{"id":409318,"date":"2024-10-20T05:34:58","date_gmt":"2024-10-20T05:34:58","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bsi-pd-iso-tr-232492022\/"},"modified":"2024-10-26T10:13:58","modified_gmt":"2024-10-26T10:13:58","slug":"bsi-pd-iso-tr-232492022","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bsi-pd-iso-tr-232492022\/","title":{"rendered":"BSI PD ISO\/TR 23249:2022"},"content":{"rendered":"

PDF Catalog<\/h4>\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
PDF Pages<\/th>\nPDF Title<\/th>\n<\/tr>\n
2<\/td>\nNational foreword <\/td>\n<\/tr>\n
6<\/td>\nForeword <\/td>\n<\/tr>\n
7<\/td>\nIntroduction <\/td>\n<\/tr>\n
9<\/td>\n1 Scope
2 Normative references
3 Terms and definitions
4 Abbreviated terms <\/td>\n<\/tr>\n
11<\/td>\n5 Existing taxonomies and conceptual architectures
5.1 General
5.2 NIST Taxonomic approach for blockchain IDMS
5.2.1 General
5.2.2 Authority model <\/td>\n<\/tr>\n
12<\/td>\n5.2.3 Custody and delegation <\/td>\n<\/tr>\n
13<\/td>\n5.2.4 Identifier origination schemes <\/td>\n<\/tr>\n
14<\/td>\n5.2.5 Credential architectures <\/td>\n<\/tr>\n
15<\/td>\n5.3 Functional role of DLT in identity systems
5.4 Trust Over IP Foundation
6 Existing DLT systems for identity management
6.1 General
6.2 uPort <\/td>\n<\/tr>\n
17<\/td>\n6.3 Decentralized Identity Foundation (DIF) <\/td>\n<\/tr>\n
18<\/td>\n6.4 Alastria ID <\/td>\n<\/tr>\n
21<\/td>\n6.5 European Self Sovereign Identity Framework (ESSIF) <\/td>\n<\/tr>\n
23<\/td>\n6.6 SovrinTM Network, Hyperledger Indy, Hyperledger Aries and Hyperledger Ursa <\/td>\n<\/tr>\n
28<\/td>\n6.7 WEF Known Traveller Digital Identity (KTDITM) <\/td>\n<\/tr>\n
32<\/td>\n6.8 WeIdentity <\/td>\n<\/tr>\n
33<\/td>\n6.9 Masterchain
6.9.1 General <\/td>\n<\/tr>\n
35<\/td>\n6.9.2 Actors in the system
6.10 LACChain <\/td>\n<\/tr>\n
37<\/td>\n6.11 Decentralised digital architecture based on blind signatures
6.11.1 General <\/td>\n<\/tr>\n
38<\/td>\n6.11.2 Actors in the system
6.11.3 Functions in the system <\/td>\n<\/tr>\n
39<\/td>\n6.11.4 Flow of messages in the system <\/td>\n<\/tr>\n
40<\/td>\n7 Existing relevant standards and frameworks <\/td>\n<\/tr>\n
45<\/td>\nBibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":"

Blockchain and distributed ledger technologies. Overview of existing DLT systems for identity management<\/b><\/p>\n\n\n\n\n
Published By<\/td>\nPublication Date<\/td>\nNumber of Pages<\/td>\n<\/tr>\n
BSI<\/b><\/a><\/td>\n2022<\/td>\n46<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"featured_media":409326,"template":"","meta":{"rank_math_lock_modified_date":false,"ep_exclude_from_search":false},"product_cat":[2641],"product_tag":[],"class_list":{"0":"post-409318","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-bsi","8":"first","9":"instock","10":"sold-individually","11":"shipping-taxable","12":"purchasable","13":"product-type-simple"},"_links":{"self":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product\/409318","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/types\/product"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media\/409326"}],"wp:attachment":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media?parent=409318"}],"wp:term":[{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_cat?post=409318"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_tag?post=409318"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}