[go: up one dir, main page]

Fedrecheski et al., 2020 - Google Patents

Self-sovereign identity for IoT environments: a perspective

Fedrecheski et al., 2020

View PDF
Document ID
2839973857386921634
Author
Fedrecheski G
Rabaey J
Costa L
Ccori P
Pereira W
Zuffo M
Publication year
Publication venue
arXiv preprint arXiv:2003.05106

External Links

Snippet

This paper analyses the concept of Self-Sovereign Identity (SSI), an emerging approach for establishing digital identity, in the context of the Internet of Things (IoT). We contrast existing approaches for identity on the Internet, such as cloud-based accounts and digital certificates …
Continue reading at arxiv.org (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
    • H04L63/0823Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
    • H04L63/0815Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network providing single-sign-on or federations
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/16Implementing security features at a particular protocol layer
    • H04L63/166Implementing security features at a particular protocol layer at the transport layer
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3231Biological data, e.g. fingerprint, voice or retina

Similar Documents

Publication Publication Date Title
Fedrecheski et al. Self-sovereign identity for IoT environments: a perspective
Malik et al. A survey of key bootstrapping protocols based on public key cryptography in the Internet of Things
Braeken Public key versus symmetric key cryptography in client–server authentication protocols
Schanzenbach et al. reclaimID: Secure, self-sovereign identities using name systems and attribute-based encryption
Xue et al. A dynamic secure group sharing framework in public cloud computing
US20210089676A1 (en) Methods and systems for secure data exchange
Pradeep et al. An efficient framework for sharing a file in a secure manner using asymmetric key distribution management in cloud environment
Oktian et al. BorderChain: Blockchain-based access control framework for the Internet of Things endpoint
Bernabe et al. Holistic Privacy-Preserving Identity Management System for the Internet of Things.
Al-Janabi et al. Public-key cryptography enabled kerberos authentication
Tassanaviboon et al. Oauth and abe based authorization in semi-trusted cloud computing: aauth
Fotiou et al. Capabilities-based access control for IoT devices using Verifiable Credentials
Lim et al. On identity-based cryptography and grid computing
Faísca et al. Decentralized semantic identity
Lim et al. A dynamic key infrastructure for GRID
Fotiou et al. Capability-based access control for multi-tenant systems using OAuth 2.0 and Verifiable Credentials
Philipp et al. Daxiot: A decentralized authentication and authorization scheme for dynamic IoT networks
De Vaere et al. Liam: An architectural framework for decentralized IoT networks
Palomar et al. Secure content access and replication in pure p2p networks
Schanzenbach et al. Managing and presenting user attributes over a decentralized secure name system
Rajathi et al. Practical Implementation and Analysis of TLS Client Certificate Authentication
Liu et al. A secure and efficient data sharing framework with delegated capabilities in hybrid cloud
Kumar et al. Security enforcement using PKI in Semantic Web
Nakhuva et al. Security provisioning for RESTful web services in Internet of Things
Zhang NDNFit: An Open mHealth Application Built on Named Data Networking