Decentralized and self-sovereign identity: Systematic mapping study

Š Čučko, M Turkanović - IEEE Access, 2021 - ieeexplore.ieee.org
Self-Sovereign Identity is an emerging, user-centric, decentralized identity approach utilizing
some form of decentralized technology. It provides a means for digital identification without …

面向区块链的物联网终端跨域认证方法综述.

霍炜, 张琼露, 欧嵬, 韩文报 - Journal of Frontiers of …, 2023 - search.ebscohost.com
物联网终端设备分布广, 数量多, 层次复杂, 并且涉及多个管理域, 常处于不可控的环境中,
相比于传统互联网终端, 更容易受到攻击, 其安全管控面临着更为巨大的风险与挑战 …

A security analysis of blockchain-based did services

BG Kim, YS Cho, SH Kim, H Kim, SS Woo - IEEE Access, 2021 - ieeexplore.ieee.org
Decentralized identifiers (DID) has shown great potential for sharing user identities across
different domains and services without compromising user privacy. DID is designed to …

A Systematic Literature Mapping on Using Blockchain Technology in Identity Management

TTT Ngo, TA Dang, VV Huynh, TC Le - IEEE Access, 2023 - ieeexplore.ieee.org
Although blockchain is an emerging technology, it has been applied in a lot of domains by
leveraging its features. Traditional identity management systems have many issues …

A Dynamic Federated Identity Management Using OpenID Connect

A Alsadeh, N Yatim, Y Hassouneh - Future Internet, 2022 - mdpi.com
Identity federation allows one to link a user's digital identities across several identity
management systems. Federated identity management (FIM) ensures that users have easy …

Evaluation of electric mobility authentication approaches

H Gadacz - Proceedings of the 5th ACM Computer Science in Cars …, 2021 - dl.acm.org
For the public charging of Electric Vehicles (EVs), ISO 15118 specifies the Plug and Charge
(PnC) approach. Unfortunately, PnC requires a quite complex Public Key Infrastructure (PKI) …

Decentralized Identity and Access Management (IAM) and Self-Sovereign Identity

SK Roy - International Journal of Research in Engineering …, 2023 - journal.ijresm.com
Self-Sovereign Identity (SSI) represents a ground breaking, user-focused approach to digital
identity management. This paradigm shifts the control of personal data back to the user …