Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.
Comment: W3C Workshop "Provenance Topic"

...


SC for ...SC for ...SC for ...
Description


Parameters


Functionality


..etc


W3C Workshop "Provenance Topic"

Image Added

Reference: https://www.w3.org/2016/04/blockchain-workshop/report.html#provenance

Research

  • Promote the secure and efficient movement of goods by resolving threats early, improving verification and detection capabilities, and enhancing the security of infrastructure and conveyances in order to protect the supply chain, and maximizing the flow of legitimate trade.
  • Foster a resilient supply chain by mitigating the systemic vulnerability of supply chains and promoting trade resumption policies and practices.
  • How can stakeholders provide assurance that my product is safe without revealing intellectual property (e.g., source code)?
  • Is there a formal certification process and authority that can certify certain security properties exist in the product?
  • What would constitute a trusted third party (TTP) certification body (e.g., charter, COI, goals, membership, participants, industry)?
  • What would be the focus and benefits of the TTP (incentives, methods, technologies) and key outcomes (especially sponsors)?
  • How would the TTP get industry buy-in and be distinguished from other (e.g., TCB, OWASP, etc.) existing bodies?
  • Better precision in understanding existing and emerging vulnerabilities and threats.
  • Advances in insider threat detection, deterrence, mitigation and elimination.
  • Assuring security, survivability and dependability of our critical infrastructures.
  • Assuring the availability of time-critical scalable secure systems, information provenance and security with privacy.
  • Observable/ measurable/ certifiable security claims, rather than hypothesized causes.
  • Methods that enable us to specify security requirements, formulate security claims and certify security properties.
  • Assurance against known and unknown (though perhaps pre-modelled) threats.
  • Mission fulfilment, whether or not security violations have taken place (rather than chasing all violations indiscriminately).

...