permalink | layout | author_profile | title | toc | toc_label |
---|---|---|---|---|---|
/papers/ |
single |
true |
RWOT Papers |
true |
Final Papers |
This is categorized list of papers produced by the Rebooting the Web of Trust design workshops is complete through RWOT-XII in Cologne (2023). To date we have produced 68 papers across 11 workshops.
A statement of some fact (or some opinion) about some entity.
The act of verifying an identity.
- 8/20/19: Using OpenID Connect Self-Issued to Achieve DID Auth
- 7/31/18: Introduction to DID Auth
An open standard for blockchain credentials.
- 11/19/19: Blockcerts v3 Proposal
- 6/20/18: Open Badges are Verifiable Credentials
An immutable decentralized ledger maintained by consensus rules.
- 6/5/18: When GDPR becomes real, and Blockchain is no longer Fairy Dust
- 2/17/18: A Decentralized Approach to Blockcerts Credential Revocation
An authorization methodology where permissions are attached to an entity as a list of what objects that entity can access and in what way.
- 1/12/18: Linked Data Capabilities
- 10/13/17: Identity Hubs Capabilities Perspective
Working together for the common good.
- 11/19/19: Decentralized Identity as a Meta-platform: How Cooperation Beats Aggregation
- 5/3/18: Exploring Sustainable Technology Commons using Appreciative Inquiry
A set of one or more claims about the same entity. Also see VERIFIABLE CREDENTIALS.
- 5/22/23: A Credential Profile Comparison Matrix to Facilitate Technical and Non-technical Decision Making
- 2/17/18: A Decentralized Approach to Blockcerts Credential Revocation
Self-regulating or self-managing data that does not reside with a single party.
- 1/17/19: A DID for Everything
- 4/26/18: Decentralized Autonomic Data (DAD) and the three R's of Key Management
Protected stores of online data, including Identity Hubs and more.
- 10/24/19: Encrypted Data Vaults
- 8/5/18: Identity Hub Attestation Flows and Components
- 10/13/17: Identity Hubs Capabilities Perspective
- 4/13/17: Hubs
A method for achieving agreement without a centralized authority.
- 2/21/17: The DCS Theorem
A portable, globally unique identifier associated with some entity that does not require a centralized authority for registration.
- 10/31/22: Taking out the CRUD: Five Fabulous DID Attacks
- 8/20/19: Using OpenID Connect Self-Issued to Achieve DID Auth
- 4/4/19: RWOT8 DID Specification Refinement
- 2/13/19: IPLD as a General Pattern for DID Documents and Verifable Claims
- 1/17/19: A DID for Everything
- 11/30/18: Peer to Peer Degrees of Trust
- 7/31/18: Introduction to DID Auth
- 3/27/18: Decentralized Identifiers 1.0 Update
- 10/21/16: Decentralized Identifiers (DIDs) 1.0: Data Model and Syntaxes for DIDs
- 8/24/16: Requirements for DIDs (Decentralized Identifiers)
A regularized methodology for creating, reading, updating, and revoking a DID.
-
2/5/24: Beyond did:web
-
1/16/19: BTCR v0.1 Decisions
-
4/13/18: BTCR DID Resolver Specification
-
10/1/17: Veres One DID Method 1.0
The codification of authorization to use digital media.
- 3/3/17: Smart Consent Protocol
The act of proving the accuracy of something, often verifying a digital signature.
General Data Protection Regulation. European laws that protect the data and privacy of individuals.
A proxy for identity that is used as a label to refer to the entity being represented. For example, a name or UID. See Also: DID.
A somewhat nebulous term, defined in different ways by different people. Broadly: who or what an entity is.
- 3/19/20: Five Mental Models of Identity
- 8/23/16: Identity Crisis: Clear Identity through Correlation
Identity that is not controlled by a central server. Also, "Self-Sovereign Identity".
- 1/29/24: The Ecosystem Coordinator’s Role in SSI Ecosystem Management
- 4/3/23: On-chain Identity Proof Verification Design Patterns: An Evaluation of Different Strategies to Inject Digital Identity into Decentralized Applications
- 11/19/19: Decentralized Identity as a Meta-platform: How Cooperation Beats Aggregation
- 4/12/19: How SSI Will Survive Capitalism
- 12/5/18: How to Convince Dad* of the Importance of Self-Sovereign Identity
- 7/24/18: SSI: A Roadmap for Adoption
A cryptographic secret used to encrypt or decrypt data. See Also: Key Recovery, PKI, Wallets.
- 4/26/18: Decentralized Autonomic Data (DAD) and the three R's of Key Management []{#key-recovery}
A methodology for recovery a private key that has been lost.
The formatting used on GitHub (and by programmers).
Means for protecting information and minimizing its disclosure.
- 9/18/18: Engineering Privacy for Verified Credentials: In Which We Describe Data Minimization, Selective Disclosure, and Progressive Trust []{#pki}
Public-Key Infrastructure. A methodology to ensure the creation, storage, distribution, and revocation of public keys. See Also: Keys*.*
- 12/23/15: Decentralized Public Key Infrastructure
A system for measuring the behavior of entities.
- 10/30/19: Reputation Interpretation
- 9/12/17: Design Considerations for Decentralized Reputation Systems
- 2/17/17: Portable Reputation Toolkit Use Cases
*Identity controlled by the user. See "The Path to Self-Sovereign Identity" for its origination. See papers under Identity, Decentralized
A means for verifying the authenticity of a message or transaction by signing it with a private key.
- 8/18/17: LD Signature Format Alignment
- 10/18/16: Smarter Signatures: Experiments in Verifications
- 12/23/15: Smart Signatures
An online service that supports the creation of relationships between individuals and the sharing of information among these entities.
RWOT events have sometimes produced software prototypes.
- 8/26/19: Satyrn: A Markdown-based JavaScript Sandbox
- 8/18/17: LD Signature Format Alignment
Thoughtful postulations that suppose how things work.
- 2/21/17: The DCS Theorem
Ways that things could go wrong.
Explorations of situations where the Web of Trust could be used.
- 7/8/20: Driving Adoption with Focus on Basic Human Needs: Safety and Security
- 2/13/19: Use Cases and Proposed Solutions for Verifable Offline Credentials
- 12/5/18: How to Convince Dad* of the Importance of Self-Sovereign Identity
- 7/13/18: Amira 1.0.0
- 9/18/17: Re-Imagining What Users Really Want
- 4/14/17: Joram 1.0.0
- 9/6/16: Powering the Physician-Patient Relationship with HIE of One Blockchain Health IT
- 8/12/16: Protecting Digital Identities in Developing Countries
- 12/23/15: Opportunities Created by the Web of Trust for Controlling and Leveraging Personal Data
A tamper-evident set of claims about the same entity.
- 5/22/23: A Credential Profile Comparison Matrix to Facilitate Technical and Non-technical Decision Making
- 2/15/23: Composing Credentials via LinkedClaims and Cryptographic Binding
- 2/3/23: Identifier Binding: defining the Core of Holder Binding
- 12/19/22: Verifiable Issuers & Verifiers
- 12/15/22: Linking Credentials with Data Exchange Agreements through Secured Inclusive Interfaces
- 11/19/19: Alice Attempts to Abuse a Verifiable Credential
- 11/19/19: Blockcerts v3 Proposal
- 7/8/20: Driving Adoption with Focus on Basic Human Needs: Safety and Security
- 7/22/19: Digital Credential Wallets
- 2/13/19: IPLD as a General Pattern for DID Documents and Verifiable Claims
- 2/13/19: Use Cases and Proposed Solutions for Verifable Offline Credentials
- 9/18/18: Engineering Privacy for Verified Credentials: In Which We Describe Data Minimization, Selective Disclosure, and Progressive Trust
- 6/20/18: Open Badges are Verifiable Credentials
The act of proving the accuracy of something.
- 12/19/22: Verifiable Issuers & Verifiers
- 11/26/18: Resource Integrity Proofs
A digital means to store private keys and their associated public keys.
- 7/22/19: Digital Credential Wallets
A method for assessing trust based on peer-to-peer processes.
- 11/30/18: Peer to Peer Degrees of Trust
- 2/2/17: Embedding Human Wisdom in Our Digital Tomorrow
- 12/23/15: Rebranding the Web of Trust
- 12/23/15: Creating the New World of Trust