...
- Presentation by Sam Smith on Authentic Provenance Chains in the GLEIF project
- How they can be adapted for Authentic Data in non-ACDC scenarios
- Discussion on Verifiable Data - Data Objects, DIDs, and keys
- Data Object
- Do they need a DID (or SAID, AID, ...)?
- Who controls the keys to sign the object content?
- How does a user/actor on a Data Object verify the data?
- Data Object
Agenda Items and Notes (including all relevant links)
...