GI LogoGI Logo
  • Login
Digital Library
    • All of DSpace

      • Communities & Collections
      • Titles
      • Authors
      • By Issue Date
      • Subjects
    • This Collection

      • Titles
      • Authors
      • By Issue Date
      • Subjects
Digital Library Gesellschaft für Informatik e.V.
GI-DL
    • English
    • Deutsch
  • English 
    • English
    • Deutsch
Search 
  •   DSpace Home
  • Lecture Notes in Informatics
  • Proceedings
  • Open Identity Summit
  • P325 - Open Identity Summit 2022
  • Search
JavaScript is disabled for your browser. Some features of this site may not work without it.
  •   DSpace Home
  • Lecture Notes in Informatics
  • Proceedings
  • Open Identity Summit
  • P325 - Open Identity Summit 2022
  • Search

Search

DiscoverDiscover

Filters

Use filters to refine the search results.

Now showing items 1-10 of 14

Results Per Page:Sort Options:

Continuous authorization over HTTP using Verifiable Credentials and OAuth 2.0 

Open Identity Summit 2022 Fotiou, Nikos; Faltaka, Evgenia; Kalos, Vasilis; Kefala, Anna; Pittaras, Iakovos; Siris, Vasilios A.; Polyzos, George C.
We design, implement, and evaluate a solution for achieving continuous authorization of HTTP requests exploiting Verifiable Credentials (VCs) and OAuth 2.0. Specifically, we develop a VC issuer that acts as an OAuth 2.0 authorization server, a VC verifier that transparently protects HTTP-based resources, and a VC wallet ...

eIDAS 2.0: Challenges, perspectives and proposals to avoid contradictions between eIDAS 2.0 and SSI 

Open Identity Summit 2022 Schwalm, Steffen; Albrecht, Daria; Alamillo, Ignacio
The proposal for review of the eIDAS Regulation from 2021 has opened strong expectations for a deep change in traditional identity models. The user-centric identity model proposed starts with the creation of European Digital Identity Wallets that will enable citizens’ control over their data in identification and ...

Risk variance: Towards a definition of varying outcomes of IT security risk assessment 

Open Identity Summit 2022 Kurowski, Sebastian; Schunck, Christian H.
Assessing IT-security risks in order to achieve adequate and efficient protection measures has become the core idea of various industry practices and regulatory frameworks in the last five years. Some research however suggests that the practice of assessing IT security risks may be subject to varying outcomes depending ...

Adversary Tactics and Techniques specific to Cryptocurrency Scams 

Open Identity Summit 2022 Horch, Andrea; Schunck, Christian H.; Ruff, Christopher
At the end of the year 2020, there was a steep uptrend of the cryptocurrency market. The global market capitalization of cryptocurrencies climbed from 350 billion US$ in October 2020 to almost 2.5 trillion US$ in May 2021 and reached 3 trillion US$ in November 2021. Currently, there are more than 17,600 cryptocurrencies ...

Preservation of (higher) Trustworthiness in IAM for distributed workflows and systems based on eIDAS 

Open Identity Summit 2022 Strack, H.; Karius, S.; Gollnick, M.; Lips, M.; Wefel, S.; Altschaffel, R.
The secure digitalisation of distributed workflows with different stakeholders (and trust relationships) using systems from different stakeholder domains is of increasing interest. Just one example is the workflow/policy area of student mobility. Others are from public administration and from economic sectors. According ...

Integration of Self-Sovereign Identity into Conventional Software using Established IAM Protocols: A Survey 

Open Identity Summit 2022 Kuperberg, Michael; Klemens, Robin
Self-Sovereign Identity (SSI) is an approach based on asymmetric cryptography and on decentralized, user-controlled exchange of signed assertions. Most SSI implementations are not based on hierarchic certification schemas, but rather on the peer-to-peer and distributed “web of trust” without root or intermediate CAs. As ...

Towards robustness of keyboard-entered authentication factors with thermal wiping against thermographic attacks 

Open Identity Summit 2022 Fritsch, Lothar; Mecaliff, Marie; Opdal, Kathinka W.; Rundgreen, Mathias; Sachse, Toril
Many authentication methods use keyboard entry for one of their authentication factors. Keyboards factors have been compromised exploiting physical fingerprints, substances from fingers visible on keys, with acoustic recordings through mobile phones, and through video reflections captured by high-resolution cameras used ...

A novel approach to establish trust in verifiable credential issuers in Self-sovereign identity ecosystems using TRAIN 

Open Identity Summit 2022 Johnson Jeyakumar, Isaac H.; Chadwick, David W.; Kubach, Michael
Self-sovereign identity (SSI) promises to bring decentralized privacy friendly identity management (IdM) ecosystems to everyone. Yet, trust management in SSI remains challenging. In particular, it lacks a holistic approach that combines trust and governance frameworks. A practical and scalable mechanism is needed for ...

Corporate Digital Responsibility and the current Corporate Social Responsibility standard: An analysis of applicability 

Open Identity Summit 2022 Carl, K. Valerie; Zilcher, Timothy M. C.; Hinz, Oliver
Corporate Digital Responsibility (CDR) takes a key role in developing, deploying, and managing digital technologies, products, and services responsibly and ethically. New technologies offer new chances but also expose new threats, especially related to privacy and data security that managers need to cope with. CDR puts ...

Flexible Method for Supporting OAuth 2.0 Based Security Profiles in Keycloak 

Open Identity Summit 2022 Norimatsu, Takashi; Nakamura, Yuichi; Yamauchi, Toshihiro
Keycloak is identity and access control open-source software. When used for open banking, where many OAuth 2.0 clients need to be managed and a different OAuth 2.0-based security profile needs to be applied to each type of API, the problem of increasing managerial costs by the Keycloak administrator occurs because ...
  • «
  • 1
  • 2
  • »

About uns | FAQ | Help | Imprint | Datenschutz

Gesellschaft für Informatik e.V. (GI), Kontakt: Geschäftsstelle der GI
Diese Digital Library basiert auf DSpace.

 

 

Discover

Author

Fähnrich, Nicolas (2)Kubach, Michael (2)Schunck, Christian H. (2)Schwalm, Steffen (2)Alamillo, Ignacio (1)Albrecht, Daria (1)Altschaffel, R. (1)Bastian, Paul (1)Carl, K. Valerie (1)Chadwick, David W. (1)... View More

Subject

SSI (4)DID (2)digital wallet (2)eIDAS (2)IAM (2)identity management (2)IT-security (2)self-sovereign identity (2)ABAC (1)Access control (1)... View More

Date Issued

2022 (14)

Has File(s)

Yes (13)No (1)

About uns | FAQ | Help | Imprint | Datenschutz

Gesellschaft für Informatik e.V. (GI), Kontakt: Geschäftsstelle der GI
Diese Digital Library basiert auf DSpace.