Survey on digital sovereignty and identity: from digitization to digitalization

KL Tan, CH Chi, KY Lam - ACM Computing Surveys, 2023 - dl.acm.org
Through digital transformation, lots of personal data are captured, but individuals often do
not have ownership or control over them. This results in the emerging Web 3.0, where …

Decentralized identity systems: Architecture, challenges, solutions and future directions

O Dib, B Rababah - Annals of Emerging Technologies in …, 2020 - aetic.theiaer.org
Due to the exponential rise of the Internet in the last two decades, the digital presence has
seen an enormous increase. Today, billions of people, devices and objects are digitally …

Compliance SSI System property set to laws, regulations, and technical standards

C Pattiyanon, T Aoki - IEEE Access, 2022 - ieeexplore.ieee.org
Digital identities, including names and age, provide modern information systems with
valuable data. Identity management is a security feature that enables users to manage and …

A Systematic Literature Mapping on Using Blockchain Technology in Identity Management

TTT Ngo, TA Dang, VV Huynh, TC Le - IEEE Access, 2023 - ieeexplore.ieee.org
Although blockchain is an emerging technology, it has been applied in a lot of domains by
leveraging its features. Traditional identity management systems have many issues …

[PDF][PDF] Bcert–a decentralized academic certificate system distribution using blockchain technology

E Leka, B Selimi - … Journal on Information Technologies & Security, 2020 - researchgate.net
In this paper we propose to use a blockchain based system, called BCert, which is used to
store, distribute and verify academic certificates in order to improve efficiency and security …

Modbus access control system based on SSI over hyperledger fabric blockchain

S Figueroa-Lorenzo, J Añorga Benito, S Arrizabalaga - Sensors, 2021 - mdpi.com
Security is the main challenge of the Modbus IIoT protocol. The systems designed to provide
security involve solutions that manage identity based on a centralized approach by …

On using zk-SNARKs and zk-STARKs in blockchain-based identity management

AE Panait, RF Olimid - … Security Solutions for Information Technology and …, 2021 - Springer
One possible applicability of blockchain technology is in identity management. Especially for
public blockchains, the need to reduce (ideally to zero) the exposure of sensitive …

Distributed identity and verifiable claims using Ethereum standards

AM Thomas, R Ramaguru… - … : Proceedings of ICICCT …, 2022 - Springer
Identity management is an inevitable part of the proper delivery of schemes and services to
individuals by the government and private organizations. Identity management …

Know Your Customer: Balancing innovation and regulation for financial inclusion

K Elliott, K Coopamootoo, E Curran, P Ezhilchelvan… - Data & Policy, 2022 - cambridge.org
Financial inclusion depends on providing adjusted services for citizens with disclosed
vulnerabilities. At the same time, the financial industry needs to adhere to a strict regulatory …

Permissionless Blockchain-Based Sybil-Resistant Self-Sovereign Identity Utilizing Attested Execution Secure Processors

K Moriyama, A Otsuka - 2022 IEEE International Conference on …, 2022 - ieeexplore.ieee.org
The current circumstance that requires people more online has encouraged us to address
digital identity preserving privacy. There is a momentum of research addressing Self …