-
Notifications
You must be signed in to change notification settings - Fork 6
end to end
Henk van Cann edited this page Oct 5, 2023
·
2 revisions
Inter-host communication and data flow transformations, considered in motion and at rest.
- E2E Security. Inter-host communication must be end-to-end signed/encrypted and data must be stored signed/encrypted. Data is signed/encrypted in motion and at rest.
- E2E Provenance. Data flow transformations must be end-to-end provenanced using verifiable data items (verifiable data chains or VCs). Every change shall be provenanced.
Paraphrased from source Universal Identifier Theory by Samuel Smith