lib/rdf/vocab/cert.rb in rdf-vocab-2.2.9 vs lib/rdf/vocab/cert.rb in rdf-vocab-3.0.0

- old
+ new

@@ -35,16 +35,16 @@ This may be useful to use in defining an RSA key which is identified by two numbers. - also create html version of the spec by using this as a template. - should comments such as this be in html? ).freeze, - :"dc:created" => %(2008-11-13).freeze, - :"foaf:maker" => %(http://bblfish.net/people/henry/card#me).freeze, + "dc:created": "2008-11-13".freeze, + "foaf:maker": "http://bblfish.net/people/henry/card#me".freeze, label: "Ontology for Certificates and crypto stuff.".freeze, - :"rdfs:seeAlso" => [%(http://lists.foaf-project.org/mailman/listinfo/foaf-protocols).freeze, %(http://www.w3.org/ns/auth/X509Uml.svg).freeze, %(http://www.w3.org/ns/auth/rsa).freeze], + "rdfs:seeAlso": ["http://lists.foaf-project.org/mailman/listinfo/foaf-protocols".freeze, "http://www.w3.org/ns/auth/X509Uml.svg".freeze, "http://www.w3.org/ns/auth/rsa".freeze], type: "owl:Ontology".freeze, - :"vs:term_status" => %(unstable).freeze + "vs:term_status": "unstable".freeze # Class definitions term :Certificate, comment: %(A certificate is a Document that is signed. As explained here http://www.pgpi.org/doc/pgpintro/#p16 @@ -52,115 +52,114 @@ * A public key. * Certificate information. \('Identity' information about the user, such as name, user ID, and so on.\) * One or more digital signatures.' ).freeze, + isDefinedBy: "cert:".freeze, label: "Certificate".freeze, - :"rdfs:isDefinedBy" => %(cert:).freeze, subClassOf: "foaf:Document".freeze, type: "owl:Class".freeze, - :"vs:term_status" => %(unstable).freeze + "vs:term_status": "unstable".freeze term :Key, comment: %(the class of keys).freeze, - label: "Key".freeze, - :"rdfs:isDefinedBy" => %(cert:).freeze, + isDefinedBy: "cert:".freeze, type: "owl:Class".freeze, - :"vs:term_status" => %(unstable).freeze + "vs:term_status": "unstable".freeze term :PGPCertificate, comment: %(the class of PGP Certificates).freeze, + equivalentClass: "wot:PubKey".freeze, + isDefinedBy: "cert:".freeze, label: "PGPCertificate".freeze, - :"owl:equivalentClass" => %(wot:PubKey).freeze, - :"rdfs:isDefinedBy" => %(cert:).freeze, subClassOf: "cert:Certificate".freeze, type: "owl:Class".freeze, - :"vs:term_status" => %(unstable).freeze + "vs:term_status": "unstable".freeze term :PrivateKey, comment: %(Private Key).freeze, + isDefinedBy: "cert:".freeze, label: "PrivateKey".freeze, - :"rdfs:isDefinedBy" => %(cert:).freeze, subClassOf: "cert:Key".freeze, type: "owl:Class".freeze term :PublicKey, comment: %(Public Key).freeze, + isDefinedBy: "cert:".freeze, label: "PublicKey".freeze, - :"rdfs:isDefinedBy" => %(cert:).freeze, subClassOf: "cert:Key".freeze, type: "owl:Class".freeze, - :"vs:term_status" => %(unstable).freeze + "vs:term_status": "unstable".freeze term :RSAKey, comment: %( The union of the public and private components of an RSAKey. Usually those pieces are not kept together ).freeze, + isDefinedBy: "cert:".freeze, label: "RSA Key".freeze, - :"rdfs:isDefinedBy" => %(cert:).freeze, subClassOf: "cert:Key".freeze, type: "owl:Class".freeze, - :"vs:term_status" => %(unstable).freeze + "vs:term_status": "unstable".freeze term :RSAPublicKey, comment: %( The RSA public key. Padded message m are encrypted by applying the function modulus\(power\(m,exponent\),modulus\) ).freeze, + isDefinedBy: "cert:".freeze, label: "RSA Public Key".freeze, - :"rdfs:isDefinedBy" => %(cert:).freeze, - :"rdfs:seeAlso" => %(http://en.wikipedia.org/wiki/RSA).freeze, + "rdfs:seeAlso": "http://en.wikipedia.org/wiki/RSA".freeze, subClassOf: ["cert:PublicKey".freeze, "cert:RSAKey".freeze], type: "owl:Class".freeze, - :"vs:term_status" => %(unstable).freeze + "vs:term_status": "unstable".freeze term :Signature, comment: %(the class of signtatures).freeze, + isDefinedBy: "cert:".freeze, label: "Signature".freeze, - :"rdfs:isDefinedBy" => %(cert:).freeze, type: "owl:Class".freeze, - :"vs:term_status" => %(unstable).freeze + "vs:term_status": "unstable".freeze term :X509Certificate, comment: %(the class of X509 Certificates).freeze, + isDefinedBy: "cert:".freeze, label: "X509Certificate".freeze, - :"rdfs:isDefinedBy" => %(cert:).freeze, - :"rdfs:seeAlso" => %(http://en.wikipedia.org/wiki/X509).freeze, + "rdfs:seeAlso": "http://en.wikipedia.org/wiki/X509".freeze, subClassOf: "cert:Certificate".freeze, type: "owl:Class".freeze, - :"vs:term_status" => %(unstable).freeze + "vs:term_status": "unstable".freeze # Property definitions property :exponent, comment: %( The exponent used to encrypt the message. Number chosen between 1 and the totient\(p*q\). Often named 'e' . ).freeze, domain: "cert:RSAPublicKey".freeze, + isDefinedBy: "cert:".freeze, label: "exponent".freeze, range: "xsd:nonNegativeInteger".freeze, - :"rdfs:isDefinedBy" => %(cert:).freeze, type: "owl:DatatypeProperty".freeze, - :"vs:term_status" => %(unstable).freeze + "vs:term_status": "unstable".freeze property :identity, comment: %( the identity of the public key. This is the entity that knows the private key and so can decrypt messages encrypted with the public key, or encrypt messages that can be decrypted with the public key. ).freeze, domain: "cert:PublicKey".freeze, - label: "identity".freeze, - :"owl:inverseOf" => %(cert:key).freeze, - :"rdfs:isDefinedBy" => %(cert:).freeze, - :"skos:editorialNote" => %( + editorialNote: %( It turns out that this relation is unintuitive to write out and to name. One should instead use cert:key ).freeze, + inverseOf: "cert:key".freeze, + isDefinedBy: "cert:".freeze, + label: "identity".freeze, type: ["owl:ObjectProperty".freeze, "rdf:Property".freeze], - :"vs:term_status" => %(archaic).freeze + "vs:term_status": "archaic".freeze property :key, comment: %(relates an agent to a key - most often the public key.).freeze, domain: "foaf:Agent".freeze, + inverseOf: "cert:identity".freeze, + isDefinedBy: "cert:".freeze, label: "key".freeze, - :"owl:inverseOf" => %(cert:identity).freeze, range: ["cert:Key".freeze, "cert:PublicKey".freeze], - :"rdfs:isDefinedBy" => %(cert:).freeze, type: ["owl:InverseFunctionalProperty".freeze, "owl:ObjectProperty".freeze, "rdf:Property".freeze], - :"vs:term_status" => %(unstable).freeze + "vs:term_status": "unstable".freeze property :modulus, comment: %( <p>The modulus of an RSA public and private key. Or the modulus of a DSA Key. The modulus is encoded as a hex binary. The binary is the same as the one encoded in the @@ -171,28 +170,28 @@ </blockquote> <p>The only difference is that the octet string is then encoded using either xsd:base64Binary or xsd:hexBinary. Currently for all usages of this relation, the xsd:hexBinary datatype should be used until the SPARQL working group specifies specifies in its <a href="http://www.w3.org/TR/sparql11-entailment/#DEntRegime">D-Entailment</a> that those two types are equivalent.</p> <p>It would have been better had there been a hexInteger datatype that was standard and supported by all tools.</p> ).freeze, domain: "cert:RSAKey".freeze, + isDefinedBy: "cert:".freeze, label: "modulus".freeze, range: ["xsd:base64Binary".freeze, "xsd:hexBinary".freeze], - :"rdfs:isDefinedBy" => %(cert:).freeze, type: "owl:DatatypeProperty".freeze, - :"vs:term_status" => %(unstable).freeze + "vs:term_status": "unstable".freeze property :privateExponent, comment: %( The exponent used to decrypt the message calculated as public_exponent*private_exponent = 1 modulo totient\(p*q\) The private exponent is often named 'd' ).freeze, domain: "cert:PrivateKey".freeze, + isDefinedBy: "cert:".freeze, label: "private".freeze, range: "xsd:nonNegativeInteger".freeze, - :"rdfs:isDefinedBy" => %(cert:).freeze, type: "owl:DatatypeProperty".freeze, - :"vs:term_status" => %(unstable).freeze + "vs:term_status": "unstable".freeze # Datatype definitions term :hex, comment: %(<span xmlns="http://www.w3.org/1999/xhtml" xmlns:dc="http://purl.org/dc/terms/" xmlns:foaf="http://xmlns.com/foaf/0.1/" xmlns:owl="http://www.w3.org/2002/07/owl#" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:rdfs="http://www.w3.org/2000/01/rdf-schema#" xmlns:skos="http://www.w3.org/2004/02/skos/core#" xmlns:vs="http://www.w3.org/2003/06/sw-vocab-status/ns#"><p> An encoding of a positive integer \(from 0 to infinity\) as a hexadecimal string that makes it easy to read and/or fun to present on the web.</p> @@ -231,19 +230,19 @@ [] a rsa:RSAPublicKey; rsa:public_exponent "e1 dc d5 ..."^^cert:hex . </pre> </span> ).freeze, - label: "hexadecimal".freeze, - :"owl:equivalentClass" => %(xsd:nonNegativeInteger).freeze, - :"rdfs:isDefinedBy" => %(cert:).freeze, - :"rdfs:seeAlso" => %(http://en.wikipedia.org/wiki/Hexadecimal).freeze, - :"skos:editorialNote" => %(<span xmlns="http://www.w3.org/1999/xhtml"><p> + editorialNote: %(<span xmlns="http://www.w3.org/1999/xhtml"><p> This relation should slowly be transited to just being a datatype.</p> <p>Being a datatype and a property is legal as explained here <a href="http://lists.w3.org/Archives/Public/semantic-web/2010Mar/0037.html">on the semantic web mailing list in March 2010</a>. But it may be somewhat confusing, especially if it goes against a pattern - still to be set - by the xsd datatypes as the follow up email makes clear. </p></span> ).freeze, + equivalentClass: "xsd:nonNegativeInteger".freeze, + isDefinedBy: "cert:".freeze, + label: "hexadecimal".freeze, + "rdfs:seeAlso": "http://en.wikipedia.org/wiki/Hexadecimal".freeze, type: "rdfs:Datatype".freeze, - :"vs:term_status" => %(archaic).freeze + "vs:term_status": "archaic".freeze end end