You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 53 Next »

Purpose

The purpose of the Authentic Chained Data Container (ACDC) Task Force  is to draft a TSS (ToIP Standard Specification) that defines the standard requirements for the semantics of Authentic Provenance Chaining of Authentic Data Containers. This semantics include both source provenance and authorization provenance or delegation.  The hypothesis is that the W3C Verifiable Credential standard may be expanded to serve as an Authentic Data Container (ADC) and that the semantics of a VC may be expanded to support an authentic provenance chains (APC) as a super semantic. This may be further expanded to support both a source provenance sub-semantic and a delegated authorization sub-semantic.

Deliverables

The table below lists all deliverables of the ACDC Task Force:

AcronymName of DeliverableDeliverable TypeLink to
Draft Deliverable
Lead AuthorsStatus/Notes
ACDCAuthentic Chained Data ContainerSpecification

Pre-Draft Deliverable (PDF)

Samuel SmithSlides from the original white paper
AIDAttributable IdentifiersSpecification


SAIDSelf-Addressing IdentifiersSpecification


DID KERIKERI DID MethodSpecification


SISSchema ImmutabilitySpecification


CESRComposable Event Streaming RepresentationSpecification


IXPIssuance Exchange ProtocolSpecification


PXPPresentation Exchange ProtocolSpecification


PTELPublic Transaction Event LogSpecification



Chairs

Please add your name to this list if you wish to be a chair:

Members

Please add your name to this list in any desired role:

Meeting Schedule

This TF schedules meetings as needed. Each meeting will be announced on the T mailing list and the TSWG  Slack channel. Currently, we are meeting every other week on Mondays, at 9 am US Mountain time, 1700 Central European Time, at https://zoom.us/j/91368003957?pwd=dFI4RGNqMDFkVjliNzFMQXQwN1cxUT09

See latest documentation in the GitHub Repo here:  https://github.com/trustoverip/TSS0033-technology-stack-acdc

Milestones

Key milestones will include, but are not limited to: <TBD>

Task List

This table tracks active tasks assigned to the TF members.

TaskDescriptionLinkAuthors
GLEIF use case
https://hackmd.io/dlnfd8xOSqmD90v4Y6mzFQSam and Drummond
Supply Chain use caseSupply chain refers to overall concept behind the flow of any type of goods and services. https://hackmd.io/vYztT346RC-m34aVmFB7vg
Delegation use case (analog to ZCap usage)A car rental company delegates driving privileges for car X to Alice. Alice delegates to the attendant at valet parking.https://hackmd.io/jDSauX_4RWmTzn8rPijxng
Data graph with verificationBoarding a plane for international travelhttps://hackmd.io/QYlbK-mmTSGKHkpyP_-VSgDaniel Hardman
Pure data provenanceCiting sourceshttps://hackmd.io/QiOf8YjnT261g8MMAh2yJADaniel Hardman

Intellectual Property Rights (Copyright, Patent, Source Code)

As a Task Force (TF) of the Technology Stack WG (TSWG), the ACDC TF inherits the IPR terms from the TSWG JDF Charter. These include:

Mailing List and Communications

This task force uses the following for communications

  • Mailing List: This TF is preparing to set up its own mailing list. Watch this page for details.
  • Slack: This TF has its own dedicated Slack channel: #tswg-acdc-tf
  • Github: This TF will use GitHub issues for substantive conversations on topics, not Slack. This way the conversation is source controlled.

Specification Generation

This task force uses the following for communications

  • Markdown: Draft portions spec written in Markdown
  • SpecUP: Final version of spec processed with SpecUp

Meeting Agendas and Notes


2021-08-30

Details of how GLEIF is using ACDC and associated specs. Placeholder spec repositories at https://github.com/WebOfTrust

Specs WoT

KeyStorage keeping.py module Manager and Keeper classes encrypted secrets

  • vLEI Credentials rely on the following specifications.
  1. JSON Required https://datatracker.ietf.org/doc/html/rfc7159
  2. JSON Schema Version 2020-12 https://json-schema.org/draft/2020-12/json-schema-core.html
  3. Composable Event Streaming Representation (CESR) Specification https://github.com/WebOfTrust/cesr
  4. Attributable Identifiers (AIDs,SCIDs) for Issuers and Holders using the did:keri Method (secure attribution) https://github.com/WebOfTrust/aid
  5. KERI Decentralized Identifiers (AIDs) did:keri Specification https://github.com/WebOfTrust/did-keri
  6. Self Addressing Identifiers (SAIDs) https://github.com/WebOfTrust/said
  7. Schema Immutability Specification (SIS) https://github.com/WebOfTrust/sis
  8. Composable Event Streaming Representation (CESR) Proof Format https://github.com/WebOfTrust/cesr-acdc-proof
  9. ToIP Authentic Chained Data Container (ACDC) Specification https://github.com/trustoverip/TSS0033-technology-stack-acdc
    1. (Informative) JSON required as defined in https://www.w3.org/TR/vc-data-model/#json
      1. Exception @context MUST NOT be included.
  10. Issuance Exchange Protocol Specification for ACDC and KERI (Key Event Receipt Infrastructure)
  11. Presentation Exchange Protocol Specification for ACDC and KERI
    1. WACI PEx https://github.com/decentralized-identity/waci-presentation-exchang
  12. Public Transaction Event Log (PTEL) Specification


Core Components of KERI  Robet Mitwicki

Key Provanance Log -> KEL
Self-Certifying Identifier -> SAI, SCI, keri prefix
General purpose registry -> TEL
Secure communication proctocol CESR/DIDComm?
Self Describing cryptograhic material encoding - CESR/Multicodec/CDE/JOSE/COSE
Key Storage


Relationship between ACDC and W3C VC 2.0


2021-08-16

OCA as a SAID based Schema Immutability specification

More details on ToIP glossary wiki facility

HCF working with ESSIF on Rules section of ACDC  https://github.com/decentralised-dataexchange/automated-data-agreements


2021-08-02

Issues with security privacy suggested pull request (Daniel Hardman)

Terminology (Daniel Hardman)

      How to formally manage terminology in Specs:  (Other group)  create terms wiki

      GitHub.com/trustoverip/acdc-tf-terms/wiki/  Create new page

      Glossary may be auto-generated from the wiki using the TT tool. (python)

Order of creation of SAIDs  (Daniel Hardman)

Degree of Saidification (Sam Smith)

Continue discussion on Schema and SAIDs

IGrant Data Agreement with ACDC (Robert Mitwicki)

GLEIF ACDC vs VC models

LPG model

Calendar of ToIP Meetings

2021-07-19

Continue discussion on Schema and SAIDs

LPG model

2021-06-28

Alignment with VC data model

Multiple Endorsers

Continue discussion on Schema and SAIDs

2021-06-21

Phil talk about JSON Schema and SAID

Change meeting time ?

Proof signature

Alignment with VC data model

Multiple Endorsers

2021-06-07

discussed and refined example in index.md  of draft spec.  Decided that certain blocks in VC MUST use SAI (self addressing identifiers) so that can reason about the data using the identifier.

This allows compactness and secure universal verifiability. Either the block is explicitly included or instead of the block a SAID.

The schema is nested with SAI blocks for the corresponding blocks in the VC

schema of data payload

schema of rules

2021-05-17

Write spec outline

Abstract Model

Two concrete implementations. One VC Linked-Data with  schema.org with security caveats, the Other JSON and immutable JSON-Schema

Example Spec Outline

https://w3c-ccg.github.io/vc-json-schemas/

Abstract

Introduction

Terminology

Specification
    Overview

        Security

        Guarantees

        Storage

        Versioning

    Definition

Versioning Guidelines

     Revision

     Model

Extensibility

Examples

     Verifiable Credentials

Drawbacks

Alternatives

Security & Privacy Considerations

Interoperability

      Security

      Semantics

Index
     Terms defined by this specification

References

     Informative References

https://github.com/trustoverip/WP0035-decentralized-resource-identifiers

High-Level Summary

Abstract

Motivation

Scope

Problem Statement

Solution

References

2021-05-10

Semantic inference and reasoning under uncertainty

https://github.com/SmithSamuelM/Papers/blob/master/whitepapers/VC_Enhancement_Strategy.md

Work Item for next week write spec outline

2021-03-26

OCA (Overlays Capture Architecture)  Robert Mitwicki    (input and semantic WG at ToIP)  standard

Deck: https://docs.google.com/presentation/d/17DS11jHQm3jGAUXCNwP5qFUBJrw7tcKiSGMgH2k0giA/edit?usp=sharing

OCA Article: https://humancolossus.foundation/blog/cjzegoi58xgpfzwxyrqlroy48dihwz
OCA editor: https://editor.oca.argo.colossi.network/
OCA spec draft: https://github.com/the-human-colossus-foundation/oca-spec

JSON-LD Security EndState Sam

Proposal Identifiers  Sam

MetaDiscussion Daniel

         RoadMap

         Hypothesis

Continue Discussion

Notes about ADC and its structure: https://hackmd.io/RX8ZAycxQhSpGZgBfRzqbg

2021-03-01

Data Item Model

Authentic Data Item = Attestation 

     Data Controller ID:   DID namespace controller

           Attestation ID: (in order to reason with data)(IETF RATS Alignment) ID of the Attributable Item Attestion.

             Derived DID from DID namespace

              Derived from Data Item Content (such as https://iscc.codes)(correlate attestations)

                 Verifiable Registry of Data Item

       Data Attributes:{NonAuthentic Attributes}

        Data Controller Signature on Data Item: (nonredudiable, integral) 

Data Mesh Meetup

2021-03-01

MKDocs GitHub

https://github.com/trustoverip/TSS0033-technology-stack-acdc

https://tools.ietf.org/html/draft-ietf-tls-subcerts-10

Delegation chain separate from identity chain

hiding part of the chain

privacy in both direction walking back up to the root and privacy walking down from the  root

2021-02-15

Followup on getting repo setup in MkDocs

Use Cases Selected:

Supply Chain (Mitwicki)

GLEIF (Smith and Reed)

Delegation (Hardman)

Data Source Provenance (Hardman and Smith)

IoT  (Hardjono)

Next task

Create proposals for chaining semantics with syntax.  (assume Verifiable Credential Based)

Express each use case in each chaining proposal.

Iterate on proposals.

Open Question:

Syntax should at least support Trees and DAGs  (Directed Acyclic Graphs) not merely linear chain

Should syntax also support cyclical graphs.

2021-02-01

Finalize choice of MkDocs vs SpecUp: Decided on MKDocs:

   Action Item: Sam work with TOIP to setup GitHub repo with MkDocs

EiDas Links: (See 2021-02-01)  Robert Mitwicki.  Discussion of SSI etc in EiDAS

Relation to Legal Framework for Digital Signatures

https://en.wikipedia.org/wiki/Electronic_signatures_and_law

https://acrobat.adobe.com/content/dam/doc-cloud/en/pdfs/adobe-sign-us-guide-e-signatures-wp-ue.pdf

UETA  https://www.uniformlaws.org/committees/community-home?CommunityKey=2c04b76c-2b7d-4399-977e-d5876ba7e034

ESIGN  Act  https://www.fdic.gov/regulations/compliance/manual/10/X-3.1.pdf

EiDAS

       Advanced Electronic Signature  Qualified Electronic Signature  Notaries  with Certificate = Handwrittern Signature

Review Use Cases:

Semantic Containers: Pauls Knowles Semantic Container.  Nested Forms. Consent.

Distinguish between different types of containers as part of specification for ACDC

2021-01-18

Action Item Robert Mitwicki add information on EIDAS  regulation  allows for linking.

Discussed CCG Meeting on ZCap vs VC Authorization

Discussed Use Cases  

MkDocs vs Spec Up  (Tables?)

Action Item Sam review and present at next meeting

2021-01-04

Use Case Summaries

GLEIF vLEI  https://hackmd.io/dlnfd8xOSqmD90v4Y6mzFQ  (Sam Smith ProSapien)

Supply Chain  https://hackmd.io/vYztT346RC-m34aVmFB7vg (Robert Mitwiki Human Colossus )

Global ID for life https://hackmd.io/vYztT346RC-m34aVmFB7vg (IdNum - Robert) 

Digital Immunization Passport https://hackmd.io/vYztT346RC-m34aVmFB7vg (Robert) 

Authorizations for Encrypted Backups use_case.md (Charles Cunningham Eugeniu Rusu Jolocom)

Guardianship Chain of Credentials (Evernym  Daniel and Drummond)

Delegating Access to Rented Car (Evernym)

Provenancing Inherited Attributes (Daniel Hardman Evernym ProSapien)

Delegation of Certification Authority PKI Certificate Like Chaining  (Ned Smith Intel)

Object Capabilities Like Authorizations (See authorizations for encrypted backups) 

Critical Supply Chain Provenancing (Carsten Stoecker Spherity)

Open Accredited Market Participation Energy Market  (Jolocom)

Provenance Virtuous Supply Chains Conscious Consumers Demand Pull  

Data Supply Chain Provenance

Data Supply Chain Consent Provenance Consented Data Privacy  (Samuel Smith ProSapien)

Content Distrubution Networks (copyright, acknowledgement, usage, attribution)  (Thomas Hardjano MIT)

IoT Onboarding Devices (Ned Smith Intel, Thomas Hardjano MIT)

Attestation Chaining

Anonymized Data Chains - https://hackmd.io/vYztT346RC-m34aVmFB7vg

Representing business processes/entity lifecycles with SSI - Representing Lifecycles of Entities using States + SSI.pdf

Attribution Chaining Semantic Super Semantic

     Secure Attribution of statement to controller of a decentralized identifier

     A securely attributed chaining statement links two securely attributed statements together

     A chaining statement is a special case statement whose semantics are to securely linked by attribution.

     This chaining may be applied recursively.

     The chained statements that are not chaining statements may convey sub-semantics such as authorization, delegation, attestation, provenance, etc.

     Attribution Verification Types:  Nonrepudiable Signatures. ZKPs. Anonymized Data.

Certificate Result Certification 

    Certifying the result of a decision  

    Verifiable Algorithm

    CoSWID Tags  IETF


  • No labels