Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

  1. Share data directly without the need of third party through trusted peer to peer (p2p) connector

  2. Empower the data provider to restrict usage of data by the receiver through usage policies

  3. Publish and discover connectors and usage policies defined according to open standards

  4. Install trusted containerised applications within connector to use in-memory dataEnable farmers to control their data by managing consent using data wallet

  5. Enable organisations to create plugins to make their data discoverable (description of data)

...