On Dec 11, 2013, at 1:56 PM, Ben Laurie 
<[email protected]<mailto:[email protected]>> wrote:

Agree, I just want to be able to refer to 6962 for what
"cryptographically verifiable log" means.

Dear Ben,

There was an eXtensible Access Method, XAM, developed by SNIA.  This permitted 
vendors a means to implement strategies for handling massive amounts of data in 
a manner called Content Addressable Storage, such as EMC^2's Centera product. 
The data blobs create multiple secure hashes that act within a standardized 
label. The blobs are combined with timestamps and XML MIME tags. This removes a 
need for difficult to manage file hierarchy.  One of the benefits of this 
scheme is data can not change without detection.

Interesting … in IEEE we’re  defining ‘services’ as a hash/UUID-like identifier 
https://mentor.ieee.org/802.11/dcn/12/11-12-0706-00-0isd-service-discovery-proposal.pptx
 ).  UPnP and Bonjour are both mapped to a hash.  We’re truncating them to 6 
octets … but that’s a different discussion.

In looking at Transparency for “X”, I’d suggest that the X can be an arbitrary 
service identified as a hash.

Paul


SNIA now seems focused on identifying individuals.  Perhaps this is an 
outgrowth of their data-deduplication?
http://www.snia.org/tech_activities/standards/curr_standards/xam

Regards,
Douglas Otis





_______________________________________________
perpass mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/perpass

Reply via email to