On Thu, Dec 12, 2013 at 6:06 AM, Ben Laurie <[email protected]> wrote:

> On 11 December 2013 23:48, Douglas Otis <[email protected]> wrote:
> >
> > On Dec 11, 2013, at 1:56 PM, Ben Laurie <[email protected]> wrote:
> >
> > Agree, I just want to be able to refer to 6962 for what
> > "cryptographically verifiable log" means.
> >
> >
> > Dear Ben,
> >
> > There was an eXtensible Access Method, XAM, developed by SNIA.  This
> > permitted vendors a means to implement strategies for handling massive
> > amounts of data in a manner called Content Addressable Storage, such as
> > EMC^2's Centera product. The data blobs create multiple secure hashes
> that
> > act within a standardized label. The blobs are combined with timestamps
> and
> > XML MIME tags. This removes a need for difficult to manage file
> hierarchy.
> > One of the benefits of this scheme is data can not change without
> detection.
>
> A brief romp through the spec suggests that XUIDs could be hashes, but
> don't have to be. In particular, identical XSets do not have to have
> identical XUIDs.
>
> In the case where they are hashes (or are otherwise one-to-one linked
> to XSets), then a transparent log might well be usefully applied to
> them.
>

If we get into that area I have to point out that I am currently engaged by
a client who is defending a case in which a relevant patent is being
asserted.


-- 
Website: http://hallambaker.com/
_______________________________________________
perpass mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/perpass

Reply via email to