Content deleted Content added
Added reference to DNI TDF page. |
punctuation and link |
||
Line 29:
== Overview ==
The TDF Specification is based on a '''Trusted Data Object''' ('''TDO''') which can be grouped together into a '''Trusted Data Collection''' ('''TDC''').<ref name="IAD">http://semanticommunity.info/@api/deki/files/27730/Lang-TTC_Biometric_BigData_Conf_fl13.pdf</ref> Each TDO consists of a data payload which can be associated with an unlimited number of metadata objects. The TDO supports the cryptographic binding of the metadata objects to the payload data object.<ref name="IAD"/> In addition, both data and metadata objects can be associated with a block of encryption information which is used by any TDF consumer to decrypt the associated data or metadata if it had been encrypted.<ref name="IAD"/> A TDC allows for additional metadata objects to apply to a set of
== Implementations ==
Line 41:
==External links==
*[http://www.dni.gov/index.php/about/organization/chief-information-officer/trusted-data-format US Office of the Director of National Intelligence website on the TDF Specification]
*[http://www.nytimes.com/2014/07/17/technology/personaltech/ways-to-protect-your-email-after-you-send-it.html?emc=edit_th_20140717&nl=todaysheadlines&nlid=68634180&_r=0 Wood, Mollie, ''Easier Ways to Protect Email From Unwanted Prying Eyes'', New York Times, July 16, 2014 video and article]
{{compu-storage-stub}}
|