#Control , #Consent, #Minimization , #Interoperability enforced by user-centric, exchange protocols. In the scope of these protocols, we have a role:
- holder - a party that owns data and gives content to share data with others via VP
- issuer - party that creates a data point via VC and shares it with a holder
- verifier - attest and check data
Roles are not the permanent user could change roles during the exchange session #ssi
#control #consent #Minimization #interoperability #ssi
#SSI principles
#Existence — exist in real life
#Control —control their identities.
#Access —access to their own data
#Transparency — Systems and algorithms must be transparent.
#Persistence — must be long-lived.
#Portability — identity must be transportable
#Interoperability — Identities should be as widely usable as possible.
#Consent — Users must agree to the use of their identity.
#Minimization — Disclosure of claims must be minimized
#Protection — The rights of users must be protected
#ssi #existence #control #access #transparency #persistence #portability #interoperability #consent #Minimization #protection
#SSI principles
#Existence — exist in real life
#Control —control their identities.
#Access —access to their own data
#Transparency — Systems and algorithms must be transparent.
#Persistence — must be long-lived.
#Portability — identity must be transportable
Interoperability — Identities should be as widely usable as possible.
#Consent — Users must agree to the use of their identity.
#Minimization — Disclosure of claims must be minimized
#Protection — The rights of users must be protected
#ssi #existence #control #access #transparency #persistence #portability #consent #Minimization #protection