On Dec 11, 2013, at 1:56 PM, Ben Laurie <[email protected]> wrote:

> Agree, I just want to be able to refer to 6962 for what
> "cryptographically verifiable log" means.

Dear Ben,

There was an eXtensible Access Method, XAM, developed by SNIA.  This permitted 
vendors a means to implement strategies for handling massive amounts of data in 
a manner called Content Addressable Storage, such as EMC^2's Centera product. 
The data blobs create multiple secure hashes that act within a standardized 
label. The blobs are combined with timestamps and XML MIME tags. This removes a 
need for difficult to manage file hierarchy.  One of the benefits of this 
scheme is data can not change without detection.

SNIA now seems focused on identifying individuals.  Perhaps this is an 
outgrowth of their data-deduplication?
http://www.snia.org/tech_activities/standards/curr_standards/xam

Regards,
Douglas Otis



_______________________________________________
perpass mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/perpass

Reply via email to