{"id":434390,"date":"2024-10-20T07:43:51","date_gmt":"2024-10-20T07:43:51","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bsi-pd-iso-tr-236442023\/"},"modified":"2024-10-26T14:40:16","modified_gmt":"2024-10-26T14:40:16","slug":"bsi-pd-iso-tr-236442023","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bsi-pd-iso-tr-236442023\/","title":{"rendered":"BSI PD ISO\/TR 23644:2023"},"content":{"rendered":"

PDF Catalog<\/h4>\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
PDF Pages<\/th>\nPDF Title<\/th>\n<\/tr>\n
2<\/td>\nNational foreword <\/td>\n<\/tr>\n
6<\/td>\nForeword <\/td>\n<\/tr>\n
7<\/td>\nIntroduction <\/td>\n<\/tr>\n
9<\/td>\n1 Scope
2 Normative references
3 Terms and definitions
4 Abbreviated terms <\/td>\n<\/tr>\n
10<\/td>\n5 Types of trust anchors
5.1 Overview <\/td>\n<\/tr>\n
11<\/td>\n5.2 Legal trust anchors <\/td>\n<\/tr>\n
12<\/td>\n5.3 Data trust anchors <\/td>\n<\/tr>\n
13<\/td>\n5.4 Cryptographic trust anchors
5.5 Cybersecurity trust anchors <\/td>\n<\/tr>\n
14<\/td>\n5.6 Social trust anchors <\/td>\n<\/tr>\n
15<\/td>\n6 Existing trust anchors for DLT-based identity management
6.1 Overview <\/td>\n<\/tr>\n
16<\/td>\n6.2 Cryptographic trust anchors in public key infrastructures <\/td>\n<\/tr>\n
18<\/td>\n6.3 Cryptographic trust anchors \u2014 Federated PKI <\/td>\n<\/tr>\n
20<\/td>\n6.4 Social trust anchor architectures <\/td>\n<\/tr>\n
21<\/td>\n6.5 Cryptographic trust anchors \u2014 Autonomic identifiers
6.6 Data trust anchors in eID regulations \u2013 eIDAS Regulation <\/td>\n<\/tr>\n
23<\/td>\n6.7 Data trust anchors in non-PKI-based SSI solutions using DIDs <\/td>\n<\/tr>\n
26<\/td>\n6.8 Data trust anchors in non-PKI-based, non-DID partial SSI solutions using ZKP <\/td>\n<\/tr>\n
27<\/td>\n7 Using trust anchors
7.1 Representing multiple dimensions of risk <\/td>\n<\/tr>\n
29<\/td>\n7.2 Chains of trust
7.2.1 General
7.2.2 Legal trust anchors
7.2.3 Data trust anchors
7.2.4 Cryptographic trust anchors <\/td>\n<\/tr>\n
30<\/td>\n7.3 Use of trust anchors in applications <\/td>\n<\/tr>\n
31<\/td>\nBibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":"

Blockchain and distributed ledger technologies (DLTs). Overview of trust anchors for DLT-based identity management<\/b><\/p>\n\n\n\n\n
Published By<\/td>\nPublication Date<\/td>\nNumber of Pages<\/td>\n<\/tr>\n
BSI<\/b><\/a><\/td>\n2023<\/td>\n34<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"featured_media":434399,"template":"","meta":{"rank_math_lock_modified_date":false,"ep_exclude_from_search":false},"product_cat":[2641],"product_tag":[],"class_list":{"0":"post-434390","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-bsi","8":"first","9":"instock","10":"sold-individually","11":"shipping-taxable","12":"purchasable","13":"product-type-simple"},"_links":{"self":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product\/434390","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/types\/product"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media\/434399"}],"wp:attachment":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media?parent=434390"}],"wp:term":[{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_cat?post=434390"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_tag?post=434390"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}