Auflistung nach Schlagwort "self-sovereign identity"
1 - 8 von 8
Treffer pro Seite
Sortieroptionen
- KonferenzbeitragApplying assurance levels when issuing and verifying credentials using Trust Frameworks(Open Identity Summit 2021, 2021) Martinez Jurado, Victor; Vila, Xavier; Kubach, Michael; Henderson Johnson Jeyakumar, Isaac; Solana, Albert; Marangoni, MatteoTechnical interoperability of the issuance, presentation, and verification of verifiable credentials (VC) across domains of trust is a current challenge for self-sovereign identity. We present an approach incorporating different levels of assurance and trust domains in an eIDAS compliant way. This is illustrated through a use case with real-world relevance: the issuance and cross-border usage of the European Health Insurance Card.
- KonferenzbeitragCombination of x509 and DID/VC for inheritance properties of trust in digital identities(Open Identity Summit 2022, 2022) Bastian, Paul; Stöcker, Carsten; Schwalm, SteffenThe proposal for review of the eIDAS Regulation from 2021 has opened strong expectations for a deep change in traditional identity models. The user-centric identity model proposed starts with the creation of European Digital Identity Wallets that will enable citizens’ control over their data in identification and authentication processes without control by entities providing the identification services. Likewise digital identities and digital signatures are in place and interoperability between existing solutions mainly based on x509 certificates and decentralized PKI using DID/VC foreseeable. The paper provides various options to address different aspects in combining x509 and DID/VC approaches.
- KonferenzbeitrageIDAS 2.0: Challenges, perspectives and proposals to avoid contradictions between eIDAS 2.0 and SSI(Open Identity Summit 2022, 2022) Schwalm, Steffen; Albrecht, Daria; Alamillo, IgnacioThe proposal for review of the eIDAS Regulation from 2021 has opened strong expectations for a deep change in traditional identity models. The user-centric identity model proposed starts with the creation of European Digital Identity Wallets that will enable citizens’ control over their data in identification and authentication processes without control by entities providing the identification services. Likewise, with the proposed legal rules for giving legal certainty to electronic ledgers and blockchains, [eIDAS2]opens possibilities to decentralization, especially for the provision and management of user’s attributes. The implementation of qualified trust services for attestations or electronic ledgers limits decentralization by requirement of a trusted 3rd party. Standardization will be key in assuring interoperability at the EU level. What are the challenges and opportunities of eIDAS 2.0? And what are the main focuses and needs of (European) standardization? These and other questions will be analysed and discussed in the paper.
- KonferenzbeitragResearch on User Experience for Digital IdentityWallets: State-of-the-Art and Recommendations(Open Identity Summit 2023, 2023) Sellung, Rachelle; Kubach, MichaelDigital identity wallets are central components for Decentralised and Self-Sovereign Identity (SSI) approaches. They are the interface for users to manage their identities and gain access to services. Hence, the usability and user experience of these wallets is pivotal for the adoption of those popular and privacy friendly identity management concepts. As research on the user experience of wallets is still in its infancy, this paper aims to provide a first overview of recent research – published and from completed and ongoing research projects. Findings are summarized and recommendations for developers are derived.
- KonferenzbeitragSecure Industrial Device Wallet(Open Identity Summit 2024, 2024) Kumari, Ankita; Aghaie, Anita; Passarelli, Anne; Papagudi Subrahmanyam, Niranjana; Maftun, AlizaIndustry 4.0 integrates technologies such as blockchain, self-sovereign identities, digital twins etc. within industrial environments. A key feature within such industrial advancements is the use of wallets that can facilitate the secure digitalization of industrial operations and the expansion of systems. This paper puts forth the idea of a secure industrial device wallet, that is robustly bound to the device and serves as a hardware trust anchor within self-sovereign identity architectures. The paper introduces and evaluates different approaches to achieve this binding and provides a proof of concept to prevent device counterfeit attacks.
- KonferenzbeitragSelf-sovereign identity systems and European data protection regulations: an analysis of roles and responsibilities(Open Identity Summit 2021, 2021) Chomczyk Penedo, AndrésDecentralized identity systems have taken a key role in the identity management landscape. Self-sovereign identity management systems have promised to return control over identity to individuals. However, these promises still need to be assessed against the existing regulatory framework. As identity attributes can be considered personal data, rules such as the General Data Protection Regulation are applicable. The existing legal literature has still not delivered an analysis of who is a controller and who is a processor in the context of a self-sovereign identity system for the process of identity creation. As such, the purpose of this contribution is to tackle this challenge.
- KonferenzbeitragA shared responsibility model to support cross border and cross organizational federation on top of decentralized and self-sovereign identity: Architecture and first PoC(Open Identity Summit 2023, 2023) Kubach, Michael; Henderson, Isaac; Bithin, Alangot; Dimitrakos, Theo; Vargas, Juan; Winterstetter, Matthias; Krontiris, IoannisThis paper discusses the challenges of transitioning from legacy federated identity systems to emerging decentralized identity technologies based on self-sovereign identities (SSI) and verifiable credentials, which are being used in initiatives such as Gaia-X and Catena-X for secure and sovereign data sharing. The adoption of SSI and decentralized identity technologies requires a standardized reference model that addresses challenges around trust in cross-border and crossorganizational federations based on decentralized identities. To facilitate this transition, the paper proposes a new Fed2SSI architecture that introduces a middle layer of abstraction for the policybased transformation of credentials, enabling interoperability between legacy federated identity solutions and SSI/decentralized identity environments. The architecture is implemented in a prototype and an exemplary use case is presented to illustrate the added value of this approach.
- WorkshopbeitragTowards informed choices: A decision model for adaptive warnings in self-sovereign identity(Mensch und Computer 2023 - Workshopband, 2023) Ebert, Sarah; Krauß, Anna-Magdalena; Anke, JürgenIn today’s digital age, safeguarding personal information has become crucial due to widespread data exchange and processing. Self-Sovereign Identity (SSI) empowers individuals to manage their digital identities themselves. To protect their privacy, users should be enabled to make informed decisions when sharing their data. To facilitate this, a decision model is proposed in this paper, aiming todetermine the appropriate threat level for data requests in SSI applications. For that, we used the General Data Protection Regulation (GDPR) as basis to identify several influencing factors. These factors were grouped into partial models such as the trustworthiness of the requesting party, the legitimacy of the request, and the value of that data. The decision model combines the results from these partial decision models to assign one of the three threat levels: low, medium, or high. In the future, this model has the potential to be integrated into SSI applications, enabling automatic assessment of requests for data and thus empower users to make informed decisions about sharing their data.