guided User Feedback in Linked Data Appl...Leveraging Matching Dependencies for Guided User Feedback in Linked Data Appl...
Leveraging Matching Dependencies for Guided User Feedback in Linked Data Appl...
 
LEAD - Learning Design – Design For Learning -project presentation
LEAD - Learning Design – Design For Learning -project presentationLEAD - Learning Design – Design For Learning -project presentation
LEAD - Learning Design – Design For Learning -project presentation
 
RDFa: putting RDF on the Web
RDFa: putting RDF on the WebRDFa: putting RDF on the Web
RDFa: putting RDF on the Web
 
Presentation of current research: distributed architecture for recommendation...
Presentation of current research: distributed architecture for recommendation...Presentation of current research: distributed architecture for recommendation...
Presentation of current research: distributed architecture for recommendation...
 
Swap2010 agave
Swap2010 agaveSwap2010 agave
Swap2010 agave
 
Twitter and research impact
Twitter and research impactTwitter and research impact
Twitter and research impact
 
Internet Science
Internet ScienceInternet Science
Internet Science
 
Itgs scheme 2011-2012
Itgs scheme 2011-2012Itgs scheme 2011-2012
Itgs scheme 2011-2012
 
Self-service Linked Government Data
Self-service Linked Government DataSelf-service Linked Government Data
Self-service Linked Government Data
 
Towards Social semantic journalism
Towards Social semantic journalismTowards Social semantic journalism
Towards Social semantic journalism
 
Federating Distributed Social Data to Build an Interlinked Online Information...
Federating Distributed Social Data to Build an Interlinked Online Information...Federating Distributed Social Data to Build an Interlinked Online Information...
Federating Distributed Social Data to Build an Interlinked Online Information...
 
Making sense out of disagreement, University of Limerick Interaction Design C...
Making sense out of disagreement, University of Limerick Interaction Design C...Making sense out of disagreement, University of Limerick Interaction Design C...
Making sense out of disagreement, University of Limerick Interaction Design C...
 
Service Integration - A Web of Things Perspective
Service Integration - A Web of Things PerspectiveService Integration - A Web of Things Perspective
Service Integration - A Web of Things Perspective
 
Enterprise Energy Management using a Linked Dataspace for Energy Intelligence
Enterprise Energy Management using a Linked Dataspace for Energy IntelligenceEnterprise Energy Management using a Linked Dataspace for Energy Intelligence
Enterprise Energy Management using a Linked Dataspace for Energy Intelligence
 
A PLATFORM FOR LEARNING INTERNET OF THINGS
A PLATFORM FOR LEARNING INTERNET OF THINGSA PLATFORM FOR LEARNING INTERNET OF THINGS
A PLATFORM FOR LEARNING INTERNET OF THINGS
 
Knowledge management on the desktop
Knowledge management on the desktopKnowledge management on the desktop
Knowledge management on the desktop
 
Open data showcase
Open data showcaseOpen data showcase
Open data showcase
 
IUI 2010: An Informal Summary of the International Conference on Intelligent ...
IUI 2010: An Informal Summary of the International Conference on Intelligent ...IUI 2010: An Informal Summary of the International Conference on Intelligent ...
IUI 2010: An Informal Summary of the International Conference on Intelligent ...
 
6 - Making Information Pay 2011 -- SOLOMON, MADI (Pearson)
6 - Making Information Pay 2011 -- SOLOMON, MADI (Pearson)6 - Making Information Pay 2011 -- SOLOMON, MADI (Pearson)
6 - Making Information Pay 2011 -- SOLOMON, MADI (Pearson)
 

Similar a An architecture for privacy-enabled user profile portability on the Web of Data

Aggregated, Interoperable and Multi-Domain User Profiles for the Social Web
Aggregated, Interoperable and Multi-Domain User Profiles for the Social WebAggregated, Interoperable and Multi-Domain User Profiles for the Social Web
Aggregated, Interoperable and Multi-Domain User Profiles for the Social WebFabrizio Orlandi
 
Multi-Source Provenance-Aware User Interest Profiling on the Social Semantic Web
Multi-Source Provenance-Aware User Interest Profiling on the Social Semantic WebMulti-Source Provenance-Aware User Interest Profiling on the Social Semantic Web
Multi-Source Provenance-Aware User Interest Profiling on the Social Semantic WebFabrizio Orlandi
 
Research, the Cloud, and the IRB
Research, the Cloud, and the IRBResearch, the Cloud, and the IRB
Research, the Cloud, and the IRBMichael Zimmer
 
Linked Building (Energy) Data
Linked Building (Energy) DataLinked Building (Energy) Data
Linked Building (Energy) DataEdward Curry
 
Security in Web 2.0, Social Web and Cloud
Security in Web 2.0, Social Web and CloudSecurity in Web 2.0, Social Web and Cloud
Security in Web 2.0, Social Web and CloudITDogadjaji.com
 
Social Sharing In a Web of Things
Social Sharing In a Web of ThingsSocial Sharing In a Web of Things
Social Sharing In a Web of ThingsDominique Guinard
 
Linked Data: opportunities and challenges
Linked Data: opportunities and challengesLinked Data: opportunities and challenges
Linked Data: opportunities and challengesMichael Hausenblas
 
Everything Self-Service:Linked Data Applications with the Information Workbench
Everything Self-Service:Linked Data Applications with the Information WorkbenchEverything Self-Service:Linked Data Applications with the Information Workbench
Everything Self-Service:Linked Data Applications with the Information WorkbenchPeter Haase
 
Cloud computing in academic libraries
Cloud computing in academic librariesCloud computing in academic libraries
Cloud computing in academic librariesErik Mitchell
 
AIIM Cloud Collaboration Presentation Jan. 2012
AIIM Cloud Collaboration Presentation Jan. 2012AIIM Cloud Collaboration Presentation Jan. 2012
AIIM Cloud Collaboration Presentation Jan. 2012Porter-Roth Associates
 
Preserving Privacy Policy- Preserving public auditing for data in the cloud
	Preserving Privacy Policy- Preserving public auditing for data in the cloud	Preserving Privacy Policy- Preserving public auditing for data in the cloud
Preserving Privacy Policy- Preserving public auditing for data in the cloudinventionjournals
 
InfoFusion Overview And Roadmap
InfoFusion Overview And RoadmapInfoFusion Overview And Roadmap
InfoFusion Overview And RoadmapMarten den Haring
 
Dcat - Machine Accessible Data Catalogues
Dcat - Machine Accessible Data CataloguesDcat - Machine Accessible Data Catalogues
Dcat - Machine Accessible Data CataloguesFadi Maali
 
Ensuring distributed accountability for data sharing in the cloud
Ensuring distributed accountability for data sharing in the cloudEnsuring distributed accountability for data sharing in the cloud
Ensuring distributed accountability for data sharing in the cloudGowthami Konakanchi
 
WikiSym2012 Deletion Discussions in Wikipedia: Decision Factors and Outcomes
WikiSym2012 Deletion Discussions in Wikipedia: Decision Factors and OutcomesWikiSym2012 Deletion Discussions in Wikipedia: Decision Factors and Outcomes
WikiSym2012 Deletion Discussions in Wikipedia: Decision Factors and Outcomesjodischneider
 
CISO's Guide to Securing SharePoint
CISO's Guide to Securing SharePointCISO's Guide to Securing SharePoint
CISO's Guide to Securing SharePointImperva
 
Towards Lightweight Cyber-Physical Energy Systems using Linked Data, the Web ...
Towards Lightweight Cyber-Physical Energy Systems using Linked Data, the Web ...Towards Lightweight Cyber-Physical Energy Systems using Linked Data, the Web ...
Towards Lightweight Cyber-Physical Energy Systems using Linked Data, the Web ...Edward Curry
 

Similar a An architecture for privacy-enabled user profile portability on the Web of Data (20)

Aggregated, Interoperable and Multi-Domain User Profiles for the Social Web
Aggregated, Interoperable and Multi-Domain User Profiles for the Social WebAggregated, Interoperable and Multi-Domain User Profiles for the Social Web
Aggregated, Interoperable and Multi-Domain User Profiles for the Social Web
 
Multi-Source Provenance-Aware User Interest Profiling on the Social Semantic Web
Multi-Source Provenance-Aware User Interest Profiling on the Social Semantic WebMulti-Source Provenance-Aware User Interest Profiling on the Social Semantic Web
Multi-Source Provenance-Aware User Interest Profiling on the Social Semantic Web
 
Research, the Cloud, and the IRB
Research, the Cloud, and the IRBResearch, the Cloud, and the IRB
Research, the Cloud, and the IRB
 
Lgd 2
Lgd 2Lgd 2
Lgd 2
 
Linked Building (Energy) Data
Linked Building (Energy) DataLinked Building (Energy) Data
Linked Building (Energy) Data
 
Security in Web 2.0, Social Web and Cloud
Security in Web 2.0, Social Web and CloudSecurity in Web 2.0, Social Web and Cloud
Security in Web 2.0, Social Web and Cloud
 
Social Sharing In a Web of Things
Social Sharing In a Web of ThingsSocial Sharing In a Web of Things
Social Sharing In a Web of Things
 
How to Publish Open Data
How to Publish Open DataHow to Publish Open Data
How to Publish Open Data
 
Linked Data: opportunities and challenges
Linked Data: opportunities and challengesLinked Data: opportunities and challenges
Linked Data: opportunities and challenges
 
Everything Self-Service:Linked Data Applications with the Information Workbench
Everything Self-Service:Linked Data Applications with the Information WorkbenchEverything Self-Service:Linked Data Applications with the Information Workbench
Everything Self-Service:Linked Data Applications with the Information Workbench
 
Cloud computing in academic libraries
Cloud computing in academic librariesCloud computing in academic libraries
Cloud computing in academic libraries
 
AIIM Cloud Collaboration Presentation Jan. 2012
AIIM Cloud Collaboration Presentation Jan. 2012AIIM Cloud Collaboration Presentation Jan. 2012
AIIM Cloud Collaboration Presentation Jan. 2012
 
Preserving Privacy Policy- Preserving public auditing for data in the cloud
	Preserving Privacy Policy- Preserving public auditing for data in the cloud	Preserving Privacy Policy- Preserving public auditing for data in the cloud
Preserving Privacy Policy- Preserving public auditing for data in the cloud
 
InfoFusion Overview And Roadmap
InfoFusion Overview And RoadmapInfoFusion Overview And Roadmap
InfoFusion Overview And Roadmap
 
Dcat - Machine Accessible Data Catalogues
Dcat - Machine Accessible Data CataloguesDcat - Machine Accessible Data Catalogues
Dcat - Machine Accessible Data Catalogues
 
Ensuring distributed accountability for data sharing in the cloud
Ensuring distributed accountability for data sharing in the cloudEnsuring distributed accountability for data sharing in the cloud
Ensuring distributed accountability for data sharing in the cloud
 
WikiSym2012 Deletion Discussions in Wikipedia: Decision Factors and Outcomes
WikiSym2012 Deletion Discussions in Wikipedia: Decision Factors and OutcomesWikiSym2012 Deletion Discussions in Wikipedia: Decision Factors and Outcomes
WikiSym2012 Deletion Discussions in Wikipedia: Decision Factors and Outcomes
 
CISO's Guide to Securing SharePoint
CISO's Guide to Securing SharePointCISO's Guide to Securing SharePoint
CISO's Guide to Securing SharePoint
 
JeromeDL Tutorial
JeromeDL TutorialJeromeDL Tutorial
JeromeDL Tutorial
 
Towards Lightweight Cyber-Physical Energy Systems using Linked Data, the Web ...
Towards Lightweight Cyber-Physical Energy Systems using Linked Data, the Web ...Towards Lightweight Cyber-Physical Energy Systems using Linked Data, the Web ...
Towards Lightweight Cyber-Physical Energy Systems using Linked Data, the Web ...
 

Más de Benjamin Heitmann

A new direction for recommender systems: balancing privacy and personalisation
A new direction for recommender systems: balancing privacy and personalisationA new direction for recommender systems: balancing privacy and personalisation
A new direction for recommender systems: balancing privacy and personalisationBenjamin Heitmann
 
Benjamin Heitmann, PhD defence talk: An Open Framework for Multi-source, Cro...
Benjamin Heitmann, PhD defence talk: An Open Framework for Multi-source, Cro...Benjamin Heitmann, PhD defence talk: An Open Framework for Multi-source, Cro...
Benjamin Heitmann, PhD defence talk: An Open Framework for Multi-source, Cro...Benjamin Heitmann
 
Representing discourse and argumentation as an application of Web Science
Representing discourse and argumentation as an application of Web ScienceRepresenting discourse and argumentation as an application of Web Science
Representing discourse and argumentation as an application of Web ScienceBenjamin Heitmann
 
Web Science: Motivation, Goals and Contributions
Web Science: Motivation, Goals and ContributionsWeb Science: Motivation, Goals and Contributions
Web Science: Motivation, Goals and ContributionsBenjamin Heitmann
 
Lessons learned from Futures Studies: Towards a method for Web Science
Lessons learned from Futures Studies: Towards a method for Web ScienceLessons learned from Futures Studies: Towards a method for Web Science
Lessons learned from Futures Studies: Towards a method for Web ScienceBenjamin Heitmann
 
Applying the scientific method in Software Evaluation
Applying the scientific method in Software EvaluationApplying the scientific method in Software Evaluation
Applying the scientific method in Software EvaluationBenjamin Heitmann
 

Más de Benjamin Heitmann (6)

A new direction for recommender systems: balancing privacy and personalisation
A new direction for recommender systems: balancing privacy and personalisationA new direction for recommender systems: balancing privacy and personalisation
A new direction for recommender systems: balancing privacy and personalisation
 
Benjamin Heitmann, PhD defence talk: An Open Framework for Multi-source, Cro...
Benjamin Heitmann, PhD defence talk: An Open Framework for Multi-source, Cro...Benjamin Heitmann, PhD defence talk: An Open Framework for Multi-source, Cro...
Benjamin Heitmann, PhD defence talk: An Open Framework for Multi-source, Cro...
 
Representing discourse and argumentation as an application of Web Science
Representing discourse and argumentation as an application of Web ScienceRepresenting discourse and argumentation as an application of Web Science
Representing discourse and argumentation as an application of Web Science
 
Web Science: Motivation, Goals and Contributions
Web Science: Motivation, Goals and ContributionsWeb Science: Motivation, Goals and Contributions
Web Science: Motivation, Goals and Contributions
 
Lessons learned from Futures Studies: Towards a method for Web Science
Lessons learned from Futures Studies: Towards a method for Web ScienceLessons learned from Futures Studies: Towards a method for Web Science
Lessons learned from Futures Studies: Towards a method for Web Science
 
Applying the scientific method in Software Evaluation
Applying the scientific method in Software EvaluationApplying the scientific method in Software Evaluation
Applying the scientific method in Software Evaluation
 

Último

Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Scott Andery
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...AliaaTarek5
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditSkynet Technologies
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 

Último (20)

Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance Audit
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 

An architecture for privacy-enabled user profile portability on the Web of Data

  • 1. Digital Enterprise Research Institute www.deri.ie An architecture for privacy-enabled user profile portability on the Web of Data Benjamin Heitmann, James G. Kim, Alexandre Passant, Conor Hayes, Hong-Gee Kim Funded by Science Foundation Ireland under Grant No. SFI/08/CE/I1380 (Líon-2)  Copyright 2009 Digital Enterprise Research Institute. All rights reserved. Chapter
  • 2. Motivation Digital Enterprise Research Institute www.deri.ie  Rec. Systems can benefit from external data sources:  e.g. for cold-start problem ?  New paradigm shifts require external data:  beyond single site context data recommendations  beyond single domain sharing  Challenge: sharing of profile data  Maintain privacy of user (“public by default” is not enough) Benjamin.Heitmann slide 2 of 11 @deri.org
  • 3. Outline Digital Enterprise Research Institute www.deri.ie  The challenge: portable and private user profiles  Background: Introducing Linked Data  An architecture to enable portable and private user profiles  Foundation standards  Roles  Communication pattern  Qualitative evaluation  Related work Benjamin.Heitmann slide 3 of 11 @deri.org
  • 4. The challenge: portable and private user profiles Digital Enterprise Research Institute www.deri.ie  Current eco-systems:  hub site: centralised express user profile storage preference authentication e.g. Facebook, Twitter for user action  users profiles: secure and private, but no web site interaction portability.  third party services: can cross domain data sharing access user profile if if authorised authorised, e.g. by user TweetMeme or Flickr  closed system  Users are locked into an ecosystem, no portability  Challenge: open recommendations for alternative with portability external site provided by and privacy! facebook (at the same time) Benjamin.Heitmann slide 4 of 11 @deri.org
  • 5. Background: The Web of Data and Linked Data Digital Enterprise Research Institute www.deri.ie  the Web of Data provides:  structured data, collaboratively created, about object centred sociality  domain knowledge through ontologies (e.g. DBpedia ontology)  cross-domain links between sources  Linked Data principles: 1. use URIs “for everything” 2. allow HTTP access to all URIs 3. when accessing a URI, provide relevant data in RDF 4. include links to URIs from third Linking Open Data (LOD) cloud, as of October 2010 parties (background knowledge) Benjamin.Heitmann slide 5 of 11 @deri.org
  • 6. Foundation standards Digital Enterprise Research Institute www.deri.ie no logo  WebIDs:  WebAccess  FOAF profiles:  user Control (WAC)  domain authentication vocabulary: independent user without passwords profiles  resource access  publish public key authorisation  described using in FOAF profile the Friend-of-a-  defines whitelist  store private key in Friend (FOAF) for a resource browser vocabulary access by third  decentralised parties  can contain any authentication structured data,  can be used for schema e.g. activity streams “private by default” mode Benjamin.Heitmann slide 6 of 11 @deri.org
  • 7. Alternative: architecture for private and portable user profiles Digital Enterprise Research Institute www.deri.ie  User profile:  Profile data expressed WebID using RDF (FOAF+SIOC)  WebID provides identity private key public key (2 parts) – private SSL Key in user agent – public SSL Key in FOAF user agent FOAF Profile profile  Roles: stored  user agents: manage user in identities  profile storage service: retrieves user profile stores 1 or many profiles if user authorises it profile storage site data consumer  data consumers: provide services for users Benjamin.Heitmann slide 7 of 11 @deri.org
  • 8. Communication pattern of the proposed architecture Digital Enterprise Research Institute www.deri.ie WebID private key public key Storage URI user agent FOAF Profile stored in profile storage site Benjamin.Heitmann slide 8 of 11 @deri.org
  • 9. Communication pattern of the proposed architecture Digital Enterprise Research Institute www.deri.ie  Scenario: recommend patients with similar treatments WebID  Assumption: user is logged into Openbook private key public key Storage URI user agent FOAF Profile stored in profile storage site Benjamin.Heitmann slide 8 of 11 @deri.org
  • 10. Communication pattern of the proposed architecture Digital Enterprise Research Institute www.deri.ie  Scenario: recommend patients with similar treatments WebID  Assumption: user is logged into Openbook private key public key 1. User searches for PatiensLikeMe Storage URI user agent FOAF Profile Any patients stored like me? in profile storage site data consumer Benjamin.Heitmann slide 8 of 11 @deri.org
  • 11. Communication pattern of the proposed architecture Digital Enterprise Research Institute www.deri.ie  Scenario: recommend patients with similar treatments WebID  Assumption: user is logged into Openbook private key public key 1. User searches for PatiensLikeMe Storage URI 2. PatientsLikeMe (PLM) gets profile storage URI via Firefox user agent FOAF Profile Firefox stored provides in storage URI profile storage site data consumer Benjamin.Heitmann slide 8 of 11 @deri.org
  • 12. Communication pattern of the proposed architecture Digital Enterprise Research Institute www.deri.ie  Scenario: recommend patients with similar treatments WebID  Assumption: user is logged into Openbook private key public key 1. User searches for PatiensLikeMe Storage URI 2. PatientsLikeMe (PLM) gets profile storage URI via Firefox user agent 3. PLM redirects Firefox to FOAF Profile Openbook for authorisation redirect to stored openbook in for authorisation profile storage site data consumer Benjamin.Heitmann slide 8 of 11 @deri.org
  • 13. Communication pattern of the proposed architecture Digital Enterprise Research Institute www.deri.ie  Scenario: recommend patients with similar treatments WebID  Assumption: user is logged into Openbook private key public key 1. User searches for PatiensLikeMe Storage URI 2. PatientsLikeMe (PLM) gets profile storage URI via Firefox user agent 3. PLM redirects Firefox to FOAF Profile Openbook for authorisation User authorises stored 4. User authorises Openbook to Openbook to in show parts of show some profile parts to PLM profile to PLM (new WAC entry gets created) profile storage site data consumer Benjamin.Heitmann slide 8 of 11 @deri.org
  • 14. Communication pattern of the proposed architecture Digital Enterprise Research Institute www.deri.ie  Scenario: recommend patients with similar treatments WebID  Assumption: user is logged into Openbook private key public key 1. User searches for PatiensLikeMe Storage URI 2. PatientsLikeMe (PLM) gets profile storage URI via Firefox user agent 3. PLM redirects Firefox to FOAF Profile Openbook for authorisation stored 4. User authorises Openbook to in show some profile parts to PLM (new WAC entry gets created) 5.Openbook redirects to PLM redirect back to profile storage site PatientsLikeMe data consumer Benjamin.Heitmann slide 8 of 11 @deri.org
  • 15. Communication pattern of the proposed architecture Digital Enterprise Research Institute www.deri.ie  Scenario: recommend patients with similar treatments WebID  Assumption: user is logged into Openbook private key public key 1. User searches for PatiensLikeMe Storage URI 2. PatientsLikeMe (PLM) gets profile storage URI via Firefox user agent 3. PLM redirects Firefox to FOAF Profile Openbook for authorisation stored 4. User authorises Openbook to in show some profile parts to PLM PatientsLikeMe retrieves profile (new WAC entry gets created) parts now 5.Openbook redirects to PLM profile storage site 6.Now PLM accesses parts of profile data on openbook data consumer Benjamin.Heitmann slide 8 of 11 @deri.org
  • 16. Qualitative evaluation Digital Enterprise Research Institute www.deri.ie  Based on evaluation framework for privacy enhanced technologies by Wang+Kobsa [20,15]  Protection of identity:  user can create and choose identities without constraints  allows pseudonymity, unobservability, deniability, anonymity  alternatively identities can be assigned by organisations  Control over user data:  profile data can be optionally self-hosted  open standards allow portability, no lock-in to any ecosystem  Non-functional requirements:  Universality: one universal, standards based eco-system  Scalability: no bottlenecks or central points of failure  Reuse of infrastructure: standards from WWW and Web of Data are reused Benjamin.Heitmann slide 9 of 11 @deri.org
  • 17. Related work (“the competition”) Digital Enterprise Research Institute www.deri.ie no logo  OpenID:  OAuth:  OpenID attribute  user authentication  resource access exchange: without passwords authorisation  protocol for  1 billion accounts, 9  defines protocol for exchanging profile million sites 3rd parties to access data  requires user resources  very limited interaction  manages access via vocabulary  not scalable, due to tokens  inflexible and hard to number of HTTP  high HTTP extend connections required connection overhead  has not reached  fragmentation industry adoption (Twitter vs Facebook) Benjamin.Heitmann slide 10 of 11 @deri.org
  • 18. Summary Digital Enterprise Research Institute www.deri.ie  coming paradigm shifts towards social eco-systems:  recommendations in a multi-site and cross-domain context  current eco-systems are built around centralised and closed hub sites  alternative: eco-systems centred around secure and portable user profiles (“private by default”)  foundation: WebIDs and FOAF profiles  provides incentives for users to share their profile data  can enable a universal, decentralised social eco-system  Future work: implement and evaluate prototype with all parties in a cross-domain setting Benjamin.Heitmann slide 11 of 11 @deri.org