On Mon, Nov 16, 2009 at 14:00, Ed Summers <ehs_at_pobox.com> wrote:
> Which raises an interesting point: how are we
> supposed to be able to track the use of our Linked Data resources?
Depends on how much control you want, and what sort of data you need.
> It would be
> neat to come up with some convention for letting a server know you are
> binding to one of its URIs. Perhaps by doing a GET with the REFERER
> set appropriately to the subject URI in the assertion.
If you *really* wanted to be control freaks, you could use the
User-Agent header [bad idea] (say that only browsers could slip
through unattended, or registered agents) or agents with a (possibly?)
registered FROM email address could have access [another bad idea].
The convention is to simply track the FROM email addresses; you can do
interesting correlations based on it. Both are easy enough to hack
around, of course, but for LCSH, who would bother? :). All of this is
a poor-mans version of control, though, as HTTP is quite transparent
and easy to spoof.
For serious control, jump through the authorization hoop, but since I
suspect no one really wants that I guess we need to sort out what sort
of data from users you're after. (I could at this point jump into my
Identity Management spiel [for potential users of a resource], but
I'll be good ...)
Alexander
--
Project Wrangler, SOA, Information Alchemist, UX, RESTafarian, Topic Maps
--- http://shelter.nu/blog/ ----------------------------------------------
------------------ http://www.google.com/profiles/alexander.johannesen ---
Received on Sun Nov 15 2009 - 22:23:23 EST