Attenuated Delegation Comparing VCs to ZCAP-LD Example Design of an Authorization System with Verifiable Credentials and the Tradeoffs Common Delegation Patterns in the Verifiable Credential Ecosystem
Attenuation Example Design of an Authorization System with Verifiable Credentials and the Tradeoffs Common Delegation Patterns in the Verifiable Credential Ecosystem
Authorization system Comparing VCs to ZCAP-LD Example Design of an Authorization System with Verifiable Credentials and the Tradeoffs
DIDs Comparing VCs to ZCAP-LD Example Design of an Authorization System with Verifiable Credentials and the Tradeoffs Common Delegation Patterns in the Verifiable Credential Ecosystem
Decentralized Identifiers Example Design of an Authorization System with Verifiable Credentials and the Tradeoffs Common Delegation Patterns in the Verifiable Credential Ecosystem
Delegation Comparing VCs to ZCAP-LD Example Design of an Authorization System with Verifiable Credentials and the Tradeoffs Common Delegation Patterns in the Verifiable Credential Ecosystem
Identity Tech isn't a Tool to Impose Values Quantifying Trust: Is it possible? Framework for the Comparison of Identity Systems
Privacy Theory of Making a Private Internet Why I Decided to Remove Google Analytics from my Blog Personal Privacy in the Wake of Reoccurring Data Breaches
SSI A response to Identity Woman's recent blog post about Anoncreds Tech isn't a Tool to Impose Values
VCs Comparing VCs to ZCAP-LD Example Design of an Authorization System with Verifiable Credentials and the Tradeoffs Common Delegation Patterns in the Verifiable Credential Ecosystem
Verifiable Credentials Comparing VCs to ZCAP-LD Example Design of an Authorization System with Verifiable Credentials and the Tradeoffs Common Delegation Patterns in the Verifiable Credential Ecosystem
system design Comparing VCs to ZCAP-LD Example Design of an Authorization System with Verifiable Credentials and the Tradeoffs