Passports

129 bookmarks
Newest
JFF & VC-EDU
JFF & VC-EDU
Verifiable Credentials for Education Task Force
·w3c-ccg.github.io·
JFF & VC-EDU
PlugFest 3 Contact List
PlugFest 3 Contact List
Registration List Organization Name,Name of Primary Contact,Email Address for Primary Contact,Name of Secondary Contact,Email Address for Secondary Contact,Where is your company based ?,What is your preferred time zone?,Did you participate in either PlugFest 1 or PlugFest 2? (select all that apply)
·docs.google.com·
PlugFest 3 Contact List
PlugFest 3 Kick-off Meeting Cheat Sheet of Links
PlugFest 3 Kick-off Meeting Cheat Sheet of Links
PlugFest 3 Kick-off Meeting Cheat Sheet of Links July 11, 2023 PlugFest 3 Project Page [coming soon] Kick-Off Meeting Slides https://docs.google.com/presentation/d/1rFACcC_rp2r2c1d3STc1TLX_wsp4r4k1a0oe79eZKcc/edit?usp=sharing Cohort Contact Sheet https://docs.google.com/spreadsheets/d/1mxu...
·docs.google.com·
PlugFest 3 Kick-off Meeting Cheat Sheet of Links
PlugFest 2 Cohort Contact
PlugFest 2 Cohort Contact
1. Participant Contact Info Organization Name,Name of Primary Contact,Email Address for Primary Contact,Name of Secondary Contact,Email Address for Secondary Contact,Where is your company based ?,What is your preferred time zone?,Are you participating as a wallet implementer, credential issuing ...
·docs.google.com·
PlugFest 2 Cohort Contact
W3C CCG Digital Wallet Protocols Analysis
W3C CCG Digital Wallet Protocols Analysis
W3C CCG Digital Wallet Protocols Analysis This document contains an analysis of the protocols available for performing digital wallet invocation and Verifiable Presentation exchange. Table of Contents Terminology 3 Same-device Wallet Invocation 4 Provides ecosystem wallet selector (mediator) t...
·docs.google.com·
W3C CCG Digital Wallet Protocols Analysis
PlugFest 1 Cohort - Google Sheets
PlugFest 1 Cohort - Google Sheets
Participant Info Cohort,Organization,First Name,Last Name,Email,Other Contacts,Wallet,Credential Assertion Format (production),DID Methods,Signature Suite,Protocol for Obtaining and Storing VCs,Comments on your demo that will help us group presentations more logically,Public Link,Timezone,Issuer...
·docs.google.com·
PlugFest 1 Cohort - Google Sheets
A Framework for Quantification of Linkability Within a Privacy-Enhanci
A Framework for Quantification of Linkability Within a Privacy-Enhanci
Within a privacy-enhancing identity management system, among other sources of information, knowledge about current anonymity and about linkability of user’s actions should be available, so that each user is enabled to make educated decisions about performing...
·link.springer.com·
A Framework for Quantification of Linkability Within a Privacy-Enhanci
The central issue with decentralized applications
The central issue with decentralized applications
In its rawest form, a decentralized application is any app that runs on a connected network of compute resources, but our modern notion of decentralized applications (or DApps) is one where apps run on a peer-to-peer (P2P) network of computers, often now under the purview of a blockchain -- so how will these technologies work in practice, when attempting to exchange data for working applications?
·idginsiderpro.com·
The central issue with decentralized applications
Infrastructure | Visions
Infrastructure | Visions
Visions s’investit dans la création d’une infrastructure de données ouverte, éthique et décentralisée.
·visionspol.eu·
Infrastructure | Visions
The Nail Finds a Hammer
The Nail Finds a Hammer
A new report on self-sovereign identity, design principles, and property rights in the developing world.
·newamerica.org·
The Nail Finds a Hammer
More than just Tech - Jolocom
More than just Tech - Jolocom
Technological decentralization cannot be put into practice successfully without the appropriate decentralized governance structures supporting it.
·jolocom.io·
More than just Tech - Jolocom
An Introduction to Identity Management
An Introduction to Identity Management
Providing IT managers with tools and technologies for controlling user access to critical information within an organization.
·csoonline.com·
An Introduction to Identity Management