Musings of a Trust Architect: Least & Necessary Design Patterns
ABSTRACT: The principles of least privilege and least authority are core computer security principles that can minimize attacks. Not only can they be exte...
ABSTRACT: The principles of least privilege and least authority are core computer security principles that can minimize attacks. Not only can they be exte...
ABSTRACT: Self-Sovereign Computing is a transformative paradigm designed to empower individuals to take command of their digital journey and to uphold t...
ABSTRACT: The idea of Self-Sovereign Identity emerged in 2016, but it has inspirations dating back centuries. This article explores the historic evolution...
2023 Q2 in Brief Our major work in Q2 this year included: Pushing the Envelope Rust Libraries Educational Use Cases Wellness Us...
If you’ll be at IETF 117, we hope you’ll join us for dCBOR discussions there on Monday July 24th. The CBOR meeting will be 17:30-18:30 July 24th (Session IV)...