Skip to content

Latest commit

 

History

History
56 lines (39 loc) · 1.59 KB

File metadata and controls

56 lines (39 loc) · 1.59 KB

SSI Protocol - Acknowledgments

SSI Protocol builds on decades of distributed systems research.

This file is informational and non-normative.


Foundational Concepts

Cryptographic Hash Chains:

  • Merkle trees (Ralph Merkle, 1979)
  • Blockchain technology (Satoshi Nakamoto, 2008)
  • Git version control (Linus Torvalds, 2005)

Fail-Safe Design:

  • Safety-critical systems engineering (Nancy Leveson, MIT)
  • Fault-tolerant computing (Leslie Lamport, Microsoft Research)
  • Defensive programming principles (Edsger Dijkstra)

Audit Logging Standards:

  • PCI-DSS (Payment Card Industry Data Security Standard)
  • HIPAA audit controls (U.S. Department of Health & Human Services)
  • NIST SP 800-92 (Guide to Computer Security Log Management)

Policy-Based Access Control:

  • XACML (eXtensible Access Control Markup Language, OASIS)
  • RBAC (Role-Based Access Control, NIST)
  • Attribute-Based Access Control (DARPA, NSA)

Research Contributions

We are grateful to the researchers and practitioners who established these foundations:

  • Ralph Merkle (cryptographic hash trees)
  • Leslie Lamport (distributed systems consensus)
  • Nancy Leveson (safety engineering)
  • Bruce Schneier (security architecture)
  • Ross Anderson (security economics)
  • Peter Neumann (system reliability)

Open Source Ecosystem

SSI Protocol leverages:

  • PostgreSQL (hash-chained record storage)
  • Node.js (reference implementation runtime)
  • OpenSSL (cryptographic primitives)
  • JSON Schema (message format validation)

SSI Protocol stands on the shoulders of giants. We honor their contributions.