Meta University/Boundary

From PKC
Jump to navigation Jump to search
  1. The adoption of PKC as a common knowledge/ data repository
  2. All participants have access to at least one shared instance of PKC.
  3. Data and Network Security mechanisms employed by PKCs are not breached.