Blockchain-based verifiable credential sharing with selective disclosure
Sharing credentials could raise privacy concerns. For digital credentials to be widely
accepted, there is a need for an end-to-end system that provides (i) secure verification of the …
accepted, there is a need for an end-to-end system that provides (i) secure verification of the …
Federated identity management systems: A privacy-based characterization
E Birrell, FB Schneider - IEEE security & privacy, 2013 - ieeexplore.ieee.org
Identity management systems store attributes associated with users and employ these
attributes to facilitate authorization. The authors analyze existing systems and describe a …
attributes to facilitate authorization. The authors analyze existing systems and describe a …
Capabilities-based access control for IoT devices using Verifiable Credentials
Capabilities-based access control is a promising paradigm that can handle the
particularities of IoT systems. Nevertheless, existing systems are not interoperable and they …
particularities of IoT systems. Nevertheless, existing systems are not interoperable and they …
Decentralized identity with applications to security and privacy for the internet of things
CDN Kyriakidou, AM Papathanasiou… - Computer Networks …, 2023 - ojs.wiserpub.com
Decentralized Identity (dID) has brought to the forefront the advantages and importance of
total user control over identity. Previous solutions delegate identity management to the …
total user control over identity. Previous solutions delegate identity management to the …
Personal clouds: Sharing and integrating networked resources to enhance end user experiences
M Jang, K Schwan, K Bhardwaj… - … -IEEE Conference on …, 2014 - ieeexplore.ieee.org
End user experiences on mobile devices with their rich sets of sensors are constrained by
limited device battery lives and restricted form factors, as well as by thescope'of the data …
limited device battery lives and restricted form factors, as well as by thescope'of the data …
[HTML][HTML] A verifiable credentials system with privacy-preserving based on blockchain
Z Li - Journal of Information Security, 2022 - scirp.org
Decentralized identity authentication is generally based on blockchain, with the protection of
user privacy as the core appeal. But traditional decentralized credential system requires …
user privacy as the core appeal. But traditional decentralized credential system requires …
Requirements and secure serialization for selective disclosure verifiable credentials
V Kalos, GC Polyzos - IFIP International Conference on ICT Systems …, 2022 - Springer
The emergence of the Verifiable Credentials recommendation from W3C allows the
adoption of credential systems in a much wider range of user-centric applications and use …
adoption of credential systems in a much wider range of user-centric applications and use …
Capability-based access control for multi-tenant systems using OAuth 2.0 and Verifiable Credentials
We propose a capability-based access control technique for sharing Web resources, based
on Verifiable Credentials (VCs) and OAuth 2.0. VCs are a secure means for expressing …
on Verifiable Credentials (VCs) and OAuth 2.0. VCs are a secure means for expressing …
[PDF][PDF] A patient-centric, attribute-based, source-verifiable framework for health record sharing
The storage of health records in electronic format, and the wide-spread sharing of these
records among different health care providers, have enormous potential benefits to the US …
records among different health care providers, have enormous potential benefits to the US …
Attributetrust a framework for evaluating trust in aggregated attributes via a reputation system
To enable a rich attribute-based authorization system, it is desirable that a large number of
user attributes are available, possibly provided by multiple entities. The user may be …
user attributes are available, possibly provided by multiple entities. The user may be …