
Is the data Y in Alice's private Resource Server signed so the algorithm X can verify authenticity of data Y? Adrian On Fri, Jun 2, 2017 at 11:04 AM Thomas Hardjono <hardjono@mit.edu> wrote:
Eve, Mark, UMA folks,
This new paper (PDF) might be of some use in framing-up the next level of discussions regarding "identity" and "data" and how to"federate data".
Its permanent link is here:
http://arxiv.org/abs/1705.10880
I'm thinking that the Claims-gathering flows in UMA and also the Consent-Receipts flows could use an "algorithm-identifier" value, effectively stating that "Alice consents to Algorithms X be run against her data set Y" (where the data-set lies in her private Resource Server).
Best.
/thomas/ _______________________________________________ WG-UMA mailing list WG-UMA@kantarainitiative.org http://kantarainitiative.org/mailman/listinfo/wg-uma
-- Adrian Gropper MD PROTECT YOUR FUTURE - RESTORE Health Privacy! HELP us fight for the right to control personal health data.