On Dec 11, 2013, at 1:56 PM, Ben Laurie <[email protected]> wrote: > Agree, I just want to be able to refer to 6962 for what > "cryptographically verifiable log" means.
Dear Ben, There was an eXtensible Access Method, XAM, developed by SNIA. This permitted vendors a means to implement strategies for handling massive amounts of data in a manner called Content Addressable Storage, such as EMC^2's Centera product. The data blobs create multiple secure hashes that act within a standardized label. The blobs are combined with timestamps and XML MIME tags. This removes a need for difficult to manage file hierarchy. One of the benefits of this scheme is data can not change without detection. SNIA now seems focused on identifying individuals. Perhaps this is an outgrowth of their data-deduplication? http://www.snia.org/tech_activities/standards/curr_standards/xam Regards, Douglas Otis
_______________________________________________ perpass mailing list [email protected] https://www.ietf.org/mailman/listinfo/perpass
