We think you have liked this presentation. If you wish to download it, please recommend it to your friends in any social system. Share buttons are a little bit lower. Thank you!
Presentation is loading. Please wait.
Published byGrayson Guiler
Modified about 1 year ago
1 Strawman Object model for XDI for the discussion at XDI f2f meeting New Orleans 2004-04-29 Nat Sakimura
© 2004 NRI 2 XDI Intro Whitepaper model is hard to read … and, some of the requirements are not met.
© 2004 NRI 3 Proposed Straw man XDI Object Model (extremely rough and incomplete sketch for discussion) Changes: Inheritance used. Resources has more for efficiency Contract is a subclass of Resource, thereby introducing further structure Some elementally methods shown.
© 2004 NRI 4 links in Resource may be a bad naming as it can be confused with links in the whitepaper. It simply is a link to the external document. Link in the witepaper is more akin to Contract here.
© 2004 NRI 5 Some Considerations on Resources type – dictates what object type this XDI document is ename – for efficiency enumbers – must have at least one of this. links – links to external XDI documents ref – links to the enveloping XDI document resources – Resource can contain other resources. effectiveDate – do we need it? expiryDate – ditto cacheable – ditto cachePeriod – ditto
© 2004 NRI 6 Some considerations on Contracts (link in the whitepaper) parties – contracts are among two or more parties. jurisdiction – any contract needs jurisdiction Other standard feature of contracts needs to be added as well? Or – should we construct each part as sub-resources? (see next slide) templateID – a resource with human readable data in which parties are written as variables can be used as template. This, combined with parities above, can derive a human readable contract. (Note: xri itself will be the machine readable version of the contract template. ) date – maybe needed only as the part of dsigs? dsigs – XML digital signature
© 2004 NRI 7 Should we stick with the generics? Generics as in the Whitepaper :1:3:58 =John_Smith =Johnny (+type) :1:3:58:3 (+person) …. Expanded (+person) :1:3:58 =John_Smith =Johnny … Sticking with the generics may be esthetically appealing, but may be inefficient in the implementation. We don ’ t have to register the fact that :1:3:58 is type +person as addressable resource. It has no use, and the registration is very expensive computationally. More over, it is much easier to constrain that the particular resource has only one type if we had.
Object Oriented Software Development 5. Interfaces, polymorphism and inheritance.
Human features are those things created by man.
REFACTORING Lecture 4. Definition Refactoring is a process of changing the internal structure of the program, not affecting its external behavior and.
STEM Lab Design Project (15pts) To help guide elementary schools in developing and setting up a K-6 STEM laboratory.
METS In order to reconstruct the archive, we will need to understand the METS files. METS is schema that provides a flexible mechanism for encoding descriptive,
Health Level 7- Templates SIG By Peter Elkin, Mayo Clinic Martin Kernberg, UCSF Angelo Rossi-Mori, Italy.
June SLIDE 1 Copyright © 2011 International Swaps and Derivatives Association, Inc. FpML Spec HTML Documentation Improvements Proposal ® ISDA is.
5-topic Template by Eric Curts - twitter.com/ericcurtstwitter.com/ericcurts -
What have others said or recommended, as their part of “Participating in the Process?” What have others said or recommended, as their part of “Participating.
Calculation Policy Subtraction – Years 1-3 Moorlands Primary School Draft – February 2015.
Slide 1 Systems Analysis and Design with UML Version 2.0, Second Edition Alan Dennis, Barbara Haley Wixom, and David Tegarden Chapter 7: Structural Modeling.
METS What is METS ? What is METS ? A schema that provides a flexible mechanism for encoding descriptive, administrative, and structural metadata for a.
SEP1 - 1 Introduction to Software Engineering Processes SWENET SEP1 Module Developed with support from the National Science Foundation.
Click to edit Master title style © by Nat Sakimura. Coping with Information Asymmetry SESSION G: Managing Risk & Reducing Online Fraud Using New.
Recall The Team Skills 1. Analyzing the Problem (with 5 steps) 2. Understanding User and Stakeholder Needs 3. Defining the System A Use Case Primer Organizing.
CHAPTER 3: THE ENHANCED E-R MODEL 1 Modern Database Management.
Design Project (Last updated: Nov. 22/2010) Change since August 31: added the notes to the presentation in the next slide.
Object-Oriented Application Development Using VB.NET 1 Chapter 5 Object-Oriented Analysis and Design.
Data Placement Intro Dirk Duellmann WLCG TEG Workshop Amsterdam 24. Jan 2012.
CSSE501 Object-Oriented Development. Chapter 4: Classes and Methods Chapters 4 and 5 present two sides of OOP: Chapter 4 discusses the static, compile.
. Introduction to Welcome to . This module will give you the skills you need to send and receive . Also to send and receive attachments.
Banaras Hindu University. A Course on Software Reuse by Design Patterns and Frameworks.
Meta-Knowledge Computer-age study skill or What kids need to know to be effective students Graham Seibert Copyright 2006.
Basic Elements of a Business Model In the simplest terms, a Business Model is how a business makes money. This introductory presentation is intended to.
MMDE5011 – INTERACTIVE MEDIA PRACTICE 1 WEEK 1: INTRODUCTION TO HTML5.
We want to add here all the Eleven schools that are functional. Next slide shows how it would look when we click on School of Studies.
Physical Logical Type Instance Data The XDI Graph Basics The XDI Universal Graph is the logical data model by which resources and their associated data.
EECS 20 Chapter 3 Sections Defining Signals and Systems Last time we Found ways to define functions and systems Defined many example systems Today.
WHAT IS INHERITANCE? Java Unit 11: Inheritance I.
Overview Scheduler 1.Tx Plan – Special Considerations – Copy when copying to a new Tx Plan 2.Patient comments extended to 7000 characters 3.Alerting change.
Recommendations from PLCS TOG Meeting Filton, UK Aug 2011.
Formal Specification of Intrusion Signatures and Detection Rules By Jean-Philippe Pouzol and Mireille Ducassé 15 th IEEE Computer Security Foundations.
Implementing the Standard on digital recordkeeping.
Stereotypes Stereotypes provide the capability to create a new kind of modeling element. –They can be used to classify or mark modeling elements. –A type.
Handle System Workshop System Updates Laurence Lannom 21 June 2007 Corporation for National Research Initiatives Reston, VA
Exam 1 Review Dr. Bernard Chen Ph.D. University of Central Arkansas.
Previous Page Next Page EXIT Created by Professor James A. Sinclair, Ph.D. MMXI Monomials, binomials, and Polynomials Monomials, binomials, and polynomials.
Unit 3 Conceptual Data Modeling. Key Concepts Conceptual data modeling process Classes and objects Attributes Identifiers, candidate keys, and primary.
Chapter 3 Define terms Understand use of supertype/subtype relationships Understand use of specialization and generalization techniques Specify.
1 Kyung Hee University Modeling with Objects Spring 2001.
CSCI-383 Object-Oriented Programming & Design Lecture 13.
Build a Rain Gauge Design and Technology – Rain Gauge Project Name___________ Date ___________.
1 CS1001 Lecture Overview Homework 3 Homework 3 Project/Paper Project/Paper Object Oriented Design Object Oriented Design.
Software Requirements. Objectives: l To introduce the concepts of user and system requirements l To describe functional / non-functional requirements.
1 CIS224 Software Projects: Software Engineering and Research Methods Lecture 11 Brief introduction to the UML Specification (Based on UML Superstructure.
Classes & Objects Computer Science I Last updated 9/30/10.
Textual Password How to use the Textual Authentication Model (AC)
NHS CFH Approach to HL7 CDA Rik Smithies Chair HL7 UK NProgram Ltd.
© 2017 SlidePlayer.com Inc. All rights reserved.