Difference between revisions of "Self-sovereign data asset"

From PKC
Jump to navigation Jump to search
 
Line 1: Line 1:
See [[Self-sovereign identity]].
Using a combination of [[PKC]] and [[Self-sovereign identity]] technologies, it is possible to allow people to protect their data assets with minimal entry barrier. In other words, it will be technically easy (using [[modern browser]]s as a standard and extensible user interface), low cost (requires no purchasing of software hardware for initial users), and extensible (since this technology stack is designed based on scalable cloud computing industry standards).  


[[Category:Self-sovereign identity]]
[[Category:Self-sovereign identity]]

Latest revision as of 04:47, 9 June 2022

Using a combination of PKC and Self-sovereign identity technologies, it is possible to allow people to protect their data assets with minimal entry barrier. In other words, it will be technically easy (using modern browsers as a standard and extensible user interface), low cost (requires no purchasing of software hardware for initial users), and extensible (since this technology stack is designed based on scalable cloud computing industry standards).