Fedrecheski et al., 2020 - Google Patents
Self-sovereign identity for IoT environments: a perspectiveFedrecheski et al., 2020
View PDF- Document ID
- 2839973857386921634
- Author
- Fedrecheski G
- Rabaey J
- Costa L
- Ccori P
- Pereira W
- Zuffo M
- Publication year
- Publication venue
- arXiv preprint arXiv:2003.05106
External Links
Snippet
This paper analyses the concept of Self-Sovereign Identity (SSI), an emerging approach for establishing digital identity, in the context of the Internet of Things (IoT). We contrast existing approaches for identity on the Internet, such as cloud-based accounts and digital certificates …
- 238000004891 communication 0 description 5
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
- H04L63/0823—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
- H04L63/0815—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network providing single-sign-on or federations
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/16—Implementing security features at a particular protocol layer
- H04L63/166—Implementing security features at a particular protocol layer at the transport layer
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
- H04L9/3231—Biological data, e.g. fingerprint, voice or retina
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Fedrecheski et al. | Self-sovereign identity for IoT environments: a perspective | |
Malik et al. | A survey of key bootstrapping protocols based on public key cryptography in the Internet of Things | |
Braeken | Public key versus symmetric key cryptography in client–server authentication protocols | |
Schanzenbach et al. | reclaimID: Secure, self-sovereign identities using name systems and attribute-based encryption | |
Xue et al. | A dynamic secure group sharing framework in public cloud computing | |
US20210089676A1 (en) | Methods and systems for secure data exchange | |
Pradeep et al. | An efficient framework for sharing a file in a secure manner using asymmetric key distribution management in cloud environment | |
Oktian et al. | BorderChain: Blockchain-based access control framework for the Internet of Things endpoint | |
Bernabe et al. | Holistic Privacy-Preserving Identity Management System for the Internet of Things. | |
Al-Janabi et al. | Public-key cryptography enabled kerberos authentication | |
Tassanaviboon et al. | Oauth and abe based authorization in semi-trusted cloud computing: aauth | |
Fotiou et al. | Capabilities-based access control for IoT devices using Verifiable Credentials | |
Lim et al. | On identity-based cryptography and grid computing | |
Faísca et al. | Decentralized semantic identity | |
Lim et al. | A dynamic key infrastructure for GRID | |
Fotiou et al. | Capability-based access control for multi-tenant systems using OAuth 2.0 and Verifiable Credentials | |
Philipp et al. | Daxiot: A decentralized authentication and authorization scheme for dynamic IoT networks | |
De Vaere et al. | Liam: An architectural framework for decentralized IoT networks | |
Palomar et al. | Secure content access and replication in pure p2p networks | |
Schanzenbach et al. | Managing and presenting user attributes over a decentralized secure name system | |
Rajathi et al. | Practical Implementation and Analysis of TLS Client Certificate Authentication | |
Liu et al. | A secure and efficient data sharing framework with delegated capabilities in hybrid cloud | |
Kumar et al. | Security enforcement using PKI in Semantic Web | |
Nakhuva et al. | Security provisioning for RESTful web services in Internet of Things | |
Zhang | NDNFit: An Open mHealth Application Built on Named Data Networking |