To provide technical means, building on ongoing work in TC CYBER, that enable assurance of privacy and verification of said assurance. The document shall address Identity Management with respect to privacy, naming structures with respect to PII and objects that may be associated as proxies to entities requiring PII protection, protocols and policy mechanisms to give assurance and the verification of assurance for PII.
Highlight
Off