12:31:17 RRSAgent has joined #poe 12:31:17 logging to http://www.w3.org/2016/12/12-poe-irc 12:31:19 RRSAgent, make logs public 12:31:19 Zakim has joined #poe 12:31:21 Zakim, this will be 12:31:21 I don't understand 'this will be', trackbot 12:31:22 Meeting: Permissions and Obligations Expression Working Group Teleconference 12:31:22 Date: 12 December 2016 12:31:47 agenda: https://www.w3.org/2016/poe/wiki/Meetings:Telecon20161212 12:31:59 ivan has changed the topic to: Agenda 2016-12-12: https://www.w3.org/2016/poe/wiki/Meetings:Telecon20161212 12:32:07 Chair: Ben 12:32:30 benws has joined #poe 12:32:43 present+ 12:33:11 present+ 12:34:15 james has joined #poe 12:34:35 present+ 12:34:58 Sabrina has joined #poe 12:35:48 *I'm in a meeting, I cannot join on WebEx for the moment* 12:36:48 James - are you joining the webex? 12:37:28 trying to join webex, but having network issues 12:37:35 Brian_Ulicny has joined #poe 12:37:42 agenda: https://www.w3.org/2016/poe/wiki/Meetings:Telecon20161212 12:37:45 chair: Ben 12:37:49 simonstey has joined #poe 12:37:49 scribe: Sabrina 12:37:55 scribeNick: Sabrina 12:38:06 present+ 12:38:13 present+ Sabrina 12:38:18 +1 12:38:21 Topic: Virtual F2F minutes approval 12:38:21 https://www.w3.org/2016/12/05-poe-minutes 12:38:32 Can we approved the meeting minutes from the virtual F2F? 12:38:33 Seem fine to me 12:38:37 +1 12:38:46 +1 12:38:50 +1 12:38:57 RESOLUTION: Minutes of https://www.w3.org/2016/12/05-poe-minutes approved 12:39:00 Minutes approved 12:39:07 Tpi 12:39:16 Topic: ODRL Information Model 12:39:24 s/Tpi// 12:39:29 benws: Moving to the ODRL Information Model 12:40:06 Ben lost connectivity... waiting for him to call back in 12:42:45 Ben back 12:43:18 Issue 61 https://github.com/w3c/poe/issues/61 12:43:21 q+ 12:43:25 Inverse target link - if you have lots of assets you are much more likely to point from the asset to the policy rather than visa versa 12:43:29 q+ 12:43:31 Any comments? 12:43:33 smyles has joined #poe 12:44:19 present+ 12:44:22 james_ has joined #poe 12:44:28 present+ 12:44:41 michaelS: We did exactly something like this in the Music Standard. So the question is should this be a recommendation or rather just best practice? 12:45:18 s/Music/News/ 12:46:42 q? 12:46:43 michaelS: Shouldn't this be more advice rather than a recommendation. 12:46:44 ack m 12:47:10 ...The question is who defines this? 12:47:26 benws: We are looking for the inverse of the predicate 12:47:55 michaelS: Where does this reside? 12:47:58 +q 12:48:02 ack me 12:49:24 phila: I'd say that dcterms:license is the way to link an asset to a Policy 12:49:29 phila: I see what Michael is saying... I can see why people would use dcterms:license . It seems like the right thing to do. 12:49:35 ... It's a commonly used predicate, see, for example, DCAT 12:50:03 +1 for dcterms:license 12:50:11 simonstey: This is certainly not the inverse of ODRL:target 12:51:04 simonstey: It is very often used in blank nodes where you don't have a permission i.e. rule blank node. 12:51:19 regrets+ James, Renato 12:51:35 q? 12:51:38 ack s 12:51:54 q+ 12:51:57 simonstey: Unless we move the target from the rules to the policy I would not recommend an inverse relationship 12:52:05 renato has joined #poe 12:52:16 http://udfr.org/docs/onto/dct_license.html 12:52:16 (sorry - just arrived!) 12:52:27 phila: You never know what type of document you get from the predicate. You can only find out from the MIME TYPE 12:53:06 We might want to define text/ODRL 12:53:12 q? 12:53:30 The predicate can't tell you what you get back.... 12:53:35 ack phila 12:54:02 present+ renato 12:54:23 phila: The URI has no semantics....The MIME TYPE tells you what the serialisation is... 12:54:34 +q 12:54:57 phila: In summary dcterms:License is ok 12:55:24 phila: dcterms:License doesn't tell you what kind of doc you're going to get, that's the job of the MIME type. 12:55:35 phila: If this Wg wants to define its own MIME type, it can 12:55:43 q? 12:55:53 ack simonstey 12:55:56 q+ 12:56:09 simonstey: It doesn't make sense to point from the asset to a single rule.... All the rules together form the license... 12:56:35 phila: So you would use dcterms:license to point to the policy 12:57:39 renato: If we have an asset with dcterms:license pointing to a policy and that policy already has an asset in it. What do we do? How can we handle this? 12:57:40 regrets- Renato 12:57:55 benws: I would add them together 12:58:08 dct:license/(odrl:permission|odrl:prohibition)* ?rules 12:58:42 renato: Maybe we should consider the template policy - everything without the asset in it 12:58:42 q? 12:58:52 ack r 12:59:30 Ben back 13:00:11 q+ 13:00:26 renato: My concern is if the policy you point to already has an asset, does the target URI referred to by dcterms:license would it overwrite the asset 13:00:31 +q 13:00:36 q+ 13:01:10 benws: If you have target and targeted by and an inverse relationship then reasoning would just add them together 13:01:43 renato: Assume that we are talking about a policy? 13:02:07 benws: No keep it simple and just target a rule 13:02:43 renato: The minimum referable entity is a policy, we can't have rules on their own 13:03:07 q? 13:04:16 renato: The policy by definition has an asset. If there are 3 permissions then we have 3 assets. If we have an asset that refers to the policy what happens to the 3 assets that have already been defined 13:04:44 benws: Is this relevant for an inverse of odrl:target 13:04:47 q- 13:04:52 ack michaelS 13:05:06 renato: No, I am talking about something different 13:05:38 (old CC/ODRL Profile): https://www.w3.org/community/odrl/work/cc/ 13:05:58 michaelS: I recall a similar requirement in a creative commons license 13:06:01 q- 13:06:25 ack smyles 13:07:16 smyles: dcterms:license is not a perfect fit, however I agree with Phil people will use it to point to a policy. There are no ids for permissions and restrictions 13:07:24 q+ 13:08:16 +q 13:08:20 benws: This requirements is about the ability to point from an asset to a permission. What do we think of this requirement? 13:08:29 q- 13:08:44 smyles: Can you describe an example of how it would be used? 13:09:18 q+ 13:09:41 benws: If you have 10,000 assets then it is very inefficient to point from the policy to the assets. It is far more efficient to point from the asset to the permission 13:10:04 renato: Does this mean the permission does not have any reference to the asset in it? 13:10:13 benws: Yes, this would be the case 13:10:26 q? 13:10:29 ack r 13:10:52 odrl:Set ? 13:10:56 renato: The way ODRL was modelled was - I have a policy with an identifier and have references to assets and rules. 13:11:13 renato: You could use a set 13:11:48 benws: No it's not a set that it required. We want to point from the asset to the policy 13:11:53 q? 13:12:32 simonstey: If you want to define a policy that does not have a target you could use an odrl:set 13:13:43 simonstey: Is this an implementation issue. If you want to automatically evaluate the policy and you don't have an asset in the policy you would need some guidance as to where to look for the asset 13:14:07 simonstey: This might work in an inhouse scenario but not in general 13:14:14 benws: You just do a query 13:14:28 simonstey: But what do you query? 13:14:56 simonstey: You don't know what is pointing to the policy and therefore you don't know where to query 13:15:34 q+ 13:15:37 ack s 13:16:02 XML encoding rules: http://w3c.github.io/poe/vocab/#xml 13:16:35 smyles: We have the same type of requirement and we lobbied for this is be included in the past. Possible suggestions reference to it over and over again, target optional, or whatever refers to it 13:16:57 q? 13:17:01 ack me 13:17:01 smyles: I am in favour of solving this problem 13:17:12 PoWder !!! 13:17:19 :-) 13:18:15 phila: This sounds very familiar. One set of metadata to an undefined thing and it is governed by whatever points to it 13:18:46 phila: In POWDER it was possible to do this limited by domain name (i.e. put an outer wall on it) 13:18:48 q? 13:19:47 renato: In order to solve the problem - given a policy that we want to use as the target for these statements - should we allow the policy not to have an asset in it 13:20:04 +q 13:20:32 q+ 13:20:42 renato: from your asset list be it 50 million of them, we don't have any assets in the target policy 13:20:52 benws: They are implicitly there 13:21:12 q? 13:21:32 benws: If you were to materialise the triples then indeed the policy would have a target 13:21:40 renato: In an implementation yes 13:22:53 simonstey: An agreement policy is not only about the asset which is referred to by the rules, actually as far as I know you can have multiple assets in each rule. The same for assigner and assignees. 13:23:35 simonstey: When you have 200 million assets you would have to repeat the assigner and assignee multiple times in each rule 13:23:57 benws: This requirement does not refer to assigner and assignees 13:24:00 q? 13:24:21 simonstey: But you would have to repeat this 13:24:48 benws: Ya we would repeat asigners and assignees in the rules 13:25:05 Must contain at least the Party entity with Assigner role and a Party with Assignee role. The latter being granted the terms of the Agreement from the former. 13:25:15 https://www.w3.org/TR/vocab-odrl/#term-Agreement 13:26:07 renato: When assets that refer to policies where there is no asset in the policy we need to indicate that this was done on purpose 13:26:35 renato: otherwise people would expect an asset 13:26:44 q+ 13:26:45 Brian_Ulicny: Can't we use a class here 13:26:50 ack s 13:26:51 ack b 13:26:56 ack simonstey 13:27:14 see "Asset: the Permission entity must refer to an Asset (where at least one, and only one, relation value is target) on which the linked Action should be performed (required)" 13:27:31 In the Information Model for Perms and Prohibs 13:28:05 Anything that points to this policy is covered by it 13:28:32 q+ 13:28:55 smyles: Couldn't we use a url to indicate a class. This is what we did at AP. We don't know the ids of the assets. We put in an identifier the meaning is that anything that points to this identifier is governed by the policy 13:29:59 smyles: The processing engine needs to figure got if this asset is governed by this policy. We need an engine that can evaluate this. 13:30:10 q- 13:30:12 benws: When in doubt add a level of indirection 13:30:38 Topic: F2F meeting 13:30:49 benws: As our hour is up, we have to bypass the other items on the agenda 13:31:31 Sorry. Have to drop. 13:32:24 Proposal: F2F meeting 18-19 May 2017 in London 13:32:29 renato: The F2F will now be in May - there are a number of events in London in May - so we propose the 18th and 19th of May in London 13:32:39 +1 13:32:40 (instead of Madrid or Vienna) 13:32:41 +1 13:32:44 +1 13:32:44 +1 13:32:45 =1 13:32:46 +1 13:32:48 0 13:32:50 +1 13:33:09 Resolution: F2F meeting 18-19 May 2017 in London 13:33:36 IPTC meeting will be held there.... 13:34:13 RRSAgent, draft minutes 13:34:13 I have made the request to generate http://www.w3.org/2016/12/12-poe-minutes.html phila 13:34:21 [Merry Christmas] 13:34:25 RRSAgent, draft minutes 13:34:25 I have made the request to generate http://www.w3.org/2016/12/12-poe-minutes.html phila 15:34:07 Zakim has left #poe 17:06:56 benws has joined #poe 17:13:01 benws2 has joined #poe 18:22:28 benws has joined #poe