- From: Joe Andrieu <joe@joeandrieu.com>
- Date: Tue, 19 Dec 2017 12:38:12 -0800
- To: public-vc-wg@w3.org
- Message-Id: <1513715892.1269858.1210448936.08C85A45@webmail.messagingengine.com>
Nice. For the case of the holder acting for a verifier: a recruiter passing on verified credentials of a candidate to their client. On Tue, Dec 19, 2017, at 12:20 PM, David Chadwick wrote: > Hi Everyone > > given that today we discussed the topic of subject not being > the holder,> I thought I would try to classify the different types of VC that a > verifier might receive, given all the possible relationships between > subject, holder, issuer and verifier. I attach a jpeg picture that > depicts my first thoughts on how we might classify the different types> and/or ways that a VC might be presented to a verifier, in the > shape of> a binary decision tree. I find the diagram useful in that it is trying> to capture the wide variety of possibilities, and eventually we will > need to cover them all in either the data model or protocols or > both, if> we are not to leave gaps in our specifications. > > If this is worth pursuing further then maybe this should be put on the> web somewhere, and/or distributed to the CCG as well - please advise.> > kind regards > > David > Email had 1 attachment: > * SubjectHolder.jpeg 95k (image/jpeg) -- Joe Andrieu, PMP joe@legreq.comLEGENDARY REQUIREMENTS +1(805)705-8651Do what matters. http://legreq.com[1] Links: 1. http://www.legendaryrequirements.com
Received on Tuesday, 19 December 2017 20:38:37 UTC