IAP

IAP

Created using Figma
Created using Figma
The open platform for trust and assurance
Token Sale
To be announced
Additional Details
Categories
Platform

About IAP

Platform

The Information Assurance Platform is a trust and assurance platform that is open, decentralised and governed by the community.

It allows applications to leverage the Information Assurance Toolbelt, including CyberTraces, CyberChains, CyberShields and CyberStates, to perform functions such as distributed computation, attestation and verification interactions, validation functions, and related operations surrounding the storage, processing and transmission of information for individuals, organisations (inc. DAOs), companies, NGOs and governments anywhere, while data owners and operators can retain full control over the extent to which information is private.

 

The IAP Token

The IAP is possible thanks to the IAP token. IAP tokens function as a crypto-economic incentive to enable the distributed power, security and scalability of the network. Integral to the operation of the platform and provision of the service, IAP tokens provide the technical glue that bind the components of the system together, enabling seamless, secure and reliable next generation distributed ledger technology services for information assurance.

 

Information Assurance Toolbelt (IAT)

The IAP provides the ability for anyone to create CyberTraces, CyberChains, CyberShields and CyberStates. The platform enables the generation of evidence that assures others of data security and the facts surrounding its storage, transmission and processing. The IAP does this without compromising the privacy of data and retaining data sovereignty rights.

CyberTraces are independently verifiable, trust-free (non reliant on trust), evidence events. They can be used to cut out intermediaries such as trusted third parties and assure the confidentiality, integrity and availability of data, processes and systems. CyberChains create chains of evidence by tying together CyberTraces in a way that maintains Chain of Custody (CoC) for verifying parties such as auditors, assessors, central authorities, supply chains or other interested parties. CyberShield is a computational tool that assures the computational integrity of the functionality of the tools within the IAP. They use a variety of zero knowledge proofs to provide the ability for independent verification of tool output while maintaining privacy and confidentiality of the work. CyberStates report on the internal state of any device. The state is represented by a data stream or file or collection of files that exist within the device, providing a distributed file integrity monitoring capability that is also authenticated, decentralised, reliable, and accessible globally.

Features

Why IAP?

- The IAP is a decentralised platform for Information Assurance, which includes Information Security and Cybersecurity.

- Team of over 20 experts in the fields of Information Assurance, Cybersecurity, GRC, Artificial Intelligence and Academia.

- IAP core includes multiple public blockchains for enhanced, transparent trust and security.

- IAP chains enables massively distributed secure and assured computing and data verification interactions with Evidence Chains.

- Tried and tested cryptography with modern applications of existing cryptographic primitives for IA.

- IAP tokens provide security, scalability and crypto-economic incentives for ethical network operations.

Activity

Activity:
6
VERY LOW
Posts:
4
VERY LOW
Views:
95
VERY LOW
Followers:
71
VERY LOW
Tweets:
10
VERY LOW
30 Days Growth:
5
Members:
177
VERY LOW
30 Days Growth:
11
Alexa

Rank:
8 814 802
VERY LOW
Delta:
1 749 655
Year commits:
728
Watchers:
18
Stars:
0
Forks:
1
Open issues:
0

IAP Team

Verified 0%

Attention. There is a risk that unverified members are not actually members of the team

William Vacher
Cybersecurity
unverified
Tony Woodhouse
Engineering
unverified
Steve Franks
Frm Group CTO, Telenor
unverified
Christopher Mosby
Cybersecurity, GRC
unverified
John Cattral
Blockchain Architect
unverified
Philipp Wiendl
DevSecOps
unverified
Dr. Angel-Carlos Rom...
Artificial Intelligence
unverified
Marc M.
Big Data Developer
unverified
Wisaroot Panti
Cybersecurity
unverified
Amit Kannaujiya
Information Security, GRC
unverified
Nemanja Djordjevic
Design & UX
unverified
Tanazith Kowsurat
Esq, Legal Counsel
unverified
Robin Ankele
Head of Cryptography
unverified
Angela Robinson
Senior Cryptography Writer
unverified
Jenisa Limpanilchart
Community Manager
unverified

Advisors

Verified 0%

Attention. There is a risk that unverified members are not actually members of the team

Chris Doerfler
Blockchain Advisor
unverified
Benjamin Martin
Public Sector Advisor
unverified
Simon Gibbons
COO ICR 360, Digital Forensics
unverified
David Langer
Business Advisor
unverified
Tahmeed Rab
Kaizen Cybersecurity
unverified
Thomas Fisher, EDU a...
Frm Scotland Yard SCD 9 & R.E.
unverified
William Bautista
Frm. Cisco Senior Security Engineer
unverified
Patrick Dougherty
Mathematics
unverified
Paul Warren
Data Science
unverified
Paul Ashburn
Co-Managing Partner, BDO
unverified
Jeff Hall
PCI Guru
unverified
Terry Blackburn
CEO, Ensign Media
unverified
Dr. Stephen Boulter,...
Professor of Ethics, Oxford Brookes
unverified

IAP Last News

N/A
5.0 18
ICO Profile Vision Activity Potential Product Team

IAP Reviews

GAGARIN
Read More
  • Because there may be time differences in information updates, accurate information about each ICO project should be verified through its official website or other communication channels.
  • This information is not a suggestion or advice on investing in ICO funding. Please thoroughly investigate the relevant information yourself and decide on ICO participation.
  • If you think there are issues or problems to be corrected on this content, or if you would like to submit your own ICO project to be listed, Please email us.
Please read the disclaimer and risk warning. Show disclaimer and risk warning.
Planning an ICO? We can help with a wide range of support for all stages of your ICO