<-Architecture       Go to ToC    Data Conventions ->

1. Identity Requirements

Requirement Description
Identity Uniqueness A Process Instance shall have a unique Cryptographic Instance Identity (CII).
Identity Verifiability The CII shall be verifiable using public‑key cryptography.
Identity Binding The CII shall be bound to an Instance Credential issued by a trusted Trust Anchor.
Identity Freshness A Process Instance shall present identity information that is valid at the time of trust establishment.
Identity Non‑Repudiation A Process Instance shall be able to prove possession of the private key corresponding to its CII.

2. Credential Requirements

Requirement Description
Credential Authenticity Instance Credentials shall be signed by a Trust Anchor or an authorised Credential Issuer.
Credential Integrity Instance Credentials shall be protected against modification.
Credential Validity Instance Credentials shall include validity periods and shall be rejected if expired.
Credential Revocation A Process Instance shall support mechanisms to detect revoked credentials.
Credential Attribute Trust Attributes included in Instance Credentials shall be verifiable and relevant to trust evaluation.

3. Evidence Requirements

Requirement Description
Evidence Typing Attestation Evidence shall consist of Evidence Items typed according to the Security Evidence Taxonomy.
Evidence Authenticity Evidence shall be signed or otherwise verifiable when required by the Policy Binding.
Evidence Freshness Evidence shall include timestamps or equivalent freshness indicators.
Evidence Completeness A Process Instance shall provide all Evidence Items required by the Policy Binding.
Evidence Non‑Equivocation A Process Instance shall not provide contradictory evidence within a single trust establishment session.

4. Policy Requirements

Requirement Description
Policy Transparency A Process Instance shall make available the Policy Binding it applies to incoming TrustRequests.
Policy Consistency A Process Instance shall apply the same Policy Binding to all TrustRequests within a defined context.
Policy Expressiveness Policy Bindings shall be able to specify required Trust Anchors, algorithms, evidence types, and validity constraints.
Policy Integrity Policy Bindings shall be protected against unauthorised modification.
Policy Independence A Process Instance shall not rely on implicit trust; all trust conditions shall be explicitly defined in the Policy Binding.

5. Verification Requirements

Requirement Description
Verification Pipeline Execution A Process Instance shall apply the Verification Pipeline to every TrustRequest or TrustResponse.
Schema Validation All received identity, credential, and evidence structures shall be validated against their schemas.
Cryptographic Verification Signatures on credentials and evidence shall be verified using approved algorithms.
Policy Evaluation A Process Instance shall evaluate all received information against its Policy Binding.
Deterministic Trust Decision The Verification Pipeline shall produce a deterministic Trust Decision (accept, reject, conditional).

<-Architecture       Go to ToC    Data Conventions ->