On Dec 11, 2013, at 1:56 PM, Ben Laurie <[email protected]<mailto:[email protected]>> wrote:
Agree, I just want to be able to refer to 6962 for what "cryptographically verifiable log" means. Dear Ben, There was an eXtensible Access Method, XAM, developed by SNIA. This permitted vendors a means to implement strategies for handling massive amounts of data in a manner called Content Addressable Storage, such as EMC^2's Centera product. The data blobs create multiple secure hashes that act within a standardized label. The blobs are combined with timestamps and XML MIME tags. This removes a need for difficult to manage file hierarchy. One of the benefits of this scheme is data can not change without detection. Interesting … in IEEE we’re defining ‘services’ as a hash/UUID-like identifier https://mentor.ieee.org/802.11/dcn/12/11-12-0706-00-0isd-service-discovery-proposal.pptx ). UPnP and Bonjour are both mapped to a hash. We’re truncating them to 6 octets … but that’s a different discussion. In looking at Transparency for “X”, I’d suggest that the X can be an arbitrary service identified as a hash. Paul SNIA now seems focused on identifying individuals. Perhaps this is an outgrowth of their data-deduplication? http://www.snia.org/tech_activities/standards/curr_standards/xam Regards, Douglas Otis
_______________________________________________ perpass mailing list [email protected] https://www.ietf.org/mailman/listinfo/perpass
