[go: up one dir, main page]

Pöhn et al., 2023 - Google Patents

Modeling the threats to self-sovereign identities

Pöhn et al., 2023

View PDF
Document ID
4654032362827726022
Author
Pöhn D
Grabatin M
Hommel W
Publication year
Publication venue
Open Identity Summit 2023

External Links

Snippet

Self-sovereign identity (SSI) is a relatively young identity management paradigm allowing digital identities to be managed in a user-centric, decentralized manner, often but not necessarily utilizing distributed ledger technologies. This emerging technology gets into the …
Continue reading at dl.gi.de (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to network resources
    • H04L63/105Multiple levels of security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
    • H04L63/0823Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to network resources
    • H04L63/102Entity profiles
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/30Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
    • H04W12/08Access security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
    • H04W12/06Authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/33User authentication using certificates

Similar Documents

Publication Publication Date Title
Siriwardena Advanced API Security
US9537857B1 (en) Distributed password verification
Kumar et al. Exploring security issues and solutions in cloud computing services–a survey
Siriwardena Advanced API security: OAuth 2.0 and beyond
Kellezi et al. Securing Open Banking with Model‐View‐Controller Architecture and OWASP
Pöhn et al. Modeling the threats to self-sovereign identities
Dou et al. Robust insider attacks countermeasure for Hadoop: Design and implementation
Patil Madhubala Survey on security concerns in Cloud computing
Taraka Rama Mokshagna Teja et al. Prevention of phishing attacks using qr code safe authentication
Akello et al. A literature survey of security issues in cloud, fog, and edge IT infrastructure
Djeki et al. Preventive measures for digital learning spaces’ security issues
Wilusz et al. Secure protocols for smart contract based insurance services
Bhattacharjee et al. DigiBlock: Digital Self-sovereign Identity on Distributed Ledger based on Blockchain
Rajeh et al. A novel three-tier SQLi detection and mitigation scheme for cloud environments
Pöhn et al. TaxidMA: towards a taxonomy for attacks related to identities
Ang et al. Unveiling the Covert Vulnerabilities in Multi-Factor Authentication Protocols: A Systematic Review and Security Analysis
Kirar et al. An efficient architecture and algorithm to prevent data leakage in Cloud Computing using multi-tier security approach
Prashanth et al. Smart Contract-based Authorization and Authentication in Cyber security
Ghazizadeh et al. Secure openID authentication model by using trusted computing
Cusack et al. Defining cloud identity security and privacy issues: A Delphi method
Rassam et al. Cloud Database Security Issues and Challenges: A Review
Bolourforoush et al. Security challenges of digital transformation in smart cities: Case of banking sector
Kuzminykh et al. Mechanisms of ensuring security in Keystone service
Bansod et al. Blockchain impact of security and privacy in digital identity management
Motawie et al. Security Problems in Cloud Computing.