diff --git a/index.html b/index.html index dea00c1..beac9ea 100644 --- a/index.html +++ b/index.html @@ -226,7 +226,7 @@ restrictRefs, window.respecVc.createVcExamples ], - xref: ["INFRA", "MIMESNIFF", "VC-DATA-MODEL-2.0", "CONTROLLER-DOCUMENT"], + xref: ["INFRA", "MIMESNIFF", "VC-DATA-MODEL-2.0", "CID-1.0"], otherLinks: [{ key: "Related Specifications", data: [{ @@ -618,11 +618,11 @@
An expression of the relationship between the [=subject=] and a [=verification method=]. An example of a verification relationship is -authentication. +authentication.
@@ -763,7 +763,7 @@JSON-LD context authors are expected to add `digestMultibase` to contexts that @@ -1259,7 +1259,7 @@
Beyond the security terms defined by this specification, the https://w3id.org/security# namespace -also includes the terms defined in the [[[CONTROLLER-DOCUMENT]]] [[CONTROLLER-DOCUMENT]] +also includes the terms defined in the [[[CID-1.0]]] [[CID-1.0]] specification, with the corresponding mappings in the context files listed above.
@@ -1641,11 +1641,11 @@Finally, implementers are also urged to understand that there is a difference between the revocation information associated with a [=verifiable credential=], -and the revocation -and expiration times +and the revocation +and expiration times for a [=verification method=]. The -revocation and -expiration times for a +revocation and +expiration times for a [=verification method=] are expressed using the `revocation` and `expires` properties, respectively; are related to events such as a [=secret key=] being compromised or expiring; and can provide timing information which might reveal @@ -2874,10 +2874,10 @@
Implementers ensure that a [=verification method=] is bound to a particular controller by going from the definition of the [=verification method=] to the -[=controller document=], and then ensuring that the [=controller document=] also +[=controlled identifier document=], and then ensuring that the [=controlled identifier document=] also contains a reference to the [=verification method=]. This process is described in the algorithm for - + retrieving a verification method.
@@ -2888,15 +2888,15 @@When an implementation is verifying a proof, it is imperative that it verify not only that the [=verification method=] used to -generate the proof is listed in the [=controller document=], but also that it +generate the proof is listed in the [=controlled identifier document=], but also that it was intended to be used to generate the proof that is being verified. This process is known as "verification relationship validation".
The process of validating a verification relationship is outlined in Section - -3.3 Retrieve Verification Method of the [[[CONTROLLER-DOCUMENT]]] + +3.3 Retrieve Verification Method of the [[[CID-1.0]]] specification.
@@ -3507,7 +3507,7 @@