decentralized-id.github.io/_posts/organizations/sovrin/2019-03-05-sovrin-literature.md
⧉ infominer 71ed744864 tags
2020-12-03 23:35:13 -05:00

9.3 KiB
Raw Permalink Blame History

date layout title excerpt sidebar canonical_url redirect_from permalink categories tags last_modified_at
2019-03-05 single Sovrin Related Literature and Media Digital identity is one of the oldest and hardest problems on the Internet. There is still no way to use digital credentials to prove our online identity the same way we do in the offine world. This is finally changing. First, the World Wide Web Consortium is standardizing the format of digitally-signed credentials. Secondly, public blockchains can provide decentralized registration and discovery of the public keys needed to verify digital signatures. These two steps pave the way to establish a global public utility for self-sovereign identity—lifetime portable digital identity that does not depend on any central authority.
title nav
Decentralized-ID sovnav
https://decentralized-id.com/organizations/sovrin-foundation/literature/
literature/Sovrin/
literature/sovrin/
id-initiatives/indy-ecosystem/literature.html
indy-ecosystem/literature
indy-ecosystem/literature/
organizations/sovrin/literature/
organizations/sovrin-foundation/literature/
Literature
Sovrin Foundation
Indy
Evernym
GDPR
Sovrin Foundation
Tykn
DKMS
Humanitarian
Trust Framework
2019-07-13

Library - Sovrin

  • Distributed ledger identification systems in the humanitarian sector By Aiden Slavin August 2019

    Commissioned by the I4A Council and the Sovrin Foundation, this report examines identification management systems in the humanitarian sector that use distributed ledger technology (DLT).

  • How DIDs, Keys, Credentials, and Agents Work in Sovrin By Daniel Hardman April 2018

    This document shows how low-level building blocks of the Sovrin ecosystem function in a practical real-world scenario where key management concerns matter deeply. It also introduces some notation and terminology. It makes heavy use of concepts described in the formal sequence diagrams and exposition from DKMS Design and Architecture V2.

  • Inevitable Rise of Self-Sovereign Identity September 2016

    Why Sovrin represents the solution to identity challenges. This whitepaper explains why the Internet does not currently have an identity layer and how the emergence of distributed ledger technology (DLT) finally makes one possible.

  • Sovrin: Digital Identities in the Blockchain Era By Dmitry Khovratovich and Jason Law December 2016

    This is the original paper that describes the core ideas behind the Sovrin Network and how they implement self-sovereign identity at a global scale.

  • How Sovrin Works By Phillip J. Windley October 2016

    Sovrin is an open-source identity network built on distributed ledger technology. Sovrin is public and permissioned. Public means everyone can use it. Permissioned means that the network nodes that ensure consensus of transactions on the ledger are governed, in this case by the nonprofit Sovrin Foundation. Some illustrated practical examples of key Sovrin features in action.

  • Sovrin Network: What Goes on the Ledger? By Andrew Tobin

    A white paper from Evernym in cooperation with the Sovrin Foundation. An overview of what is on the Sovrin Network distributed ledger and why.September 2018

  • On Guardianship in Self-Sovereign Identity By Sovrin Guardianship Task Force November 2019

    This report explores why digital guardianship is a core principle in the Sovrin Governance Framework and a core feature of the Sovrin Network and other SSI architectures.

  • Sovrin: A Protocol and Token for Self-Sovereign Identity and Decentralized Trust

    A comprehensive, highly readable 40 page paper describing the complete Sovrin ecosystem, including the problems Sovrin is designed to solve; why it is designed to be a global public utility; how the overall architecture is designed for for resilience, privacy and scalability; the markets it is expected to impact.January 2018

  • What if I lose my phone? By Daniel Hardman

    What happens when my device is stolen? What happens if I forget my private key? What happens when my private keys are compromised or lost? This document will explore multiple scenarios when an identity holder loses control of their cloud agent through theft, hack or forgetfulness.March 2019

  • Sovrin Governance Framework (formerly the Sovrin Trust Framework)

    The constitution of the Sovrin Network—specifies the business, legal, and technical policies governing Sovrin as a global public utility.**The Sovrin Governance Framework V2 is now in public review—see this page.**The original Sovrin Provisional Trust Framework was published on 28 Jun 2017.

  • Getting Started with Sovrin

    A technical orientation guide using the Sovrin Command Line Interface.

  • Steward Agreement

    The current agreement in force between the Sovrin Foundation and the trusted organizations operating validator nodes on the Sovrin network.**The new Sovrin Steward Agreement is now in public review—see this page.**The current Sovrin Steward Agreement was published on 28 Jun 2017.

  • Sovrin Glossary

    Defines 254 terms used in self-sovereign identity infrastructure. This is the official glossary used by all documents in the Sovrin Governance Framework—it was most recently approved by the Sovrin Board of Trustees on 04 December 2019. Includes eight illustrated appendices (33 pages) that describe core terms in detail.

Selected articles Windley.com

EU General Data Protection Regulation Act

Research Papers

Reports