Trusted Data Format: Difference between revisions

Content deleted Content added
Corrected two stale links
AnomieBOT (talk | contribs)
m Dating maintenance tags: {{Dead link}}
 
(16 intermediate revisions by 13 users not shown)
Line 1:
{{refimproveMore citations needed|date=JanuaryMarch 20142021}}
 
{{infobox file format
| name = Trusted Data Format
Line 22 ⟶ 21:
| extended to =
| standard =
| url =
[https://www.dni.gov/index.php/who-we-are/organizations/ic-cio/ic-cio-related-menus/ic-cio-related-links/ic-technical-specifications/trusted-data-format ODNIDNI TDF Specification]
}}
The '''Trusted Data Format''' ('''TDF''') is a data object encoding specification for the purposes of enabling data tagging and cryptographic security features.<ref name="DNI">{{Cite web|url=https://www.dni.gov/index.php/who-we-are/organizations/ic-cio/ic-cio-related-menus/ic-cio-related-links/ic-technical-specifications/trusted-data-format|title = Trusted Data Format}} {{Dead link|date=April 2025}}</ref> These features include [[Logical assertion|assertion]] of data properties or tags, [[Electronic signature|cryptographic binding]] and [[encryption|data encryption]]. The TDF is [[Open-sourcefreely software|openavailable source]]with no restrictions and requires no use of proprietary or patented technology and is thus freeopen for anyone to use.
 
The '''Trusted Data Format''' ('''TDF''') is a data object encoding specification for the purposes of enabling data tagging and cryptographic security features.<ref name="DNI">https://www.dni.gov/index.php/who-we-are/organizations/ic-cio/ic-cio-related-menus/ic-cio-related-links/ic-technical-specifications/trusted-data-format</ref> These features include [[Logical assertion|assertion]] of data properties or tags, [[Electronic signature|cryptographic binding]] and [[encryption|data encryption]]. The TDF is [[Open-source software|open source]] and requires no use of proprietary or patented technology and is thus free for anyone to use.
 
== Overview ==
 
The TDF Specification is based on a '''Trusted Data Object''' ('''TDO''') which can be grouped together into a '''Trusted Data Collection''' ('''TDC''').<ref name="IAD">{{cite web | url=https://semanticommunity.info/@api/deki/files/27730/Lang-TTC_Biometric_BigData_Conf_fl13.pdf | title=Biometrics: Big data, analytics and biometric-enabled intelligence | archive-url=https://web.archive.org/web/20170718145403/https://semanticommunity.info/@api/deki/files/27730/Lang-TTC_Biometric_BigData_Conf_fl13.pdf | archive-date=2017-07-18}} {{Dead link|date=April 2025}}</ref> Each TDO consists of a data payload which can be associated with an unlimited number of metadata objects. The TDO supports the cryptographic binding of the metadata objects to the payload data object.<ref name="IAD"/> In addition, both data and metadata objects can be associated with a block of encryption information which is used by any TDF consumer to decrypt the associated data or metadata if it had been encrypted.<ref name="IAD"/> A TDC allows for additional metadata objects to apply to a set of TDOs.
 
== Implementations ==
Line 35 ⟶ 34:
The [[United States Intelligence Community]] maintains the IC-TDF, which includes government-specific tagging requirements on top of the core TDF capabilities mentioned above, in an XML Data Encoding Specification.
 
The [[United States Department of Defense]] uses TDF to implement the [[Department of Defense Discovery Metadata Specification]] (DDMS).
[[Virtru]] offers client-side email and file encryption based on the TDF.<ref name="VIR">https://www.virtru.com/client-side-encryption</ref>
 
== References ==
Line 42 ⟶ 41:
 
==External links==
* [https://www.dni.gov/index.php/who-we-are/organizations/enterprise-capacity/ic-cio/ic-cio-related-menus/ic-cio-related-links/ic-technical-specifications/trusted-data-format US Office of the Director of National Intelligence website on the TDF Specification]
*[https://www.nytimes.com/2014/07/17/technology/personaltech/ways-to-protect-your-email-after-you-send-it.html?emc=edit_th_20140717&nl=todaysheadlines&nlid=68634180&_r=0 Wood, Mollie, ''Easier Ways to Protect Email From Unwanted Prying Eyes'', New York Times, July 16, 2014 video and article]
 
{{compu-storage-stub}}
 
[[Category:Cryptography standards]]
[[Category:XML-based standards]]
 
 
{{compu-storage-stub}}