...
Zoom Meeting Link / Recording
- Zoom_meeting_linkRecording - meeting starts at 9:00, discussion prior to that is captured in the notes (below)
(This link will be replaced with a link to the recording of the meeting as soon as it is available) - Slides Authentic Provenance Chains for Verifiable Data Registries
Attendees
...
Time | Agenda Item | Lead | Notes |
5 min |
| Chairs |
|
5 mins | Review of action items from previous meeting | Chairs | |
5 mins | Announcements | TF Leads | News or events of interest to Governance Stack WG members:
|
20 mins | Authentic Provenance Chains | Chairs | A key requirement offor Verifiable Data Registries is proof of trust (can be trusted) through being able to verify the processing trail for the data, it's transformations and sign-off by the Data Process Owner and Data Process Verifier (governance authority/steward)an audit trail of all the processing and all the people (producers and governance stewards) who touched the data from the point of data creation/capture through a published dataset. This includes the following requirements:
Today's discussion is to look at a model of how that could be implemented in exploreexploring the functionality and data (and data structures) required for Verifiable Trust Registries and their listed trusted entities to be trustable in a robust and secure manner Risks |
15 mins | Special topic #2SSI Risks | A core principle of Governance is to prioritize based on risk for an application, service or data source plus the organization, its personnel and financial/legal state/reputation. The current state of cybersecurity points to a number of key risks to which SSI is (also) vulnerable:
Some examples pertinent to SSI: | |
5 mins | Any other business | ||
5 mins |
| Chairs |
...