Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

  • Markdown: Draft portions spec written in Markdown
  • SpecUP: Final version of spec processed with SpecUp


Use Case Summaries

GLEIF vLEI  https://hackmd.io/dlnfd8xOSqmD90v4Y6mzFQ  (Sam Smith ProSapien)

Supply Chain  (Robert Mitwiki Human Colossus )

Authorizations for Encrypted Backups  (Charles Cunningham Euginiu Rusu Jolocom)

Guardianship Chain of Credentials (Evernym  Daniel and Drummond)

Delegating Access to Rented Car (Evernym)

Provenancing Inherited Attributes (Daniel Hardman Evernym ProSapien)

Delegation of Certification Authority PKI Certificate Like Chaining  (Ned Smith Intel)

Object Capabilities Like Authorizations (See authorizations for encrypted backups) 

Critical Supply Chain Provenancing (Carsten Stoecker Spherity)

Open Accredited Market Participation Energy Market  (Jolocom

Provenance Virtuous Supply Chains Conscious Consumers Demand Pull  

Data Supply Chain Provenance

Data Supply Chain Consent Provenance Consented Data Privacy  (Samuel Smith ProSapien)

Content Distrubution Networks (copyright, acknowledgement, usage, attribution)  (Thomas Hardjano MIT)

IoT Onboarding Devices (Ned Smith Intel, Thomas Hardjano MIT)

Attestation Chaining


Attribution Chaining Semantic Super Semantic

     Secure Attribution of statement to controller of a decentralized identifier

     A securely attributed chaining statement links two securely attributed statements together

     A chaining statement is a special case statement whose semantics are to securely linked by attribution.

     This chaining may be applied recursively.

     The chained statements that are not chaining statements may convey sub-semantics such as authorization, delegation, attestation, provenance, etc.


Certificate Result Certification 

    Certifying the result of a decision  

    Verifiable Algorithm

    CoSWID Tags  IETF