Auflistung P350 - Open Identity Summit 2024 nach Erscheinungsdatum
1 - 10 von 20
Treffer pro Seite
Sortieroptionen
- KonferenzbeitragEconomically Viable Identity Ecosystems: Value Capture and Market Strategies(Open Identity Summit 2024, 2024) Kubach, Michael; Roßnagel, HeikoPrevailing digital identity solutions are facing widespread dissatisfaction, prompting political and business stakeholders to advocate for the development of novel identity (ID) ecosystems. This paper diverges from the traditional focus on the usability, security, and privacy shortcomings of current solutions, directing attention instead to the economic dimensions that are critical for the successful adoption of digital identity management (IdM) systems. The analysis extends beyond the incentives for end-user adoption, considering the roles, motivations, and ability of other key stakeholders to capture value through the ecosystem, particularly service providers, who are anticipated to be the primary financial contributors to ID services. This examination leads to the pivotal inquiry of whether a market for digital identities can materialize and what strategies for market entry could be viable, especially in scenarios involving public sector participation.
- KonferenzbeitragSecure Industrial Device Wallet(Open Identity Summit 2024, 2024) Kumari, Ankita; Aghaie, Anita; Passarelli, Anne; Papagudi Subrahmanyam, Niranjana; Maftun, AlizaIndustry 4.0 integrates technologies such as blockchain, self-sovereign identities, digital twins etc. within industrial environments. A key feature within such industrial advancements is the use of wallets that can facilitate the secure digitalization of industrial operations and the expansion of systems. This paper puts forth the idea of a secure industrial device wallet, that is robustly bound to the device and serves as a hardware trust anchor within self-sovereign identity architectures. The paper introduces and evaluates different approaches to achieve this binding and provides a proof of concept to prevent device counterfeit attacks.
- KonferenzbeitragFulfilling Principles of Self-Sovereign Identity: Towards a Conformity Assessment Approach for Human Wallets(Open Identity Summit 2024, 2024) Doege, Dustin; Bochnia, Ricardo; Anke, JürgenSelf-Sovereign Identity (SSI) represents a paradigm shift toward user-centric digital identity management by emphasizing principles such as user control and privacy. However, there is a notable gap in assessing how these principles are implemented within existing SSI products despite the ongoing research interest in the theoretical principles of SSI. Our research introduces a structured conformity assessment approach to bridge the gap between theoretical ideals and practical implementation. This approach enables the assessment of SSI products based on fulfilling requirements derived from SSI principles. This provides developers and policymakers with a tool to assess the adherence of SSI products to the fundamental principles. Thus, it may serve developers as a design guideline and policymakers as a basis for certification processes.
- KonferenzbeitragMINERVA: Secure Collaborative Machine Tool Data Utilization Leveraging Confidentiality-Protecting Technologies(Open Identity Summit 2024, 2024) Ludwig, Andy; Heinl, Michael P.; Giehl, AlexanderThe digitization of shop floors opens up opportunities for innovative applications and business models due to the vast amount of generated data. However, a lot of this potential is currently not utilized because companies consider the risk of data sharing as too high compared to the corresponding benefit. Focusing on the machine tool sector, the research project MINERVA addresses these concerns by experimentally repurposing privacy-enhancing technologies as confidentialityprotecting technologies and applying them to the use case of condition monitoring to protect intellectual property and other information deemed critical by machine tool operators. Thereby, MINERVA’s goal is to reduce the risk of data sharing and support the establishment of data-driven business models in the machine tool sector in the long term.
- KonferenzbeitragGRAIN: Truly Privacy-friendly and Self-sovereign Trust Establishment with GNS and TRAIN(Open Identity Summit 2024, 2024) Schanzenbach, Martin; Nadler, Sebastian; Johnson Jeyakumar, Isaac HendersonRobust and secure trust establishment is an open problem in the domain of self-sovereign identities (SSI). The TRAIN [KR21] concept proposes to leverage the security guarantees and trust anchor of the DNS to publish and resolve pointers to trust lists from DNS. While the DNS is a corner stone of the Internet, its continued use is primarily a consequence of inertia due to its crucial function as the address discovery system for existing Internet services. Research and development in the area of SSI is — for the most part — green field. The choice of DNS as a core building block appears fainthearted given its open security issues. Recently, the IETF paved the way to experiment with alternative name systems in real world deployments by reserving the special-use top-level domain “.alt” in the domain name space [KH23]. This allows us to use alternative name systems such as the GNU Name System (GNS) [SGF23a] without intruding into the domain name space reserved for DNS. In this paper, we show how we can use the GNS as a drop-in replacement for DNS in TRAIN. We show how TRAIN-over-GNS (GRAIN) can deliver security and privacy improvements the security concept of TRAIN-over DNS and show that it is practically feasible with limited modifications of existing software stacks.
- KonferenzbeitragQualified Ledgers – Breakthrough for proven security and legal trust in DLT through eIDAS2 Regulation?(Open Identity Summit 2024, 2024) Alamillo, Ignacio; Schwalm, Steffen; Stoecker, Carsten; Thiermann, RickyeIDAS 2.0 as a legal and technical framework for trustworthy, decentralized identities in conjunction with the EU digital wallet and various trust services could lead to a rise in distributed ledger technologies (DLT) and European Blockchain Services and Infrastructure (EBSI). A variety of possible uses of distributed ledger technologies in conjunction with the EU digital wallet under the regulatory requirements of eIDAS 2.0 are conceivable and could also lead to broader use of EBSI with the qualified trust service for electronic ledgers.
- KonferenzbeitragStrengthen Digital Sovereignty of Smartphone Users: Evaluation Results of a Tailored Analysis Tool for App Behavior(Open Identity Summit 2024, 2024) Döbelt, Susen; Lange, DominikA usable analysis tool that provides information on risky app behavior and offers options for action, can contribute to strengthen the digital sovereignty of smartphone app users. To this end, it should be tailored and meet the requirements of a human-centered design. Therefore, we conducted a lab test with N = 38 participants. They evaluated a prototype of our analysis tool in terms of its usability, transparency and potential to increase self-efficacy for data protection and privacy preservation. Furthermore, we investigated the effects of the tailoring by providing a congruent and an incongruent variant for behavioral stages. Both, usability and transparency evaluations differed positively from the average. Moreover, the interaction with the tool significantly increased the participants' self-efficacy and thus strengthened their digital sovereignty. Our tailoring of texts had a positive impact at least on the efficiency evaluation. This could be further developed by extended tailoring of e.g., the GUI.
- KonferenzbeitragGaining Back the Control Over Identity Attributes: Access Management Systems Based on Self-Sovereign Identity(Open Identity Summit 2024, 2024) Keil, Kenneth-Raphael; Bochnia, Ricardo; Gudymenko, Ivan; Köpsell, Stefan; Anke, JürgenDigital employee cards used for door access control offer benefits, but concerns about traceability, profiling and performance monitoring have led to opposition from workers’ councils and employees. However, the emerging identity management approach, Self-Sovereign Identity (SSI), can address these concerns by giving control over disclosed identity attributes back to the end user. This paper analyzes a real-world access management scenario in a hospital building and applies the SSI paradigm to address the identified issues. The analysis assumes a semi-honest observing attacker sniffing on the payload and the transport layer. The SSI-based proof of concept is shown to have a high potential to protect against traceability and profiling. However, in addition to the careful technical implementation of SSI, it is important to consider non-technical factors such as governance for a holistic solution. We propose potential strategies to further minimize privacy risks associated with SSI-based employee identity management using mediators.
- KonferenzbeitragTowards Building GDPR-Friendly Consent Management Systems on Top of Self-Sovereign Identity Ecosystems(Open Identity Summit 2024, 2024) Schramm, Julia; Eichinger, TobiasConsent is a legal basis that legitimizes the processing of personal data under the General Data Protection Regulation (GDPR). Implementing consent management systems in a GDPR-compliant fashion has proven difficult. A major pain point of current implementations is that users only have insufficient means to prove that they withdrew consent. Controllers can, therefore, plausibly deny having received a notification of consent withdrawal and it is thus at their discretion to continue the processing of personal data against the user’s will. As a remedy, it has been proposed to log consent withdrawal events in blockchains to make them non-repudiable by controllers. This approach is typically at odds with the GDPR’s fundamental principle of Storage Limitation. The issue is that a consent withdrawal event has to permit identification of the user who submitted it, yet only until the controller has received it. However, if they are logged in a blockchain, identification is possible indefinitely, as blockchains are append-only databases that do not facilitate deletion. In the paper at hand, we alleviate this issue and present work in progress on a consent management system in which users (i) give consent by issuing a verifiable credential to a controller and (ii) withdraw consent by revoking it. These two functions are natively provided in Self-Sovereign Identity (SSI) ecosystems.
- KonferenzbeitragOpen Identity Summit 2024 - Complete Volume(Open Identity Summit 2024, 2024)