Difference between revisions of "Self-sovereign data asset"
Jump to navigation
Jump to search
Line 1: | Line 1: | ||
Using a combination of [[PKC]] and [[Self-sovereign identity]] technologies, it is possible to allow people to protect their data assets with minimal entry barrier. In other words, it will be technically easy (using [[modern browser]]s as a standard and extensible user interface), low cost (requires no purchasing of software hardware for initial users), and extensible (since this technology stack is designed based on scalable cloud computing industry standards). | |||
[[Category:Self-sovereign identity]] | [[Category:Self-sovereign identity]] |
Latest revision as of 04:47, 9 June 2022
Using a combination of PKC and Self-sovereign identity technologies, it is possible to allow people to protect their data assets with minimal entry barrier. In other words, it will be technically easy (using modern browsers as a standard and extensible user interface), low cost (requires no purchasing of software hardware for initial users), and extensible (since this technology stack is designed based on scalable cloud computing industry standards).