Table of Contents | ||
---|---|---|
|
...
Semantic domain [passive] / the meaning and use of what is put in, taken in, or operated on by any process or system.
Figure. A component diagram showing the inputs and semantic counterparts of a balanced network model.
Scope
Define a data capture architecture consisting of immutable schema bases and interoperable overlays for Internet-scale deployment. The scope of the WG is to define specifications and best practices that bring cohesion to data capture processes and other Semantic standards throughout the ToIP stack, whether these standards are hosted at the Linux Foundation or external to it. Other WG activities will include creating template Requests for Proposal (RFPs) and additional guidance to utility and service providers regarding implementations in this domain. This WG may also organise Task Forces to escalate the development of certain components if deemed appropriate by the majority of the WG members and in line with the overall mission of the ToIP Foundation.
Meetings
Schedule:
US/EU: meetings take place bi-weekly, every other Tuesday from (TBC)
APAC: TBC
See the Meeting Page for Agendas, notes and recordings from all meetings.
Deliverables
- Technical specifications for all core components required within the Semantic domain
Chairs / Leads
How to join
You can join this WG by signing up for the Foundation mailing list at lists.trustoverip.org. Our mailing list is semantic-domain-wg@lists.trustoverip.org.
Members as well as observers are welcome (with the important caveat below).
Participation
For the protection of all Members, participation in working groups, meetings and events is limited to members, including their employees, of the Trust over IP Foundation who have signed the membership documents and thus agreed to the intellectual property rules governing participation. If you or your employer are not a member, we ask that you not participate in meetings by verbal contribution or otherwise take any action beyond observing.
Core concepts
Context
The post millennial generation has witnessed an explosion of captured data points which has sparked profound possibilities in both Artificial Intelligence (AI) and Internet of Things (IoT) solutions. This has spawned the collective realization that society’s current technological infrastructure is simply not equipped to fully support de-identification or to entice corporations to break down internal data silos, streamline data harmonization processes and ultimately resolve worldwide data duplication and storage resource issues. Developing and deploying the right data capture architecture will improve the quality of externally pooled data for future AI and IoT solutions.
...
Blinding Identity Taxonomy (BIT)
BIT is a defensive tool created for the purpose of reducing the risk of identifying governing entities within blinded datasets. BIT contains a list of elements to be referred to by schema issuers for flagging attributes which may contain identifying information about governing entities. Once attributes have been flagged, any marked data can be removed or encrypted during the data lifecycle.
- BIT in PDF format: https://docs.kantarainitiative.org/Blinding-Identity-Taxonomy-Report-Version-1.0.pdf
- BIT in HTML format: https://docs.kantarainitiative.org/Blinding-Identity-Taxonomy-Report-Version-1.0.html
...
Functionality requirements
...
- Including desired capabilities that a fully interoperable data capture architecture should offer
- Frequently asked questions
...