[Docs] [txt|pdf] [Tracker] [Email] [Diff1] [Diff2] [Nits]

Versions: 00 01 02

Network Working Group                                        I. Maturana
Internet-Draft                                                I. Robredo
Expires: December 30, 2004                                     in3activa
                                                               July 2004


         Scope Modifiers in Intellectual Property Declarations
                     draft-maturana-ipscope-02.txt

Status of this Memo

   This document is an Internet-Draft and is subject to all provisions
   of section 3 of RFC 3667.  By submitting this Internet-Draft, each
   author represents that any applicable patent or other IPR claims of
   which he or she is aware have been or will be disclosed, and any of
   which he or she become aware will be disclosed, in accordance with
   RFC 3668.

   Internet-Drafts are working documents of the Internet Engineering
   Task Force (IETF), its areas, and its working groups.  Note that
   other groups may also distribute working documents as
   Internet-Drafts.

   Internet-Drafts are draft documents valid for a maximum of six months
   and may be updated, replaced, or obsoleted by other documents at any
   time.  It is inappropriate to use Internet-Drafts as reference
   material or to cite them other than as "work in progress."

   The list of current Internet-Drafts can be accessed at
   http://www.ietf.org/ietf/1id-abstracts.txt.

   The list of Internet-Draft Shadow Directories can be accessed at
   http://www.ietf.org/shadow.html.

   This Internet-Draft will expire on December 30, 2004.

Copyright Notice

   Copyright (C) The Internet Society (2004).

Abstract

   The purpose of this RFC is to focus discussion on intellectual
   property problems in the Internet.

   This document introduces and defines scope modifiers to be used in
   intellectual property declarations.  These modifiers abstract the
   ownership behavior of resources available in interoperable
   environments, such as the Internet.



Maturana & Robredo     Expires December 30, 2004                [Page 1]


Internet-Draft                Internet(C)                      July 2004


Table of Contents

   1.  Introduction . . . . . . . . . . . . . . . . . . . . . . . . .  3
     1.1   Intended audience  . . . . . . . . . . . . . . . . . . . .  3
     1.2   Definitions  . . . . . . . . . . . . . . . . . . . . . . .  3
     1.3   Requirement notation . . . . . . . . . . . . . . . . . . .  4
   2.  Semantics of interoperability  . . . . . . . . . . . . . . . .  5
     2.1   An analogy: the logic of classes . . . . . . . . . . . . .  5
     2.2   Categories of operations . . . . . . . . . . . . . . . . .  6
     2.3   Reciprocity and equivalence  . . . . . . . . . . . . . . .  8
   3.  Definition of scope modifiers  . . . . . . . . . . . . . . . . 10
     3.1   PRIVATE modifier . . . . . . . . . . . . . . . . . . . . . 11
     3.2   PROTECTED modifier . . . . . . . . . . . . . . . . . . . . 11
     3.3   INTERNET modifier  . . . . . . . . . . . . . . . . . . . . 11
     3.4   PUBLIC modifier  . . . . . . . . . . . . . . . . . . . . . 12
     3.5   Scope inheritance  . . . . . . . . . . . . . . . . . . . . 13
   4.  Syntax of ownership declarations . . . . . . . . . . . . . . . 14
     4.1   Formal declaration . . . . . . . . . . . . . . . . . . . . 14
     4.2   Property line  . . . . . . . . . . . . . . . . . . . . . . 15
     4.3   Attribution line . . . . . . . . . . . . . . . . . . . . . 15
     4.4   License line . . . . . . . . . . . . . . . . . . . . . . . 16
     4.5   Long names and short names of modifiers  . . . . . . . . . 17
   5.  Scope modifiers implementation . . . . . . . . . . . . . . . . 18
     5.1   Handwritten implementation: the default modifier . . . . . 18
     5.2   HTML implementation: the SCOPE tag . . . . . . . . . . . . 18
     5.3   Dublin Core implementation . . . . . . . . . . . . . . . . 19
     5.4   Using licenses . . . . . . . . . . . . . . . . . . . . . . 20
   6.  Security Considerations  . . . . . . . . . . . . . . . . . . . 22
   7.  References . . . . . . . . . . . . . . . . . . . . . . . . . . 22
       Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . 23
       Intellectual Property and Copyright Statements . . . . . . . . 24




















Maturana & Robredo     Expires December 30, 2004                [Page 2]


Internet-Draft                Internet(C)                      July 2004


1.  Introduction

   This document defines four scope modifiers to be used in intellectual
   property declarations of resources available in interoperable
   environments, such as Internet.  They help to abstract the ownership
   behavior of these resources.

   We proceed in three steps.  We characterize the semantics of the
   operations applicable on resources, based on the pair (URI,
   ownership).  Then we determine the modifiers that control the
   interoperability of resources.  Finally we describe the general
   syntax of the ownership declarations that use these modifiers.  An
   fourth chapter will introduce various implementations of the
   described syntax.

   Four modifiers are defined.  The PUBLIC, PROTECTED and PRIVATE
   modifiers are transpositions of the class programming equivalents.  A
   fourth modifier -- the INTERNET modifier --  operates like an
   all-country exclusion: it allows the transformation, but does not
   allow the reproduction, of a private resource exhibited in
   interoperable environments, such as Internet.

   As an example, the following declaration illustrates a typical usage
   of the PUBLIC and PRIVATE modifiers.  This declaration asserts that
   OwnerB's private resource (the client resource) is a derivative
   version of OwnerA's public resource (the server resource).


       Private(C) 2004, OwnerB (http://www.client.com)
       & Public(C) 2002-2004, OwnerA (http://www.server.com)
       All rights reserved.



1.1  Intended audience

   No special knowledge is expected from readers.  However, some
   concepts have a background and rely on a vocabulary that is more
   familiar to specialized readers:
   o  Intellectual property rights, as defined for protected works by
      the Berne Convention [BERNE].
   o  Class modifiers such as Public, Private and Protected, as defined
      in Class programming languages; [CPPREF]

1.2  Definitions

   INTELLECTUAL PROPERTY BASED OBJECT (IP OBJECT) is an instance of a
   work, as defined by Berne Convention (Art.  2), and the laws of the



Maturana & Robredo     Expires December 30, 2004                [Page 3]


Internet-Draft                Internet(C)                      July 2004


   countries of the Berne Union [BERNE].

   RESOURCE is an IP Object defined unambiguously in an interoperable
   environment by two properties: its URI and an ownership declaration.
   More strictly, a resource is an interface defined by the pair (URI,
   ownership) of an IP object made available in an interoperable
   universe

   OWNERSHIP is a resource property, defined by the Berne Convention
   (Art.  5), and the laws of the countries of the Berne Union [BERNE].

   URI is a resource property, the Universal Resource Identifier of an
   IP object, defined in [RFC2396].

   SCOPE (OF OWNERSHIP), as used in this document, determines the
   resource behavior in regard of specific operations: exhibition
   (instantiation), execution (performance), reproduction (copy) and
   transformation (derivation).  Brackets only denote synonyms for
   operations defined in this document.

   SCOPE MODIFIER, is a conventional token attached to an ownership
   declaration, used to alter the behavior of the resource in an
   interoperable environment.
   The aim of this document is to define and to describe such scope
   modifiers.

   SERVER and CLIENT RESOURCES.  A server resource refers to the
   original resource, which has been reproduced or transformed, to
   create a client resource.
   A client resource is the resulting reproduction or transformation of
   a server resource.
   A version is also a client resource, which designates specifically
   the result of the transformation of the server resource.

   INTEROPERABILITY is defined following the IEEE Standard Computer
   Dictionary: "the ability of two or more systems or components
   ("resources") to exchange information and to use the information that
   has been exchanged" [IEEE 90].

   INTERNET, is an interoperable environment of resources.
   In this document, INTERNET is also the conventional name of a scope
   modifier.

1.3  Requirement notation

   The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
   "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
   document are to be interpreted as described in [RFC2119].



Maturana & Robredo     Expires December 30, 2004                [Page 4]


Internet-Draft                Internet(C)                      July 2004


2.  Semantics of interoperability

   This first chapter will analyze the semantic of the   operations
   applicable on resources.  Next chapter defines  the scope modifiers
   that alter the behavior of resources; and the last chapter describes
   the general syntax of the ownership declarations.

2.1  An analogy: the logic of classes

   As a starting point, we present an analogy between Resources
   declarations and Class declarations used in class programming
   languages.  This analogy   is not required to fully understand this
   document.

   Given the "(c) year, author" expression, the legal mention to the
   Country is implicit.  Indeed, we could write:

           "France (c) 2004, I.Robredo"

   In our example, "Country" is a virtual base class, from which we
   derive a special rightsholder class: the class "I.Robredo".  Each
   instance of this Rightsholder class is a concrete IP Object,
   identified unambiguously by an URI.  For example, the URI of a
   manuscript or a song is the title, the author's name and the date.

   The declaration above may be read as follow:


        "France (c) 2004, I.Robredo"

        Is an ownership declaration of an IP object, where:

           France      is the name of the virtual, country base class.
                       Optional. By default, the author's country.

           I.Robredo   is the name of the rightsholder class,
                       derived from the country class
                       (usually the Author's name, but can be any
                       entity).

           ... 2004    is an instance of the I.Robredo class. The
                       IP object itself is defined by the 2004 version
                       (along with the title, the author's name, ...).


   An ownership declaration can be used when the rightsholder wants to
   make available an IP Object in an interoperable environment, under
   specific conditions of ownership.  This object is called a resource.



Maturana & Robredo     Expires December 30, 2004                [Page 5]


Internet-Draft                Internet(C)                      July 2004


   Two properties will determine the resource behavior in the
   interoperable environment: its URI and the ownership declaration.

   Before being available, the resource is unknown and the ownership
   declaration is not even required.  This declaration is really
   required to allow some interoperations on the resource.  In other
   words, the ownership   declaration is used to determine or to alter
   the interoperability  of the resource.

   In Class programming languages, special modifiers attached to Class
   declarations are used to determine the results of operations on the
   classes and on the object instances.  In other words, these modifiers
   can define the semantics of the relations between classes or between
   objects.  This document shows that similar conventions can be applied
   to the resources exhibited in interoperable environments, such as
   Internet.

2.2  Categories of operations

   A resource is defined by a couple of properties: its URI and its
   ownership declaration.

   Some relations may be identified between these properties:
   o  The same URI cannot point resources from different rightsholders.
   o  Two URIs may point to either the same or duplicated resources.
   o  Different rightsholders cannot attach the same URI to their
      ownership declaration.

   All these relations are contained in the answers to the following two
   questions.  For any operation:
   o  Will the operation on a resource create a second URI?
   o  In case of URI creation, is there a separate ownership on the
      client resource ?

   Four operations are defined as follows (alias names are
   parenthesized):















Maturana & Robredo     Expires December 30, 2004                [Page 6]


Internet-Draft                Internet(C)                      July 2004


     EXHIBITION  (Instantiation) The Owner instantiates an IP Object
                 by defining its URI and ownership properties.
                 Exhibition of the resource is always accomplished by
                 the rightsholder (for example: the author).

     EXECUTION   (Performance) There is no URI creation. A volatile
                 instance of the IP Object is performed.
                 Whether the performer is the rightsholder or another
                 different person, the ownership of this volatile
                 resource remains the same, and belongs to the original
                 rightsholder.

     REPRODUCTION (Copy) A new, persistent URI is created, and the
                 resource exhibited under this new URI is called a
                 "client resource".
                 Whether the underlying object under each URI is the
                 same object or a duplicate object, the ownership of
                 both server and client resources remains the same, and
                 belongs to the original rightsholder.

     TRANSFORMATION (Derivation) A new, persistent client resource
                 is created, with separate properties (URI, ownership).
                 This client resource is called a "version" of the
                 original server resource.
                 Even whether the rightsholder of both server and
                 client resources is the same person, the ownership
                 attached to the version resource is different from
                 the ownership of the original resource.
                 The ownership declaration on the version is asserted
                 by the exhibitor of the resource.


   The following table resumes the above relations between URI and
   ownership:


        Operation       | Question 1:     Question 2:
                        | Is there a 2nd  In case of URI creation, is
                        | URI creation?   there a separate ownership?
        ----------------|--------------------------------------------
        EXHIBITION      |  No              -
        EXECUTION       |  No              -
                        |
        REPRODUCTION    |  Yes             No
        TRANSFORMATION  |  Yes             Yes
        ----------------|--------------------------------------------





Maturana & Robredo     Expires December 30, 2004                [Page 7]


Internet-Draft                Internet(C)                      July 2004


2.3  Reciprocity and equivalence

   This section is not required to fully understand this document, and
   it refers explicitly to the 5 first articles of the Berne Convention.
   [BERNE].

   The exhibition and execution operations require some explanations.
   o  Exhibition is a pragmatic equivalent of the verb "creation", which
      is not defined by itself, but it is implied by Berne-A2.2, as a
      work fixed in a form.  Whether a work is published or not
      (Berne-A3,1a), it can be exhibited.
      The word exhibition is a shorthand to describe the instantiation
      of a resource under 2 coordinates: its URI and its ownership
      declaration.  When an IP object is instantiated under the pair
      (URI, ownership declaration), this object becomes accessible and
      it is possible to inter-operate with it.
   o  Execution is a synonym for performance, which is not defined by
      itself, but it is implied by Berne-A3,3: the performance of a
      protected work shall not constitute publication.  We choose the
      word "execution" because it is typically used to describe software
      execution, but it could be used for the recitation of a poetry, or
      to describe the application of this document on Internet resources
      as well.

   Otherness is the key concept to differentiate exhibition and
   execution: the person who executes a resource is not required to be
   the same person who exhibits it.  The exhibitor and the performer of
   the work can be different persons.  For example, given a computer
   software, we say that only the rightsholder can exhibit the source
   code, while any (authorized) person can execute the object code.

   Otherness is the basis of two complementary principles: the
   reciprocity in protection given by countries (Berne-A3 and A5) and
   the equivalence in ownership of transformed resources (Berne A2.3).
   Both principles are governed by an explicit non-damaging restriction:
   client ownership cannot make prejudice to server  ownership.

   We say that this non-damaging rule governs the "inheritance" of
   resource behaviors.
   o  Any reproduction or transformation of an exhibited work can be
      exhibited as well (or it cannot be reproduced nor transformed).
   o  If the server resource can be executed, any client resource
      (either transformed or reproduced) can be executed as well.
   o  Allowing the reproduction of a server resource under a different
      URI will imply that the duplicate resource can be reproduced as
      well.

   Ideally, allowing the transformation of a resource does not imply



Maturana & Robredo     Expires December 30, 2004                [Page 8]


Internet-Draft                Internet(C)                      July 2004


   that the derivative resource can be transformed as well.  There is a
   separate ownership between both server and client resources, in case
   of transformation.  However, the non-damaging rule still works here,
   either explicitly, or implicitly:
   o  The non-damaging rule can be used to explicitly enforce the
      inheritance: transformation of the server resource will be granted
      only if the client resource will also allow the transformation.
      Otherwise, transformation of the server resource is forbidden.
   o  Without an agreement, the non-damaging rule still works like a
      safeguard of both reciprocity and equivalence principles.
      Everything  allowed for a server resource is expected to be
      allowed for client resources, while anything excluded for the
      server will be always excluded for clients.  For example,
      translation is allowed for a book, but some languages are
      excluded.  A translator cannot allow re-translation to the already
      excluded languages; and trying to prevent the re-translation to
      even more languages is unenforceable.

   The non-damaging rule can enforce the inheritance.  The same rule can
   also alter the default reciprocity and equivalence behaviors.  In
   this case, the way to alter the default inheritance mechanism is
   using scope modifiers.





























Maturana & Robredo     Expires December 30, 2004                [Page 9]


Internet-Draft                Internet(C)                      July 2004


3.  Definition of scope modifiers

   In the previous chapter, we analyzed the semantics of
   inter-operations on resources defined by the pair (URI, ownership).
   In this chapter, we define the modifiers that are used to alter the
   resource behaviors.  The general syntax of the ownership declarations
   will be described in the next chapter.

   There is a formal relationship between the URI property and the
   EXECUTION or REPRODUCTION operations.  A second URI is always
   attached to all reproductions of the resource.  In other words, the
   difference between a simple execution and a true reproduction raises
   when a new URI is defined for the copied resource.

   Conversely, there is a semantic relationship between the ownership
   property and the EXHIBITION and TRANSFORMATION operations.  An
   exhibited resource is always managed by its rightsholder.  However, a
   true transformation implies a second user, which in turn, has a
   complete ownership on the version produced.

   The following summarizes REPRODUCTION and TRANSFORMATION operations,
   and how they determines a new URI creation, or a separate ownership,
   or both:


        Operation         | Separate    Separate
                          | URI?        ownership?
        ------------------|--------------------------------
        REPRODUCTION      |  Yes        No
        TRANSFORMATION    |  Yes        Yes
        ------------------|--------------------------------


   Then we create the truth table of REPRODUCTION and TRANSFORMATION
   capabilities to identify each entry with four scope modifiers:


             REPRODUCTION  TRANSFORMATION | SCOPE is
         ------------------------------------------------
              No            No            |  PRIVATE
              Yes           No            |  PROTECTED
              No            Yes           |  INTERNET
              Yes           Yes           |  PUBLIC
         ------------------------------------------------


   The following table is the same than above, but it is possible to
   read it out in a more natural way.



Maturana & Robredo     Expires December 30, 2004               [Page 10]


Internet-Draft                Internet(C)                      July 2004


   The symbols '-' and '+' mean that the operation is denied, or
   allowed, respectively.  The symbol '-' can be read like 'not', while
   the symbol '+' correspond to a silence (a consent).


         The resource is | When the resource can be
         ------------------------------------------------
          PRIVATE        | -REPRODUCED and -TRANSFORMED
          PROTECTED      | +REPRODUCED but -TRANSFORMED
          INTERNET       | -REPRODUCED but +TRANSFORMED
          PUBLIC         | +REPRODUCED and +TRANSFORMED
         ------------------------------------------------


    This truth table shows clearly that the space allocated to the
   INTERNET modifier is a logical imperative of the semantics of
   interoperability.

3.1  PRIVATE modifier

   The PRIVATE modifier means that no secondary URI, and no separate
   ownership are allowed for the resource.  No reproduction, and no
   transformation are allowed.

   By default, the exhibition and the execution of a PRIVATE resource is
   restricted to the rightsholder.

3.2  PROTECTED modifier

   The PROTECTED modifier means that the reproduction of the resource is
   allowed under a client URI, but no separate ownership is granted.
   Reproduction is allowed, but transformation is forbidden.

   The client resource inherits the same scope than server.  By default,
   it is possible to make news reproductions of the client resource.

   A protected resource is typically managed with a license.  For
   example, a license can be used in a collective project that
   encourages the reproduction of the work.  A protected license can
   even create a "mixed scope", by allowing some transformations
   capabilities to resources.

3.3  INTERNET modifier

   The INTERNET modifier means that the transformation of the resource
   is allowed,  but its reproduction is forbidden.

   The INTERNET modifier can be defined as a "country excluder".  This



Maturana & Robredo     Expires December 30, 2004               [Page 11]


Internet-Draft                Internet(C)                      July 2004


   exclusion rationale highlights the fact that the server resource
   appears just like a private resource under the laws of all countries.
   In other words, the client version cannot be reproduced in any
   country, and its ownership is only recognized by the original
   rightsholder.

   However, a separate ownership exists and the client version inherits
   the same scope than the server resource.  For example, it is not
   possible (even to the original rightsholder) to reproduce the
   transformed version in any country.

   Traditional ownership is built upon country reciprocity.  The
   Internet scope shows that individuals can still enforce the resource
   ownership under a country exclusion.  Otherness is also matter of
   individual, rather than of the countries.

   To summarize, the Internet scope has three characteristics:
   o  Regarding the country laws, an Internet server resource works just
      like a PRIVATE resource, with the exception that it is possible to
      create new versions from it.  However, by default no reproduction
      and no execution of these versions are allowed in no country.
   o  Any version SHALL inherit the INTERNET modifier.  The modifier has
      equivalent capabilities than the server resource (section 2.3).
      In other words, multiple versions of the same Internet resource
      can be exhibited by different rightsholders.
   o  All Internet versions SHALL refer, directly or indirectly, to an
      original server resource.  Any operation on a client version
      resource (even its exhibition or execution) may ultimately require
      the original rightsholder's authorization.

   The Internet resource can also be managed by a license.  For example,
   to authorize the reproduction  of a specific version, based on the
   polling of readers.

   Without the INTERNET scope modifier, it would be impossible to
   understand the widest part of the behavior of resources in
   interoperable environments, such as Internet.

3.4  PUBLIC modifier

   The PUBLIC means that the reproduction and transformation of the
   resource is allowed under a client URI, and a separate ownership is
   recognized to derivative versions.

   The client resource inherits the same scope than server.  By default,
   the client resource is public.

   PUBLIC scope must not be confused with "public domain".  The



Maturana & Robredo     Expires December 30, 2004               [Page 12]


Internet-Draft                Internet(C)                      July 2004


   rightsholder of the public resource keeps the full control on the
   resource.

3.5  Scope inheritance

   The rule of scope inheritance is described in the following table.
   More advanced explanations on inheritance can be read in previous
   section (see "Reciprocity and Equivalence").

   Given 2 resources, server and client, the scope modifier of the
   client declaration SHALL be either the same or a more restrictive
   modifier.


     Server      |      Client resource MAY be:
     resource is |   Private  Protected Internet Public
     ----------------------------------------------------
     PRIVATE     |    Yes     --         --      --
     PROTECTED   |    --      Yes        --      --
     -----------------------------------------------------
     INTERNET    |    Yes     --         Yes     --
     -----------------------------------------------------
     PUBLIC      |    Yes     Yes        Yes     Yes
     -----------------------------------------------------


   Notes:
   o  Internet and public client resources can degrade to private
      because they recognize a separate ownership.
   o  The client of a public resource can freely degrade to any scope.
      This is done without prejudice to server rightsholder, who has
      explicitly allowed the transformation and the reproduction of the
      client resources.

   This document does not define precedence rules for scope modifiers.
















Maturana & Robredo     Expires December 30, 2004               [Page 13]


Internet-Draft                Internet(C)                      July 2004


4.  Syntax of ownership declarations

   In previous chapters, we analyzed the semantics of interoperability,
   then we defined four scope modifiers for ownership declarations.
   This chapter describes the RECOMMENDED syntax of such declarations.

4.1  Formal declaration

   The formal declaration is a multiline text.  Server and client
   resources declarations share the same declaration syntax.

   The syntax is based on three possible line types.

   o  Property line.  MUST appear.  It contains the rightsholder's
      declaration of the resource.
   o  Attribution line(s).  SHALL appear in client resource
      declarations.  It refers to the rightsholder's declaration of a
      server resource.
   o  License line.  Optional.  Free text or link that defines specific
      conditions of ownership.

   A server declaration contains a Property line and optionally, a
   License line:


      [modifier](C) [date][owner]              (Property line)
      [standard assertion or license link]     (License line)


    A client declaration contains the same lines than the server
   declaration, plus one or more attribution lines:


      [modifier](C) [date][owner]              (Property line)
      & [modifier](C) [date][owner]            (Attribution line)
      [standard assertion or license link]     (License line)


   Here is an example of an Internet client declaration:


       Internet(C) 2004, ClientOwner (client-owner@clientsite.com)
       & Internet(C) 2004, ServerOwner (server-owner@serversite.com)
       All rights reserved in all countries.







Maturana & Robredo     Expires December 30, 2004               [Page 14]


Internet-Draft                Internet(C)                      July 2004


4.2  Property line

   Property line MUST appear for all modifiers.  The Property line is
   composed of:
   o  The scope modifier, from the token list:  Private, Protected,
      Public, Internet.
   o  The (C) symbol.  This symbol may be entered as a parenthesized C,
      uppercase or lowercase.
   o  The Date of first exhibition, usually followed by the date of the
      last update
   o  The Name of the resource rightsholder
   o  Any optional information, as the resource URL or the author's
      email address.


               Modifier                 Scope
               -------------------------------------
               (none)                  PRIVATE
               [Private](C)            PRIVATE
               Protected(C)            PROTECTED
               Public(C)               PUBLIC
               Internet(C)             INTERNET
               -------------------------------------


   In a compliant declaration, the (C) symbol MUST follow the scope
   modifier.  The (C) symbol MUST appears even if no modifier is used or
   Country Law does not require it.

   Two examples:


       Internet(C) 2004, OwnerName (owner-x@somesite.com)

       Public(C) 2002-2004, OwnerName (owner-x@somesite.com)



4.3  Attribution line

   The Attribution line SHALL be used in an ownership declaration when
   the resource is a transformed version of the original or when
   multiple rightsholders share different rights on it.

   The use of an AMPERSAND sign ('&') in front of Attribution line is
   RECOMMENDED.

   The syntax of Attribution line is otherwise similar to the Property



Maturana & Robredo     Expires December 30, 2004               [Page 15]


Internet-Draft                Internet(C)                      July 2004


   line.  For example:


       Internet(C) 2004, OwnerC (http://www.clientC.com)
       & Internet(C) 2002-2004, OwnerB (http://www.client_server.com)
       & Public(C) 2002, OwnerA (http://www.server.org)


   When multiple server resources have been used, or because there are
   multiple rightsholders, the ownership declaration may contain
   multiple attribution lines.  For example:


      [modifier](C) [date][Local Rightsholder for the translation]
      & [modifier](C) [date][Worldwide Rightsholder for all languages]
      & [modifier](C) [date][Author who sold the original rights]
      [standard assertion or license link]



4.4  License line

   License line is OPTIONAL and can be used with any modifier to
   override the default behavior of the resource.

   The license line can be multiline and MUST close the ownership
   declaration, after the Property line and the Attribution line(s).

   The license line is a free text that usually relies on conventional
   expressions, as used in the country of the protected resource.


       Private(C) 2004, Owner (http://www.clienttranslation.com)
       All rights reserved


    Here is another sample in French.


       Internet(C) 2004, NomDuClient (http://www.client.fr)
       & Internet(C) 2002-2004, NomDuServeur (http://www.serveur.ca)
       Reproduction interdite


   The license line can refer to a license identified by an external
   URI.





Maturana & Robredo     Expires December 30, 2004               [Page 16]


Internet-Draft                Internet(C)                      July 2004


       Internet(C) 2004, OwnerX (owner-x@somesite.com)
       LGTv1r4: http://www.in3activa.org



4.5  Long names and short names of modifiers

   Scope modifiers are chosen from a finite token list, with four
   elements: Private, Protected, Internet, Public.
   All uppercase or lowercase variations are allowed and these
   variations do not modify the modifier semantics .

   This document does not define localized names for these tokens.
   However, it defines short equivalents, as in the following table:


           Long name       Short name
           -------------------------------------
           Private(C)       pri(c)
           Protected(C)     pro(c)
           Public(C)        pub(c)
           Internet(C)      int(c)
           -------------------------------------


   Here is a compliant handwritten implementation using short names:

       Int(C) 2004, RightsHolder ...

   Note: usage of short equivalents is reserved to the handwritten
   implementation of the syntax.  Metalanguage descriptions (such HTML
   or Dublin Core) MUST use long names for modifiers.



















Maturana & Robredo     Expires December 30, 2004               [Page 17]


Internet-Draft                Internet(C)                      July 2004


5.  Scope modifiers implementation

   After we analyzed the semantics of the interoperability of resources
   based on the pair (URI, ownership), we determined four scope
   modifiers, and proposed a recommended syntax to use the ownership
   declarations.

   As a conclusion to this specification, this chapter describes three
   compliant implementations of the scope modifiers.

5.1  Handwritten implementation: the default modifier

   The handwritten implementation matches the full syntax specification
   of scope modifiers.  The handwritten implementation also allows the
   usage of short names of modifiers.  For a complete handwritten
   implementation, see the previous chapter.

   To follow the common usage in the countries of Berne Union, a
   compliant handwritten implementation SHALL consider the PRIVATE
   modifier as the default modifier.

   The following declaration :

       (C) 2004, RightsHolder ..

   will be interpreted as:

       Private(C) 2004, RightsHolder ...


5.2  HTML implementation: the SCOPE tag

   Scope modifiers are well suited for automated processing by robots,
   and for dissemination of resources in the Internet.  Among multiple
   possibilities, we define the HTML implementation [HTML40], because it
   can be easily adapter to other metalanguage specifications (XML, RDF,
   etc).

   The RECOMMENDED implementation of this framework with the HTML 4.0
   language MUST include:
   o  A SCOPE meta tag in the HEAD section, which defines the default
      scope of the resource.
   o  Optionally, one or more scope tags in the body, which override the
      default scope defined in the header.

   The following example describes a protected HTML resource:





Maturana & Robredo     Expires December 30, 2004               [Page 18]


Internet-Draft                Internet(C)                      July 2004


          <html>
          <head>
           ...
          <meta name  = "scope"
               content   = "internet" >
           ...
          </head>
          <body><pre>
             ...
          </pre></body>
          </html>


   The content attribute defines the default scope of the resource.
   HTML body tags that define specific content boundaries may override
   this default scope

   The following sample defines a Public scope portion, located inside
   the default Internet scope of the resource.  Both syntax are allowed
   and MUST be recognized by automatic processing:


          <scope content="public"> ... <scope>
     or
          <scope public> ... <scope>



5.3  Dublin Core implementation

   The Dublin Core specification offers a richer layout for scope
   modifiers.  This section describes the addition of the "scope"
   modifier to the Dublin core specification [RFC2731].

   The addition is based on a new SCOPE element, to be used along with
   the already defined Rights Element:















Maturana & Robredo     Expires December 30, 2004               [Page 19]


Internet-Draft                Internet(C)                      July 2004


         <html>
          <head>
          <title>Le ravissement d'Europe</title>
          <link rel     = "schema.DC"
                href    = "http://purl.org/DC/elements/1.0/">
          <meta name    = "DC.Title"
                content = "Charte in3ActivA de traducteurs...">
          <meta name    = "DC.Creator"
                content = "Robredo, I">
          <meta name    = "DC.Type"
                content = "Contrat">
          <meta name    = "DC.Date"
                content = "2004">
          <meta name    = "DC.Format"
                content = "text/html">
          <meta name    = "DC.Language"
                content = "fr">


          <meta name = "DC.Rights"
                lang   = "fr"
                content= "http://www.in3activa.org/doc/fr/LGT-FR.html">

          <meta name = "DC.Scope"
                content= "Internet">

          </head>
          <body><pre>
             ...
          </pre></body>
          </html>


    This Dublin Core example would be equivalent to the following
   handwritten declaration (possibly inserted at the end of the
   resource):


       internet(C) 2004, I.Robredo
       http://www.in3activa.org/doc/fr/LGT-FR.html



5.4  Using licenses

   The scope modifiers provide a powerful, although generic, framework
   for resources.  To enlarge or restrict the scope of the resource
   ownership, the rightsholders may define a license and override the



Maturana & Robredo     Expires December 30, 2004               [Page 20]


Internet-Draft                Internet(C)                      July 2004


   default behavior of scope modifiers.

   For example, a license may override the protected scope of software
   resource, and it can authorize the resource transformation under
   specifics conditions.

   Conversely, the license of an Internet resource can be provided to
   authorize the reproduction in some countries, such as the licensee's
   country.  For example, the license attached to an Internet resource
   may allow a book reproduction to be sold in specific countries,
   without prejudice to the original ownership.


       (c) 2004, I.Maturana for the Spanish version
       &Internet (C) 1999-2004, I.Robredo
       http://www.in3activa.org/doc/es/LGT-ES.html


   The framework provided by scope modifiers introduces the opportunity
   for rightsholders to create and develop powerful licenses schemas,
   based on the analysis and the simulation of resource behaviors, in
   interoperable environments, including the Internet.





























Maturana & Robredo     Expires December 30, 2004               [Page 21]


Internet-Draft                Internet(C)                      July 2004


6.  Security Considerations

   None.

7  References

   [BERNE]    World Intellectual Property Organization, WIPO., "Berne
              Convention  for the Protection of Literary and Artistic
              Works", Paris Act of July 24, 1971, as amended on
              September 28, 1979,
              <http://www.law.cornell.edu/treaties/berne/overview.html>.

   [CPPREF]   Ellis, M. and B. Stroustrup, "The annotated C++ Reference
              Manual", 1990.

   [HTML40]   W3C, "Hypertext Markup Language 4.0 Specification", April
              1998, <http://www.w3.org/TR/REC-html40/>.

   [IEEE 90]  Institute of Electrical and Electronics Engineers, "IEEE
              Standard Computer Dictionary: A Compilation of IEEE
              Standard Computer Glossaries. New York, NY", 1990.

   [LGT]      Maturana, I. and I. Robredo, "General license of
              translation", 1990-2004, <http://www.in3activa.org>.

   [RDF]      W3C, "Resource Description Framework Model and Syntax
              Specification", February 1999,
              <http://www.w3.org/TR/REC-rdf-syntax/>.

   [RFC2119]  S. Bradner, "Key words for use in RFCs to Indicate
              Requirement Levels", March 1997,
              <http://www.ietf.org/rfc/rfc2119.txt>.

   [RFC2396]  Berners-Lee, T., Fielding, R., Irvine, U. and L. Masinter,
              "Uniform Resource Identifiers (URI): Generic Syntax",
              August 1998, <http://www.ietf.org/rfc/rfc2396.txt>.

   [RFC2413]  Weibel, S., Kunze, J., Lagoze, C. and M. Wolf, "Dublin
              Core Metadata for Resource Discovery, RFC 2413", September
              1998, <http://www.ietf.org/rfc/rfc2413.txt>.

   [RFC2731]  Kunze, J., "Encoding Dublin Core Metadata in HTML, RFC
              2731", December 1999,
              <http://www.ietf.org/rfc/rfc2731.txt>.

   [XML]      W3C, "Extensible Markup Language (XML)", 2004,
              <http://www.w3.org/TR/REC-xml/>.




Maturana & Robredo     Expires December 30, 2004               [Page 22]


Internet-Draft                Internet(C)                      July 2004


Authors' Addresses

   I.Maturana
   in3activa
   Aptdo 15.117
   Madrid, Spain


   I.Robredo
   in3activa
   Ziburu, France








































Maturana & Robredo     Expires December 30, 2004               [Page 23]


Internet-Draft                Internet(C)                      July 2004


Intellectual Property Statement

   The IETF takes no position regarding the validity or scope of any
   Intellectual Property Rights or other rights that might be claimed to
   pertain to the implementation or use of the technology described in
   this document or the extent to which any license under such rights
   might or might not be available; nor does it represent that it has
   made any independent effort to identify any such rights.  Information
   on the procedures with respect to rights in RFC documents can be
   found in BCP 78 and BCP 79.

   Copies of IPR disclosures made to the IETF Secretariat and any
   assurances of licenses to be made available, or the result of an
   attempt made to obtain a general license or permission for the use of
   such proprietary rights by implementers or users of this
   specification can be obtained from the IETF on-line IPR repository at
   http://www.ietf.org/ipr.

   The IETF invites any interested party to bring to its attention any
   copyrights, patents or patent applications, or other proprietary
   rights that may cover technology that may be required to implement
   this standard.  Please address the information to the IETF at
   ietf-ipr@ietf.org.


Disclaimer of Validity

   This document and the information contained herein are provided on an
   "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS
   OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY AND THE INTERNET
   ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED,
   INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE
   INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED
   WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.


Copyright Statement

   Copyright (C) The Internet Society (2004).  This document is subject
   to the rights, licenses and restrictions contained in BCP 78, and
   except as set forth therein, the authors retain all their rights.


Acknowledgment

   Funding for the RFC Editor function is currently provided by the
   Internet Society.




Maturana & Robredo     Expires December 30, 2004               [Page 24]


Html markup produced by rfcmarkup 1.126, available from https://tools.ietf.org/tools/rfcmarkup/