{"id":434390,"date":"2024-10-20T07:43:51","date_gmt":"2024-10-20T07:43:51","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bsi-pd-iso-tr-236442023\/"},"modified":"2024-10-26T14:40:16","modified_gmt":"2024-10-26T14:40:16","slug":"bsi-pd-iso-tr-236442023","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bsi-pd-iso-tr-236442023\/","title":{"rendered":"BSI PD ISO\/TR 23644:2023"},"content":{"rendered":"
PDF Pages<\/th>\n | PDF Title<\/th>\n<\/tr>\n | ||||||
---|---|---|---|---|---|---|---|
2<\/td>\n | National foreword <\/td>\n<\/tr>\n | ||||||
6<\/td>\n | Foreword <\/td>\n<\/tr>\n | ||||||
7<\/td>\n | Introduction <\/td>\n<\/tr>\n | ||||||
9<\/td>\n | 1 Scope 2 Normative references 3 Terms and definitions 4 Abbreviated terms <\/td>\n<\/tr>\n | ||||||
10<\/td>\n | 5 Types of trust anchors 5.1 Overview <\/td>\n<\/tr>\n | ||||||
11<\/td>\n | 5.2 Legal trust anchors <\/td>\n<\/tr>\n | ||||||
12<\/td>\n | 5.3 Data trust anchors <\/td>\n<\/tr>\n | ||||||
13<\/td>\n | 5.4 Cryptographic trust anchors 5.5 Cybersecurity trust anchors <\/td>\n<\/tr>\n | ||||||
14<\/td>\n | 5.6 Social trust anchors <\/td>\n<\/tr>\n | ||||||
15<\/td>\n | 6 Existing trust anchors for DLT-based identity management 6.1 Overview <\/td>\n<\/tr>\n | ||||||
16<\/td>\n | 6.2 Cryptographic trust anchors in public key infrastructures <\/td>\n<\/tr>\n | ||||||
18<\/td>\n | 6.3 Cryptographic trust anchors \u2014 Federated PKI <\/td>\n<\/tr>\n | ||||||
20<\/td>\n | 6.4 Social trust anchor architectures <\/td>\n<\/tr>\n | ||||||
21<\/td>\n | 6.5 Cryptographic trust anchors \u2014 Autonomic identifiers 6.6 Data trust anchors in eID regulations \u2013 eIDAS Regulation <\/td>\n<\/tr>\n | ||||||
23<\/td>\n | 6.7 Data trust anchors in non-PKI-based SSI solutions using DIDs <\/td>\n<\/tr>\n | ||||||
26<\/td>\n | 6.8 Data trust anchors in non-PKI-based, non-DID partial SSI solutions using ZKP <\/td>\n<\/tr>\n | ||||||
27<\/td>\n | 7 Using trust anchors 7.1 Representing multiple dimensions of risk <\/td>\n<\/tr>\n | ||||||
29<\/td>\n | 7.2 Chains of trust 7.2.1 General 7.2.2 Legal trust anchors 7.2.3 Data trust anchors 7.2.4 Cryptographic trust anchors <\/td>\n<\/tr>\n | ||||||
30<\/td>\n | 7.3 Use of trust anchors in applications <\/td>\n<\/tr>\n | ||||||
31<\/td>\n | Bibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" Blockchain and distributed ledger technologies (DLTs). Overview of trust anchors for DLT-based identity management<\/b><\/p>\n |