Open msporny opened 6 months ago
What is the workflow that this self-review is subject to?
What is the workflow that this self-review is subject to?
It is a review that someone in the WG performs and the WG reviews and approves (and can modify over time). The Privacy and Security groups then take it as input to determine if they agree with the self review (as they perform a critical review of their own).
You can read more about the process here:
https://www.w3.org/Guide/documentreview/#how_to_get_horizontal_review
This issue contains the Verifiable Credentials Working Group's internationalization self-review of Controller Documents v1.0, which are a generalization of DID Documents and some content from VC Data Integrity. All this to say, horizontal review has occurred for most of this content before when it was in DID Core, and then again when it was in Verifiable Credential Data Integrity. The Working Group recently decided that it would rather have this content in a separate specification than embed it in DID Core or VC Data Integrity, and that specification is Controller Documents v1.0.
The specification publishes cryptographic material and thus does not contain text that will be read by a human being. The one exception for this is possibly software developers, who might see error messages, which have specific codes, which are internationalizable, but whose internationalization characteristics are up to each implementer.
The specification publishes cryptographic material and thus does not provide the features described in the paragraph above.
The specification publishes cryptographic material and thus does not provide the features described in the paragraph above.
The specification publishes cryptographic material and thus does not provide the features described in the paragraph above.
The specification publishes cryptographic material and thus does not provide the features described in the paragraph above.
The specification publishes cryptographic material and thus does not provide the features described in the paragraph above.
Dates and times are used when expressing the revocation of cryptographic material. For these fields, we use XML Schema 1.1 date-time format and provide guidance in the specification on how to display dates and times that are sensitive to locale preferences.
All character encoding uses UTF-8.
The specification publishes cryptographic material and thus does not provide the features described in the paragraph above.
Dates and times are used when expressing the revocation of cryptographic material. For these fields, we use XML Schema 1.1 date-time format and provide guidance in the specification on how to display dates and times that are sensitive to locale preferences. The specification publishes cryptographic material and thus do not provide features for expressing names, addresses, or other fields that have internationalization considerations.
The specification publishes cryptographic material and thus does not provide the features described in the paragraph above.
Dates and times are used when expressing the revocation of cryptographic material. For these fields, we use XML Schema 1.1 date-time format and provide guidance in the specification on how to display dates and times that are sensitive to cultural and locale preferences.