9 Hits in 10.6 sec

A Tutorial on the Interoperability of Self-sovereign Identities [article]

Hakan Yildiz and Axel Küpper and Dirk Thatmann and Sebastian Göndör and Patrick Herbke
2022 arXiv   pre-print
Self-sovereign identity is the latest digital identity paradigm that allows users, organizations, and things to manage identity in a decentralized fashion without any central authority controlling the  ...  In the context of this tutorial, we create a definition of interoperability of self-sovereign identities to enable a common understanding.  ...  Longley, Tobias Looker, Orie Steele, Manu Sporny, along with many other writers and countless editors who contributed so much to the SSI community.  ... 
arXiv:2208.04692v1 fatcat:cdtbwnspnvagjondvlc2nbdkni

eID and Self-Sovereign Identity Usage: An Overview

Daniela Pöhn, Michael Grabatin, Wolfgang Hommel
2021 Electronics  
The introduction of self-sovereign identity (SSI) for e-government systems can strengthen the privacy of the citizens while enabling identification also for the weakest.  ...  These are based on traditional identity management systems, which suffer from weaknesses, such as the reliance on a central entity to provide the identity data and the lack of control of the user over  ...  A privacy-preserving decentralized eID derivation for SSI [50] is another approach that needs to be taken into account.  ... 
doi:10.3390/electronics10222811 fatcat:dyobhgfdizckpp7ewwrhvxfkby

Open Identity Summit 2021 - Complete Volume

2021 Open Identity Summit  
We propose tackling this information using identity management functions and perform a systematic gap analysis based on the FIDIS typology of identity management systems.  ...  While it has been noted in earlier work that data governance is central for the successful operation of a data lake, and that privacy is a central issue in such a setting as personal information may be  ...  Adapting the TPL Trust Policy Language for a Self-Sovereign Identity World 117 We thank and acknowledge the Baden-Württemberg Stiftung for financing the DAMA DAMA -A transparent meta-assistant for data  ... 
dblp:conf/openidentity/X21 fatcat:o54xtce6rneehgbbpsr3vasvvq

Open Identity Summit 2020

2020 Open Identity Summit  
Registration, credential issuance and deployment of digital identities are then bound to the chosen technology.What happens if that technology is disrupted?  ...  Organizations relyonone speciĄc IdM technology chosen to Ąt acertain context.  ...  forces with Sovrin to build self-sovereign identity and authentication mechanism.  ... 
dblp:conf/openidentity/X20 fatcat:ls26vmy7yveqzfzphbizad6kxi

Open Identity Summit 2022

Heiko Roßnagel, Christian Heinrich Schunck
For this purpose, a series of experiments with small, mobile thermal cameras were carried out.  ...  Heat transfer from human fingers to keypads is an additional attack channel that has been demonstrated. There are few mitigation measures published against this type of attack.  ...  They encouraged us to hold further discussions and provided us with advice about our implementation of client policies. Bibliography  ... 
doi:10.24406/h-418525 fatcat:dtornebchra63jwbxqu2oazqvi

D3.1 – TheFSM Open Reference Architecture

Danai Vergeti, Iosif Angelidis, Dimitris Ntalaperas
2021 Zenodo  
For each component, the platform functionalities that are undertaken by this component are described and the component's interactions with the rest of the components for the realisation of these functionalities  ...  The purpose of the deliverable D3.1 "TheFSM Open Reference Architecture" is to deliver the second version of the conceptual architecture of the TheFSM platform.  ...  A popular in-browser example is Metamask -eID wallets, which are designed to extend the functionality to securely store credentials according to the European Self-Sovereign Identity Framework.  ... 
doi:10.5281/zenodo.5074927 fatcat:osv6pgucdvbphh43cooonngz6q

The Review of Non-Technical Assumptions in Digital Identity Architectures

Anar Bazarhanova, Kari Smolander
2020 Proceedings of the 53rd Hawaii International Conference on System Sciences   unpublished
User-centric and self-sovereign identity are thought to be next phases of Internet identity development after FIM (Allen, 2016) .  ...  The search string used was as follows: ((digital OR electronic OR online OR federated OR self-sovereign OR user-managed) AND identity architecture).  ... 
doi:10.24251/hicss.2020.785 fatcat:l7k54t6lzfa43g5gl3hyr3fii4

ILLAC - an indoor localization framework for location-aware access control in fog-computing based IoT environments

Kaspar Lebloch
2019 unpublished
Nachdem besonders im Kontext von IoT oft höchstsensible Daten behandelt werden, sind die Anforderungen an die Sicherheit solcher Systeme außerordentlich hoch.  ...  To confirm the identity of an eid beacon a Cloud API is provided, reintroducing a dependency on internet connectivity and thus preventing pure offline operation.  ...  The user, as self-sovereign platform operator is a target of minimal value for an attacker in the first place, compared to a Cloud platform with potentially millions of users.  ... 
doi:10.25365/thesis.58339 fatcat:szsh53tjrzg7nmyyndqnad2aoi

Effective and Practical Improvements to the Web Public-Key Infrastructure

Stephanos Matsumoto
In CAPS, I use twoglobal monitoring and logging systems, CT and Censys, to build a system that strengthens the existing PKI againstmisbehaving CAs and enables the secure incremental deployment of new and  ...  The Web public-key infrastructure (PKI) provides a mechanism to identify websites to end users for the purposes of encrypted communication.  ...  own name, 2. privacy with respect to other users of the same identity provider, and 3. privacy with respect to how many users a provider has.  ... 
doi:10.1184/r1/7808495.v1 fatcat:mpx4ja4t2neb7eotyykbxrl4z4