Decentralized and self-sovereign identity: Systematic mapping study

Š Čučko, M Turkanović - IEEE Access, 2021 - ieeexplore.ieee.org
Self-Sovereign Identity is an emerging, user-centric, decentralized identity approach utilizing
some form of decentralized technology. It provides a means for digital identification without …

A taxonomy of challenges for self-sovereign identity systems

A Satybaldy, MS Ferdous, M Nowostawski - IEEE Access, 2024 - ieeexplore.ieee.org
Creating and utilizing digital identities are fundamental steps towards accessing online
services. In order to facilitate the management of user identities, the concept of identity …

[HTML][HTML] The construction of self-sovereign identity: Extending the interpretive flexibility of technology towards institutions

L Weigl, T Barbereau, G Fridgen - Government Information Quarterly, 2023 - Elsevier
Ever-growing concerns over 'Big Brother'continue driving individuals towards user-centric
identity management systems. Nascent innovations are framed as offering Self-Sovereign …

A privacy-preserving traceability system for self-sovereign identity-based inter-organizational business processes

A Abid, S Cheikhrouhou, S Kallel, M Jmaiel - Computer Standards & …, 2025 - Elsevier
Blockchain is a potential technology for collaborating organizations, notably for executing
their Inter-Organizational Business Processes (IOBPs). While Blockchain's transparency and …

A user-centric identity management framework based on the W3C verifiable credentials and the FIDO universal authentication framework

R Laborde, A Oglaza, S Wazan… - 2020 IEEE 17th …, 2020 - ieeexplore.ieee.org
We present a user-centric and decentralized digital identity system that allows anyone to
easily benefit from an enriched digital identity made of multi-purpose and multi-origin …

Tokenization and regulatory compliance for art and collectibles markets: from regulators' demands for transparency to investors' demands for privacy

T Barbereau, J Sedlmeir, R Smethurst… - Blockchains and the …, 2022 - Springer
Abstract Art and collectibles markets tend to involve lower liquidity and higher fees than
public equity markets. Distributed ledger technology can tokenize artworks and collectibles …

How many FIDO protocols are needed? Analysing the technology, security and compliance

A Angelogianni, I Politis, C Xenakis - ACM Computing Surveys, 2024 - dl.acm.org
To overcome the security vulnerabilities caused by weak passwords, thus bridge the gap
between user friendly interfaces and advanced security features, the Fast IDentity Online …

Decentralized identity with applications to security and privacy for the internet of things

CDN Kyriakidou, AM Papathanasiou… - Computer Networks …, 2023 - ojs.wiserpub.com
Decentralized Identity (dID) has brought to the forefront the advantages and importance of
total user control over identity. Previous solutions delegate identity management to the …

Metasecure: A passwordless authentication for the metaverse

SC Sethuraman, A Mitra, A Ghosh, G Galada… - arXiv preprint arXiv …, 2023 - arxiv.org
Metaverse in general holds a potential future for cyberspace. At the beginning of Web 2.0, it
was witnessed that people were signing in with various pseudonyms or'nyms', risking their …

FIDOnuous: a FIDO2/WebAuthn extension to support continuous web authentication

E Klieme, J Wilke, N van Dornick… - 2020 IEEE 19th …, 2020 - ieeexplore.ieee.org
For many years username and password are the common solution to protect sensitive web
services despite its various drawbacks. While many alternatives were proposed to improve …