mirror of
https://github.com/Decentralized-ID/decentralized-id.github.io.git
synced 2024-10-01 01:05:54 -04:00
title
This commit is contained in:
parent
bc3f006e0b
commit
0f2c040624
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
date: 2020-11-25
|
date: 2020-11-25
|
||||||
title: DIF - Claims and Credentials Working Group
|
title: Claims and Credentials Working Group - DIF
|
||||||
description: Standards and technology that create, exchange, and verify claims and credentials in a decentralized identity ecosystem.
|
description: Standards and technology that create, exchange, and verify claims and credentials in a decentralized identity ecosystem.
|
||||||
excerpt: >
|
excerpt: >
|
||||||
Join this group to contribute to the standards and technology that create, exchange, and verify claims and credentials in a decentralized identity ecosystem. For example, a cryptographically verifiable credential that proves an individual has a college degree or is of a certain age. Our members focus on specs that are vendor agnostic and based on industry standards.
|
Join this group to contribute to the standards and technology that create, exchange, and verify claims and credentials in a decentralized identity ecosystem. For example, a cryptographically verifiable credential that proves an individual has a college degree or is of a certain age. Our members focus on specs that are vendor agnostic and based on industry standards.
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
date: 2020-11-26
|
date: 2020-11-26
|
||||||
title: DIF - (DID) Authentication Working Group
|
title: (DID) Authentication Working Group - DIF
|
||||||
description: design, recommend, and implement authentication and authorization protocols that rely upon open standards and cryptographic protocols using DIDs and DID Documents.
|
description: design, recommend, and implement authentication and authorization protocols that rely upon open standards and cryptographic protocols using DIDs and DID Documents.
|
||||||
excerpt: >
|
excerpt: >
|
||||||
The purpose of this working group is to design, recommend and implement authentication and authorization protocols that rely upon open standards and cryptographic protocols using DIDs and DID Documents. Recommendations and development of specifications, protocols, and formats for data structures used for authentication and authorization.
|
The purpose of this working group is to design, recommend and implement authentication and authorization protocols that rely upon open standards and cryptographic protocols using DIDs and DID Documents. Recommendations and development of specifications, protocols, and formats for data structures used for authentication and authorization.
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
date: 2020-11-26
|
date: 2020-11-26
|
||||||
title: DIF - Identifiers & Discovery Working Group
|
title: Identifiers & Discovery Working Group - DIF
|
||||||
description: Specifications, implementations, test suites, etc. related to creation, derivation, resolution, management, use of all forms of decentralized identifiers
|
description: Specifications, implementations, test suites, etc. related to creation, derivation, resolution, management, use of all forms of decentralized identifiers
|
||||||
excerpt: >
|
excerpt: >
|
||||||
Members of the Working Group are engaged in development of protocols and systems that enable creation, resolution, and discovery of decentralized identifiers and names across underlying decentralized systems, like blockchains and distributed ledgers.
|
Members of the Working Group are engaged in development of protocols and systems that enable creation, resolution, and discovery of decentralized identifiers and names across underlying decentralized systems, like blockchains and distributed ledgers.
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
date: 2020-11-26
|
date: 2020-11-26
|
||||||
title: DIF - Interop Working Group
|
title: Interop Working Group - DIF
|
||||||
description: Interoperability WG is a community effort to achieve decentralized identity interop.
|
description: Interoperability WG is a community effort to achieve decentralized identity interop.
|
||||||
excerpt: >
|
excerpt: >
|
||||||
Community collaboration and project management on Interoperability. Develop and publish definitions of success with respect to business interoperability, at the highest level. Defining points of protocol-defined touchpoints for maximum interchangeability of components at every layer; it is assumed that over time, that number will increase, not decrease.
|
Community collaboration and project management on Interoperability. Develop and publish definitions of success with respect to business interoperability, at the highest level. Defining points of protocol-defined touchpoints for maximum interchangeability of components at every layer; it is assumed that over time, that number will increase, not decrease.
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
date: 2020-11-26
|
date: 2020-11-26
|
||||||
title: DIF - Secure Data Storage WG
|
title: Secure Data Storage WG - DIF
|
||||||
description: data models for storage and transport, syntax, data at rest protection, CRUD API, access control, synchronization, and at least a minimum viable HTTP-based interface compatible with W3C DIDs/VCs.
|
description: data models for storage and transport, syntax, data at rest protection, CRUD API, access control, synchronization, and at least a minimum viable HTTP-based interface compatible with W3C DIDs/VCs.
|
||||||
excerpt: >
|
excerpt: >
|
||||||
Secure, encrypted, privacy-preserving storage and computation of data is a critical component of decentralized identity systems. As with identifiers and names must be self-sovereign to the owning entity, a user's identity data must remain private, only accessible to the entities they allow. DIF members are actively developing specs and reference implementations for provider-agnostic, run-anywhere solutions that provides these features.
|
Secure, encrypted, privacy-preserving storage and computation of data is a critical component of decentralized identity systems. As with identifiers and names must be self-sovereign to the owning entity, a user's identity data must remain private, only accessible to the entities they allow. DIF members are actively developing specs and reference implementations for provider-agnostic, run-anywhere solutions that provides these features.
|
||||||
|
Loading…
Reference in New Issue
Block a user