This wiki has undergone a migration to Confluence found Here
<meta name="googlebot" content="noindex">

Difference between revisions of "Trust Label"

From HL7Wiki
Jump to navigation Jump to search
Line 24: Line 24:
 
It should also be obvious from the discussion that the proof-of-work protocol is factually the underlying key to unlocking the huge paradigm shift and efficiency of distributed-ledger blockchain technology – no traditional deterrents and countermeasures required – there really is no other viable alternative.
 
It should also be obvious from the discussion that the proof-of-work protocol is factually the underlying key to unlocking the huge paradigm shift and efficiency of distributed-ledger blockchain technology – no traditional deterrents and countermeasures required – there really is no other viable alternative.
 
Incorporating the proof-of-work protocol into private blockchain technology taps directly into the immense efficiency of the bitcoin blockchain paradigm shift. Without it, all you've built is an old-fashioned (and inefficient) distributed database.''
 
Incorporating the proof-of-work protocol into private blockchain technology taps directly into the immense efficiency of the bitcoin blockchain paradigm shift. Without it, all you've built is an old-fashioned (and inefficient) distributed database.''
 
+
*[http://gforge.hl7.org/gf/download/docmanfileversion/9179/14191/CommonAccord_Provenance_blockchain.pdf CommonAccord Provenance Blockchain]
  *[http://gforge.hl7.org/gf/download/docmanfileversion/9179/14191/CommonAccord_Provenance_blockchain.pdf CommonAccord Provenance Blockchain]
 
 
'''''Problem:'''''
 
'''''Problem:'''''
 
No mechanism to track provenance of digital contracts exchanged between machines
 
No mechanism to track provenance of digital contracts exchanged between machines

Revision as of 17:12, 3 May 2016

Back to Security Main Page

Trust Label Purpose

Trust codes are required to meet stakeholder use case for a discoverable and computable set of metadata to convey asserted trust attributes of an exchange partner.

Trust Library

Block Chaining

Proof-of-work 'paradigm shift' Let us digress for a moment to a prior argument in order to elucidate the immense paradigm shift that proof-of-work delivers in the form of a trustless environment.

Many would argue that cheating by, or collusion amongst, regulated parties is an illegal act with associated and significant deterrent costs which are sufficient to enforce the rules.

As evidenced above, we know this line of reasoning to be faulty.

The reason for this is because when practicably employed, traditional deterrents generate both a non-deterministic and dynamic environment whereby deterrent costs inevitably become cost/benefit estimations – that is, zero cost for successful evasions versus more money due at some future point in time for unsuccessful cheating.

Contrary to the traditional deterrents approach, proof-of-work is entirely deterministic, whereby parties know the cost of cheating and collusion and must decide to pay this cost upfront.

If efficiency is greatest when the countermeasures are most expensive and immediate, then proof-of-work in the context of a distributed ledger and the trustless environment it helps to generate is a massive paradigm shift that is foundationally new and revolutionary.

It should be apparent by now that trust-based systems are merely unsecure and non-empirical software 'workarounds' (if you can even call them that) to the provision of a real security work-product, proof-of- work. In addition, it should be equally apparent that the arguments in support of workarounds to proof-of-work arise, not from a wisdom that it is prudent to build a distributed ledger without proof-of-work, but rather they arise solely from the historical inability to attain proof-of-work in an economical way.

It should also be obvious from the discussion that the proof-of-work protocol is factually the underlying key to unlocking the huge paradigm shift and efficiency of distributed-ledger blockchain technology – no traditional deterrents and countermeasures required – there really is no other viable alternative. Incorporating the proof-of-work protocol into private blockchain technology taps directly into the immense efficiency of the bitcoin blockchain paradigm shift. Without it, all you've built is an old-fashioned (and inefficient) distributed database.

Problem: No mechanism to track provenance of digital contracts exchanged between machines No method for verifying non-repudiation beyond digital e-signatures on contracts Weak method to sharing versions of contracts among negotiating parties Solution: Enhance CommonAccord architecture with hash-chains for tracking state of negotiated contracts Publish hash-chains to ledger (public or private) Provide mechanism for parties to access private repositories containing contracts Legal documents are mostly handled as text blobs, in a complex, semi-proprietary format. Authoring, reviewing, sharing, managing are all difficult. Establishing provenance is often impossible The impact is delay, cost, risk, fear, imbalance, and a systemic advantage for large actors Data Model and Version Tracking:

  • Data model expresses contracts in modular parts
  • GitHub model for change mgmt & version tracking
  • Parties check-out contract into private repositories

Access control to contracts and metadata:

  • UMA model for access control to private repositories
  • Parties access repo, do changes, send Metadata
  • Each change generates hash-points in doc hash-tree

Ledger system:

  • Captures current state of contracts exchange/flow
  • Hash of Metadata added to ledger
  • Can use today’s Blockchain or future technology

DirectTrust

Federal Trust Bundle

GTRI - IDESG

NATE

ONC

THEWS

Trust Label Harmonization Proposal

Back to Security Main Page