Pöhn et al., 2023 - Google Patents
Modeling the threats to self-sovereign identitiesPöhn et al., 2023
View PDF- Document ID
- 4654032362827726022
- Author
- Pöhn D
- Grabatin M
- Hommel W
- Publication year
- Publication venue
- Open Identity Summit 2023
External Links
Snippet
Self-sovereign identity (SSI) is a relatively young identity management paradigm allowing digital identities to be managed in a user-centric, decentralized manner, often but not necessarily utilizing distributed ledger technologies. This emerging technology gets into the …
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to network resources
- H04L63/105—Multiple levels of security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
- H04L63/0823—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to network resources
- H04L63/102—Entity profiles
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/30—Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
- H04W12/08—Access security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/33—User authentication using certificates
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Siriwardena | Advanced API Security | |
US9537857B1 (en) | Distributed password verification | |
Kumar et al. | Exploring security issues and solutions in cloud computing services–a survey | |
Siriwardena | Advanced API security: OAuth 2.0 and beyond | |
Kellezi et al. | Securing Open Banking with Model‐View‐Controller Architecture and OWASP | |
Pöhn et al. | Modeling the threats to self-sovereign identities | |
Dou et al. | Robust insider attacks countermeasure for Hadoop: Design and implementation | |
Patil Madhubala | Survey on security concerns in Cloud computing | |
Taraka Rama Mokshagna Teja et al. | Prevention of phishing attacks using qr code safe authentication | |
Akello et al. | A literature survey of security issues in cloud, fog, and edge IT infrastructure | |
Djeki et al. | Preventive measures for digital learning spaces’ security issues | |
Wilusz et al. | Secure protocols for smart contract based insurance services | |
Bhattacharjee et al. | DigiBlock: Digital Self-sovereign Identity on Distributed Ledger based on Blockchain | |
Rajeh et al. | A novel three-tier SQLi detection and mitigation scheme for cloud environments | |
Pöhn et al. | TaxidMA: towards a taxonomy for attacks related to identities | |
Ang et al. | Unveiling the Covert Vulnerabilities in Multi-Factor Authentication Protocols: A Systematic Review and Security Analysis | |
Kirar et al. | An efficient architecture and algorithm to prevent data leakage in Cloud Computing using multi-tier security approach | |
Prashanth et al. | Smart Contract-based Authorization and Authentication in Cyber security | |
Ghazizadeh et al. | Secure openID authentication model by using trusted computing | |
Cusack et al. | Defining cloud identity security and privacy issues: A Delphi method | |
Rassam et al. | Cloud Database Security Issues and Challenges: A Review | |
Bolourforoush et al. | Security challenges of digital transformation in smart cities: Case of banking sector | |
Kuzminykh et al. | Mechanisms of ensuring security in Keystone service | |
Bansod et al. | Blockchain impact of security and privacy in digital identity management | |
Motawie et al. | Security Problems in Cloud Computing. |