You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
<ddabout="#root-container" property="skos:definition">A root container is a container resource that is at the highest level of the collection hierarchy.</dd>
<ddabout="#acl-resource" property="skos:definition">An ACL resource is represented by an <em>RDF document</em> [<cite><aclass="bibref" href="#bib-rdf11-concepts">RDF11-CONCEPTS</a></cite>] that includes <ahref="#authorization">Authorizations</a>to access resources.</dd>
414
+
<ddabout="#acl-resource" property="skos:definition">An ACL resource is represented by an <em>RDF document</em> [<cite><aclass="bibref" href="#bib-rdf11-concepts">RDF11-CONCEPTS</a></cite>] that includes <ahref="#authorization">Authorizations</a>determining access to resources.</dd>
<ddabout="#authorization" property="skos:definition">An Authorization is an abstract thing identified by a URI whose properties are defined in an <ahref="#acl-resource">ACL resource</a>, e.g., <ahref="#access-mode">access modes</a> granted to <ahref="#agent">agents</a> the ability to perform operations on <ahref="#resource">resources</a>.</dd>
<p><ahref="#authorization">Authorization</a> (instance of <code>acl:Authorization</code>) is the most fundamental unit of access control describing access permissions granted to agents the ability to perform operations on resources. Authorizations are described with RDF statements and may express any information. This section describes the following characteristics of an Authorization: <ahref="#access-objects" rel="cito:discusses">access objects</a> to specify what can be accessed, <ahref="#access-modes" rel="cito:discusses">access modes</a> to specify permissions, and <ahref="#access-subjects" rel="cito:discusses">access subjects</a> to specify who can access the objects. See the <cite><ahref="#authorization-conformance" rel="rdfs:seeAlso">Authorization Conformance</a></cite> section for applicable Authorizations towards <cite><ahref="#authorization-evaluation" rel="rdfs:seeAlso">Authorization Evaluation</a></cite>.</p>
564
+
<p><ahref="#authorization">Authorization</a> (instance of <code>acl:Authorization</code>) is the most fundamental unit of access control describing access permissions granting to agents the ability to perform operations on resources. Authorizations are described with RDF statements and may express any information. This section describes the following characteristics of an Authorization: <ahref="#access-objects" rel="cito:discusses">access objects</a> to specify what can be accessed, <ahref="#access-modes" rel="cito:discusses">access modes</a> to specify permissions, and <ahref="#access-subjects" rel="cito:discusses">access subjects</a> to specify who can access the objects. See the <cite><ahref="#authorization-conformance" rel="rdfs:seeAlso">Authorization Conformance</a></cite> section for applicable Authorizations towards <cite><ahref="#authorization-evaluation" rel="rdfs:seeAlso">Authorization Evaluation</a></cite>.</p>
<pid="acl-agentclass">The <code>acl:agentClass</code> predicate denotes a <ahref="#agent-class">class of agents</a> being given the access permission.</p>
<p>The class of read and write operations require discrete access permissions:</p>
1065
1066
1066
-
<pid="consider-append-read-diff">Access permission to append a new resource to a container resource is independently of access permission to read a container resource. Thus, servers are encouraged to prevent information leakage when a successful HTTP request appends a new resource to a container resource. For instance, while the knowledge of the URI-Reference in <code>Location</code> and <code>Content-Location</code> HTTP headers in the response of a <code>POST</code> does not in itself pose a security threat ([<cite><aclass="bibref" href="#bib-rfc3986">RFC3986</a></cite>]), servers should consider the risks when read access to the container is not granted to agents.</p>
1067
+
<pid="consider-append-read-diff">Access permission to append a new resource to a container resource is independent of access permission to read a container resource. Thus, servers are encouraged to prevent information leakage when a successful HTTP request appends a new resource to a container resource. For instance, while the knowledge of the URI-Reference in <code>Location</code> and <code>Content-Location</code> HTTP headers in the response of a <code>POST</code> does not in itself pose a security threat ([<cite><aclass="bibref" href="#bib-rfc3986">RFC3986</a></cite>]), servers should consider the risks when read access to the container is not granted to agents.</p>
1067
1068
1068
-
<pid="consider-delete-read-diff">Access permission to update a resource is independently of access permission to read a resource. Thus, servers are encouraged to prevent information leakage when an attempt to delete information in a resource may reveal the existence of the information. For instance, when an HTTP <code>PATCH</code> request uses SPARQL Update’s <code>DELETE DATA</code> operation, servers should consider the risks of disclosing information by the chosen status code when read access to the resource is not granted to agents.</p>
1069
+
<pid="consider-delete-read-diff">Access permission to update a resource is independent of access permission to read a resource. Thus, servers are encouraged to prevent information leakage when an attempt to delete information in a resource may reveal the existence of the information. For instance, when an HTTP <code>PATCH</code> request uses SPARQL Update’s <code>DELETE DATA</code> operation, servers should consider the risks of disclosing information by the chosen status code when read access to the resource is not granted to agents.</p>
0 commit comments