[HTML][HTML] A privacy-aware authentication and usage-controlled access protocol for IIoT decentralized data marketplace

A Dixit, BB Zarpelao, M Smith-Creasey… - Computers & Security, 2024 - Elsevier
Data is ubiquitous, powerful and valuable today. With vast instalments of Industrial Internet-
of-Things (IIoT) infrastructure, data is in abundance albeit sitting in organizational silos. Data …

Use Case Feasibility Study: Decentralized Identity on Blockchain for Cultural Heritage Artifacts

I Lambov - Proceedings of the International Conference on …, 2024 - dl.acm.org
Preserving the authenticity and provenance of artifacts is crucial for our cultural heritage.
This study explores the potential of Decentralized Identity on Blockchain for artifact …

Towards Zero Trust Security for Prosumer-Driven Verifiable Green Energy Certificates

S Rasool, A Saleem, MI ul Haq… - 2024 7th International …, 2024 - ieeexplore.ieee.org
In response to the critical need for environmentally sustainable practices, green energy
certificates have emerged as a key mechanism to prevent greenwashing and ensure the …

Attribute-Based Access Control Utilizing Verifiable Credentials for Multi-Tenant IoT Systems

CDN Kyriakidou, AM Papathanasiou… - 2024 IEEE 4th …, 2024 - ieeexplore.ieee.org
Many Internet of Things (IoT) applications are considering multi-tenancy to support for
multiple entities sharing access to the same IoT devices. The challenge of ensuring IoT …

Assessing the Effectiveness of Pretty Good Privacy (PGP) in Wireless Network Security

M Pandey, M Meena, MK Aravindan… - … on Smart Generation …, 2023 - ieeexplore.ieee.org
Quite exact privateness (PGP) is a broadly used cryptographic protocol that presents
authentication, privacy, and access manipulation to customers. This paper investigates the …

[HTML][HTML] Leveraging Self-Sovereign Identity to Introduce ReCert: A Foundational Framework for Decentralized BCTE Solutions

S Rasool, RH Jacobsen - 2024 - intechopen.com
Abstract Blockchain-enabled Transactive Energy (BCTE) heralds a revolutionary departure
from traditional paradigms to achieve decentralization and its benefits in the energy sector …

[PDF][PDF] VC-Vault: A User-Friendly, Secure, Privacy-Enhancing Verifiable Credentials Wallet

The shift from centralized identity systems to decentralized alternatives is becoming more
imminent. Users are increasingly encouraged to embrace the principles of Self-Sovereign …

[PDF][PDF] DECENTRALIZED ARCHITECTURES IN IOT DATA SHARING USING BLOCKCHAIN TECHNOLOGY

C Costea - Carpathian Journal of Electrical Engineering, 2023 - cee.cunbm.utcluj.ro
The development of IoT applications generally relies on centralized architectures, whether
they use solutions based on cloud or on premises environments, usually operated by a …