-
Paper describing DPV as a resource and intended for submission to [ISWC 2024 Resource Track](https://iswc2024.semanticweb.org/event/3715c6fc-e2d7-47eb-8c01-5fe4ac589a52/summary). This issue is for ass…
-
## I Expect
- to align concepts with RFC9110
- to add missing concepts from RFC9110 (e.g. HTTP Intermediary, including HTTP gateways, HTTP reverse proxies & co)
## Question
Feel free to let…
-
As raised in the Discovery call today, in the current TD specification is not clear if the `securitySchemas` are also applicable to Links. I did a second quick glance at the spec and in [SecuritySchem…
-
Access rights
DCMI Metadata Terms: http://purl.org/dc/terms/accessRights
Label: Access Rights
Current definition of this property in the DCMI Terms namespace is:
“Information about who …
-
SLSA offers:
- A common vocabulary to talk about software supply chain security
- A way to secure your incoming supply chain by evaluating the trustworthiness of the artifacts you consume
- An ac…
-
[The Security Vocabulary](https://web-payments.org/specs/source/vocabs/security.html) is used for declaring public keys for ActivityPub when [signing requests using HTTP Signatures](https://www.w3.org…
evanp updated
5 years ago
-
Precompute different lists based on size. Limit based on word stability metrics.
- ASCII
- base10 - base85, base128, base256
- **Concrete**
- First letter corresponds to alphabet, Emoji
…
-
The rest-guide currently lists these as not covered:
> Topics not covered in this guide:
>
> * Semantics of common business data (e.g. social security number, address, …). These are managed by …
-
Review the [IIC "Endpoint Security Best Practices" document](http://www.iiconsortium.org/pdf/Endpoint_Security_Best_Practices_Final_Mar_2018.pdf) to see if we can glean any additional security require…
-
This came in via email during public review: https://lists.oasis-open.org/archives/cti-comment/202101/msg00003.html
----- Original message -----
From: Christopher Carlson
To: Emily Ratliff
Cc:…