Presentation by Sam Smith on Authentic Provenance Chains in the GLEIF project
How they can be adapted for Authentic Data in non-ACDC scenarios
Discussion on Verifiable Data - Data Objects, DIDs, and keys
Data Object
Do they need a DID (or SAID, AID, ...)?
Who controls the keys to sign the object content?
How does a user/actor on a Data Object verify the data?
Agenda Items and Notes (including all relevant links)
Time
Agenda Item
Lead
Notes
5 min
Start recording
Welcome & antitrust notice
Introduction of new members
Agenda review
Chairs
Antitrust Policy Notice:Attendees are reminded to adhere to the meeting agenda and not participate in activities prohibited under antitrust and competition laws. Only members of ToIP who have signed the necessary agreements are permitted to participate in this activity beyond an observer role.
New Members:
5 mins
Announcements
TF Leads
News or events of interest to Data Modelling & Representation WG members:
-
35 mins
Sam Smith on Authentic Provenance Chains in the GLEIF project
Sam Smith
<Notes pending>
15 mins
Verifiable data - a general model for Data in SSI (and all SSI objects have data)
All
Discussion on the details of Verifiable Data
Data Object
Do they need a DID
Who controls the keys to sign the object content
How does a user/actor on a Data Object verify the data
Note: this discussion will be covered in a future meeting as Sam's presentation continued for the full meeting time.