<- Go to Data Types Go to ToC

1. Definition 2. Functional Requirements 3. Syntax 4. Semantics

1 Definition

.

2 Functional Requirements

3 Syntax

https://schemas.mpai.community/AIF/V3.0/data/Security.json

4 Semantics

Label Description
Identity Identifies allowed types of identity credentials.
– AIF-SEC-ID-X509 X.509 certificate–based identity credential.
– AIF-SEC-ID-DID W3C DID–based identity credential.
– AIF-SEC-ID-PSK Pre‑shared key–based identity credential.
– AIF-SEC-ID-CUSTOM Implementation‑specific identity credential type.
Authentication Identifies allowed forms of authentication evidence.
– AIF-SEC-AUTH-JWS JWS‑based authentication evidence.
– AIF-SEC-AUTH-JWT JWT‑based authentication evidence.
– AIF-SEC-AUTH-CWT CWT‑based authentication evidence.
– AIF-SEC-AUTH-SIGNED-NONCE Authentication via a signed nonce.
– AIF-SEC-AUTH-MTLS Authentication via mutual TLS.
– AIF-SEC-AUTH-CUSTOM Implementation‑specific authentication method.
Authorization Identifies allowed types of authorization evidence.
– AIF-SEC-AUTHZ-OPA Authorization based on an OPA (Open Policy Agent) decision.
– AIF-SEC-AUTHZ-XACML Authorization based on an XACML decision.
– AIF-SEC-AUTHZ-CUSTOM Implementation‑specific authorization mechanism.
Integrity Identifies allowed forms of integrity evidence.
– AIF-SEC-HASH-SHA256 Hash integrity using SHA‑256.
– AIF-SEC-HASH-SHA384 Hash integrity using SHA‑384.
– AIF-SEC-HASH-SHA512 Hash integrity using SHA‑512.
– AIF-SEC-HASH-BLAKE3 Hash integrity using BLAKE3.
– AIF-SEC-SIG-ED25519 Integrity via Ed25519 digital signature.
– AIF-SEC-SIG-RSA-PSS-SHA256 Integrity via RSA‑PSS with SHA‑256.
– AIF-SEC-SIG-ECDSA-P256-SHA256 Integrity via ECDSA P‑256 with SHA‑256.
– AIF-SEC-INTEGRITY-CUSTOM Implementation‑specific integrity method.
Confidentiality Identifies allowed confidentiality protection methods.
– AIF-SEC-ENC-AES-GCM Confidentiality via AES‑GCM encryption.
– AIF-SEC-ENC-CHACHA20-POLY1305 Confidentiality via ChaCha20‑Poly1305.
– AIF-SEC-ENC-RSA-OAEP Confidentiality via RSA‑OAEP encryption.
– AIF-SEC-ENC-CUSTOM Implementation‑specific confidentiality method.
Freshness Identifies allowed freshness and anti‑replay mechanisms.
– AIF-SEC-FRESH-NONCE Freshness via nonces.
– AIF-SEC-FRESH-SEQUENCE Freshness via sequence numbers.
– AIF-SEC-FRESH-SIGNED-TIME Freshness via signed timestamps.
– AIF-SEC-FRESH-CUSTOM Implementation‑specific freshness mechanism.
Attestation Identifies allowed attestation mechanisms.
– AIF-SEC-ATTEST-TPM TPM‑based attestation.
– AIF-SEC-ATTEST-SGX Intel SGX attestation.
– AIF-SEC-ATTEST-SEV AMD SEV attestation.
– AIF-SEC-ATTEST-TEE Generic TEE attestation.
– AIF-SEC-ATTEST-CUSTOM Implementation‑specific attestation mechanism.
Audit Identifies allowed auditability‑related evidence types.
– AIF-SEC-AUDIT-MERKLE Merkle‑tree‑based audit evidence.
– AIF-SEC-AUDIT-CHAIN Hash‑chain‑based audit evidence.
– AIF-SEC-AUDIT-TAMPER-EVIDENT Tamper‑evident audit evidence.
– AIF-SEC-AUDIT-CUSTOM Implementation‑specific audit evidence.

<- Go to Data Types    Go to ToC