SSI Protocol builds on decades of distributed systems research.
This file is informational and non-normative.
Cryptographic Hash Chains:
- Merkle trees (Ralph Merkle, 1979)
- Blockchain technology (Satoshi Nakamoto, 2008)
- Git version control (Linus Torvalds, 2005)
Fail-Safe Design:
- Safety-critical systems engineering (Nancy Leveson, MIT)
- Fault-tolerant computing (Leslie Lamport, Microsoft Research)
- Defensive programming principles (Edsger Dijkstra)
Audit Logging Standards:
- PCI-DSS (Payment Card Industry Data Security Standard)
- HIPAA audit controls (U.S. Department of Health & Human Services)
- NIST SP 800-92 (Guide to Computer Security Log Management)
Policy-Based Access Control:
- XACML (eXtensible Access Control Markup Language, OASIS)
- RBAC (Role-Based Access Control, NIST)
- Attribute-Based Access Control (DARPA, NSA)
We are grateful to the researchers and practitioners who established these foundations:
- Ralph Merkle (cryptographic hash trees)
- Leslie Lamport (distributed systems consensus)
- Nancy Leveson (safety engineering)
- Bruce Schneier (security architecture)
- Ross Anderson (security economics)
- Peter Neumann (system reliability)
SSI Protocol leverages:
- PostgreSQL (hash-chained record storage)
- Node.js (reference implementation runtime)
- OpenSSL (cryptographic primitives)
- JSON Schema (message format validation)
SSI Protocol stands on the shoulders of giants. We honor their contributions.