On Thu, Dec 12, 2013 at 6:06 AM, Ben Laurie <[email protected]> wrote: > On 11 December 2013 23:48, Douglas Otis <[email protected]> wrote: > > > > On Dec 11, 2013, at 1:56 PM, Ben Laurie <[email protected]> wrote: > > > > Agree, I just want to be able to refer to 6962 for what > > "cryptographically verifiable log" means. > > > > > > Dear Ben, > > > > There was an eXtensible Access Method, XAM, developed by SNIA. This > > permitted vendors a means to implement strategies for handling massive > > amounts of data in a manner called Content Addressable Storage, such as > > EMC^2's Centera product. The data blobs create multiple secure hashes > that > > act within a standardized label. The blobs are combined with timestamps > and > > XML MIME tags. This removes a need for difficult to manage file > hierarchy. > > One of the benefits of this scheme is data can not change without > detection. > > A brief romp through the spec suggests that XUIDs could be hashes, but > don't have to be. In particular, identical XSets do not have to have > identical XUIDs. > > In the case where they are hashes (or are otherwise one-to-one linked > to XSets), then a transparent log might well be usefully applied to > them. >
If we get into that area I have to point out that I am currently engaged by a client who is defending a case in which a relevant patent is being asserted. -- Website: http://hallambaker.com/
_______________________________________________ perpass mailing list [email protected] https://www.ietf.org/mailman/listinfo/perpass
