📄️ ACDC
See
📄️ ADC
See
📄️ ADR
See
📄️ AID
See
📄️ APC
See
📄️ API
See
📄️ AVR
See
📄️ BADA
See
📄️ BFT
See
📄️ BOLA
See
📄️ CBOR
See
📄️ CESR
See
📄️ CLC
See
📄️ CRUD
Definition
📄️ CSPRNG
Definition
📄️ CT
See
📄️ DAG
See
📄️ DAR
See
📄️ DEL
See
📄️ DHT
See
📄️ DID
See
📄️ DKMI
See
📄️ DPKI
See
📄️ E2E
See
📄️ ECR
See
📄️ ESSR
See
📄️ FFI
See
📄️ GAR
See
📄️ GLEIF
Definition
📄️ GLEIS
Definition
📄️ GPG
See
📄️ HSM
See
📄️ Home
Welcome to the WebofTrust terms wiki!
📄️ I O
See
📄️ IANA
See
📄️ IPEX
See
📄️ JOSE
See
📄️ JSON
Definition
📄️ KA2CE
See
📄️ KAACE
See
📄️ KAPI
Definition
📄️ KEL
A Key Event Log.
📄️ KERI
See
📄️ KERIMask
Definition
📄️ KERISSE
See
📄️ KERL
See
📄️ KID
See
📄️ KRAM
See
📄️ LEI
Definition
📄️ LID
See
📄️ LLM
See Large Language Model
📄️ LoA
See
📄️ LoC
See
📄️ MFA
See
📄️ MIME type
See
📄️ NFT
See
📄️ OOBI
See
📄️ OOR
See
📄️ P2P
See
📄️ PGP
See
📄️ PID
See
📄️ PKI
See
📄️ PRNG
Definition
📄️ PTEL
See
📄️ QAR
See
📄️ QVI
See
📄️ RID
See
📄️ RUN
Definition
📄️ SAD
See
📄️ SAID
See
📄️ SATP
See
📄️ SCID
See
📄️ SKRAP
See
📄️ SKWA
See
📄️ SPAC
See
📄️ SSI
See
📄️ TCP
See
📄️ TEE
See
📄️ TEL
See
📄️ TOAD
See
📄️ TPM
See
📄️ TSP
See
📄️ UI
See
📄️ URL
See
📄️ VC TEL
See
📄️ VC
See
📄️ VDS
See
📄️ VID
See
📄️ XBRL
See
📄️ abandoned identifier
Definition
📄️ access controlled interaction
Definition
📄️ agency
Definition
📄️ agent
Definition
📄️ ambient verifiability
Definition
📄️ ample
Definition
📄️ append only event logs
Definition
📄️ application programming interface
Definition
📄️ architectural decision record
Definition
📄️ attributional trust
Definition
📄️ authentic chained data container
Definition
📄️ authentic data container
Definition
📄️ authentic data
Definition
📄️ authentic provenance chain
Definition
📄️ authentic web
Definition
📄️ authenticity
Definition
📄️ authoritative
Definition
📄️ authority
See ToIP glossary
📄️ authorization
Definition
📄️ authorized vlei representative
Definition
📄️ autonomic computing systems
Definition
📄️ autonomic identifier
Definition
📄️ autonomic identity system
Definition
📄️ autonomic namespace
Definition
📄️ autonomic trust basis
Definition
📄️ backer
Definition
📄️ base media type
Definition
📄️ base64
Definition
📄️ bespoke credential
Definition
📄️ best available data acceptance mechanism
Definition
📄️ bexter
Definition
📄️ binding
Definition
📄️ bis
Definition
📄️ bivalent
Definition
📄️ blake3
Definition
📄️ blind oobi
Definition
📄️ blinded revocation registry
Definition
📄️ bran
Definition
📄️ branch
Definition
📄️ broken object level authorization
Definition
📄️ brv
Definition
📄️ byzantine agreement
Definition
📄️ byzantine fault tolerance
Definition
📄️ canonicalization
Definition
📄️ certificate transparency
Definition
📄️ cesr proof signatures
Definition
📄️ cesride
Definition
📄️ chain link confidentiality
Definition
📄️ chain of custody
Definition
📄️ cigar
Definition
📄️ claim
Definition
📄️ clone
Definition
📄️ cloud agent
Definition
📄️ code table selector
Definition
📄️ code table
Definition
📄️ cold start stream parsing
Definition
📄️ collective signature
Definition
📄️ collision
Definition
📄️ compact variant
Definition
📄️ complementary integrity verification
Definition
📄️ composability
See
📄️ composable event streaming representation
Definition
📄️ composable
See
📄️ concatenation
In formal language theory and computer programming, string concatenation is the operation of joining character strings) end-to-end. For example, the concatenation of "snow" and "ball" is "snowball".
📄️ concise binary object representation
Definition
📄️ confidentiality
Definition
📄️ configuration files
Definition
📄️ configuration traits
Definition
📄️ consensus mechanism
Definition
📄️ content addressable hash
Definition
📄️ contextual linkability
Definition
📄️ contingent disclosure
Definition
📄️ contractually protected disclosure
Definition
📄️ control authority
Definition
📄️ controller
Definition
📄️ cooperative delegation
Definition
📄️ coroutines
Definition
📄️ correlation
Definition
📄️ count code
See
📄️ credential
Definition
📄️ crypto libraries
Definition
📄️ cryptocurrency
Definition
📄️ cryptographic commitment scheme
Definition
📄️ cryptographic primitive
Definition
📄️ cryptographic strength
Definition
📄️ cryptonym
Definition
📄️ custodial agent
Definition
📄️ custodial rotation
Definition
📄️ data anchor
Definition
📄️ dead attack
Definition
📄️ dead drop
Definition
📄️ decentralized identifier
Definition
📄️ decentralized identity
Definition
📄️ decentralized key management infrastructure
Definition
📄️ delegated identifier
Definition
📄️ delegation
Definition
📄️ derivation code
Definition
📄️ designated aliases
Definition
📄️ designated authorized representative
Definition
📄️ diger
Definition
📄️ digest
Definition
📄️ digital signature
Definition
📄️ dip
Definition
📄️ direct mode
Definition
📄️ directed acyclic graph
Definition
📄️ disclosee
Definition
📄️ discloser
Definition
📄️ discovery
Definition
📄️ distributed hash table
Definition
📄️ dnd
Definition
📄️ domain name
Definition
📄️ domain
See
📄️ double spend proof
Definition
📄️ drt
Definition
📄️ dual indexed codes
Definition
📄️ dual text binary encoding format
Definition
📄️ duplicitous event log
Definition
📄️ duplicity detection
Definition
📄️ duplicity
Duplicity
📄️ eclipse attack
Definition
📄️ electronic signature
Definition
📄️ encrypt sender sign receiver
Definition
📄️ end role
Definition
📄️ end to end
Definition
📄️ end verifiable
Definition
📄️ engagement context role
Definition
📄️ entity
See
📄️ entropy
Definition
📄️ ephemeral
Definition
📄️ escrow state
Definition
📄️ escrow
Definition
📄️ establishment event
Definition
📄️ exn
Definition
📄️ exp
Definition
📄️ extensible business reporting language
Definition
📄️ field map
Definition
📄️ first seen
Definition
📄️ foreign function interface
Definition
📄️ frame code
See
📄️ full disclosure
Definition
📄️ fully compact
definition
📄️ fully expanded
Definition
📄️ ghost credential
Definition
📄️ gleif authorized representative
Definition
📄️ gnu privacy guard
Definition
📄️ governance framework
Definition
📄️ graduated disclosure
Definition
📄️ graph fragment
Definition
📄️ group code
See
📄️ group framing code
Definition
📄️ hab
Definition
📄️ habery
Definition
📄️ hardware security module
Definition
📄️ hierarchical asynchronous coroutines and input output
Definition
📄️ hierarchical composition
Definition
📄️ hierchical deterministic keys
Definition
📄️ hio
Definition
📄️ icp
Definition
📄️ identifier system
Definition
📄️ identifier
Definition
📄️ identity assurance
Definition
📄️ identity
Definition
📄️ inception event
Definition
📄️ inception
Definition
📄️ inconsistency
Definition
📄️ indexed signature
Definition
📄️ indirect mode
Definition
📄️ input output
Definition
📄️ inquisitor
Definition
📄️ integrity
Definition
📄️ interaction event
Non-establishment Event that anchors external data to the key-state as established by the most recent prior establishment event.
📄️ interactive authentication design
Definition
📄️ interceptor
Definition
📄️ interleaved serialisation
Definition
📄️ internal inconsistency
Definition
📄️ internet assigned numbers authority
Definition
📄️ interoperability
Definition
📄️ interoperable
See
📄️ ip address
An Internet Protocol address (IP address) is a numerical label such as '192.0.2.1' that is connected to a computer network that uses the Internet Protocol for communication. An IP address serves two main functions: network interface identification) and location addressing.
📄️ iss
Definition
📄️ issuance and presentation exchange protocol
Definition
📄️ issuance event
Definition
📄️ issuance exchange
Definition
📄️ issuee
Definition
📄️ issuer
Definition
📄️ ixn
Definition
📄️ javascript object notation (JSON)
Definition
📄️ javascript object signing and encryption
Definition
📄️ judge
Definition
📄️ juror
Definition
📄️ jury
Definition
📄️ keep
Definition
📄️ keri agreement algorithm for control establishment
Definition
📄️ keri command line interface
Definition
📄️ keri event stream
Definition
📄️ keri improvement doc
Definition
📄️ keri ox
Definition
📄️ keri request authentication method
Definition
📄️ keri suite search engine
Definition
📄️ keri suite
Definition
📄️ keria
Definition
📄️ keride
Definition
📄️ keridemlia
Definition
📄️ kerific
Definition
📄️ keripy
Definition
📄️ kever
Definition
📄️ key compromise
Definition
📄️ key event log
Definition
📄️ key event message
Definition
📄️ key event receipt infrastructure
Definition
📄️ key event receipt log
Definition
📄️ key event receipt
Definition
📄️ key event
Definition
📄️ key management
Definition
📄️ key pair
Definition
📄️ key state
Definition
📄️ key stretching
Definition
📄️ key transparency
Definition
📄️ key
Definition
📄️ keystore
Definition
📄️ kli
See
📄️ ksn
Definition
📄️ large language model
Definition
📄️ lead bytes
Definition
📄️ ledger backer
Definition
📄️ legal entity engagement context role vlei credential governance framework
Definition
📄️ legal entity official organizational role vlei credential governance framework
Definition
📄️ legal entity vlei credential governance framework
Definition
📄️ legal entity
Definition
📄️ legitimized human meaningful identifier
Definition
📄️ levels of assurance
Definition
📄️ listed identifier
Definition
📄️ liveness
Definition
📄️ loci of control
Definition
📄️ locked state
Definition
📄️ management TEL
See
📄️ management transaction event log
Definition
📄️ media type
Definition
📄️ message
Definition
📄️ messagepack
Definition
📄️ moobi
Definition
📄️ most compact
Definition
📄️ multi factor authentication
Definition
📄️ multi valent
Definition
📄️ multicodec
Definition
📄️ multiplexing
Definition
📄️ multisig
Definition
📄️ naive conversion
Definition
📄️ namespace
Definition
📄️ ndigs
Definition
📄️ nested cooperative delegated identifiers
Definition
📄️ non establishment event
Definition
📄️ non fungible token
Definition
📄️ non interactive authentication design
Definition
📄️ non normative
Definition
📄️ non repudiable
Definition
📄️ non transferable identifier
Definition
📄️ non transferable
Definition
📄️ normative
Definition
📄️ official organizational role
Definition
📄️ one way function
Definition
📄️ opcode
Definition
📄️ out of band introduction
Definition
📄️ owner
See
📄️ ownership
See
📄️ pad
Definition
📄️ parside
Definition
📄️ partial disclosure
Definition
📄️ partial pre rotation
See
📄️ partial rotation
Definition
📄️ party
Definition
📄️ passcode
Definition
📄️ pathing
Definition
📄️ payload
Definition
📄️ peer to peer
Definition
📄️ percolated information discovery
Definition
📄️ persistent data structure
Definition
📄️ persistent identifier
See
📄️ pii
Definition
📄️ pipelining
Definition
📄️ post pad
Definition
📄️ post quantum
Definition
📄️ pre pad
Definition
📄️ pre rotation
Definition
📄️ prefix
Definition
📄️ presentation exchange
Definition
📄️ pretty good privacy
Definition
📄️ primary root of trust
Definition
📄️ primitive
Definition
📄️ privacy washing
Definition
📄️ privacy
Definition
📄️ promiscuous mode
Definition
📄️ proof of authority
Definition
📄️ proof of authorship
Definition
📄️ protocol
Definition
📄️ provenance
Defintion
📄️ provenanced
Definition
📄️ pseudo random number
Definition
📄️ public key infrastructure
Definition
📄️ public transaction event log
Definition
📄️ public verifiable credential registry
Definition
📄️ qry
Definition
📄️ qualified vlei issuer vlei credential governance framework
Definition
📄️ qualified vlei issuer
Definition
📄️ qualified
Definition
📄️ qvi authorized representative
A designated representative of a QVI authorized, to conduct QVI operations with GLEIF and Legal Entities. Also referring to a person in the role of a QAR.
📄️ race condition
Definition
📄️ rainbow table attack
Definition
📄️ rct
Definition
📄️ read update nullify
Definition
📄️ receipt log
Definition
📄️ receipt
Definition
📄️ reconciliation
Definition
📄️ redundant credential
Definition
📄️ registrar
Definition
📄️ registration interaction
Definition
📄️ registry
Definition
📄️ replay attack
Definition
📄️ repo
Definition
📄️ reputation
Definition
📄️ reputational trust
Definition
📄️ reserve rotation
Definition
📄️ rev
Definition
📄️ revocation event
Definition
📄️ revocation
Definition
📄️ ricardian contract
Definition
📄️ root autonomic identifier
Definition
📄️ root of trust
Definition
📄️ rot
Definition
📄️ rotation authority
Definition
📄️ rotation event
Definition
📄️ rotation
Definition
📄️ rpy
Definition
📄️ run off the crud
Definition
📄️ sally
Definition
📄️ salt
Definition
📄️ salter
Definition
📄️ salty nonce blinding factor
Definition
📄️ schema namespace registry
Definition
📄️ schema registry
Definition
📄️ seal
Definition
📄️ secondary root of trust
Definition
📄️ secure asset transfer protocol
Definition
📄️ secure attribution
Definition
📄️ secure private authentic confidentiality
Definition
📄️ secure
See
📄️ security cost performance architecture trade off
Definition
📄️ security overlay properties trillema
Definition
📄️ security
Definition
📄️ seed
Definition
📄️ selective disclosure
Definition
📄️ self addressing data
Definition
📄️ self addressing identifier
Definition
📄️ self authenticating
See
📄️ self certifying identifier
Definition
📄️ self framing
Definition
📄️ self sovereign identity
Definition
📄️ self sovereignty
See
📄️ server sent event
Definition
📄️ service endpoint
Definition
📄️ siger
See Indexed signature
📄️ signed digest
Definition
📄️ signer
Definition
📄️ signify keria request authentication protocol
Definition
📄️ signify
Definition
📄️ signing authority
Definition
📄️ signing threshold
Definition
📄️ simple keri for web auth
Definition
📄️ single signature identifier
Definition
📄️ sniffable
Definition
📄️ sniffer
Definition
📄️ solicited issuance
Definition
📄️ source of truth
Definition
📄️ spanning layer
Definition
📄️ spurn
Definition
📄️ ssi system
Definition
📄️ stale event
Definition
📄️ stale key
Definition
📄️ streamer
Definition
📄️ strip parameter
Definition
📄️ sub shell
Definition
📄️ supermajority
Definition
📄️ tcp endpoint
Definition
📄️ text binary concatenation composability
Definition
📄️ tholder
Definition
📄️ threshold of accountable duplicity
Definition
📄️ threshold signature scheme
Definition
📄️ threshold structure security
Definition
📄️ top level section
Definition
📄️ trans contextual value
Definition
📄️ transaction event log
Definition
📄️ transfer off ledger
Definition
📄️ transferable identifier
Definition
📄️ transferable
Definition
📄️ transmission control protocol
Definition
📄️ trust domain
Definition
📄️ trust spanning protocol
Definition
📄️ trusted execution environment
Definition
📄️ trusted platform module
Definition
📄️ ts node
Definition
📄️ uniform resource locator
Definition
📄️ univalent
Definition
📄️ unsolicited issuance
Definition
📄️ user interface
Definition
📄️ vLEI
See
📄️ validate
See
📄️ validator
Definition
📄️ vcp
Definition
📄️ vdr
See
📄️ veracity
Definition
📄️ verfer
Definition
📄️ verifiable credential
Definition
📄️ verifiable data registry
Definition
📄️ verifiable data structure
Definition
📄️ verifiable identifier
Definition
📄️ verifiable legal entity identifier
Definition
📄️ verifiable
Definition
📄️ verification
Definition
📄️ verified integrity
Definition
📄️ verifier
Definition
📄️ verify signature
Definition
📄️ verify
Definition
📄️ version code
Definition
📄️ version string
Definition
📄️ version
Definiton
📄️ virtual credential transaction event log
Definition
📄️ vlei credential
Definition
📄️ vlei ecosystem governance framework
Definition
📄️ vlei role credential
Definition
📄️ vrt
Definition
📄️ wallet
Definition
📄️ watcher
Definition
📄️ web of trust
Definition
📄️ weight of weights
Definition
📄️ well known witnesses
Definition
📄️ witness
Definition
📄️ xip
Definition
📄️ zero trust computing
Definition
📄️ zero trust
Definition