2020 32nd International Teletraffic Congress (ITC 32) 2020
DOI: 10.1109/itc3249928.2020.00020
|View full text |Cite
|
Sign up to set email alerts
|

Cooperative Task Scheduling for Personal Identity Verification in Networked Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
8
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(8 citation statements)
references
References 5 publications
0
8
0
Order By: Relevance
“…The two works [79,115] mapped relating to the issuer authorization introduced mathematical formalism and were detailed above. Nevertheless, [79] shares with two aforementioned papers [20,63] and [4] the characteristic of basing their approach to trust in Hyperledger Indy. More specifically, [4] presented the different user roles and transaction types stored in the Indy blockchain and then discussed the steps a verifier can take to gain confidence when receiving a presentation.…”
Section: Frederico Schardong and Ricardo Custódiomentioning
confidence: 97%
See 2 more Smart Citations
“…The two works [79,115] mapped relating to the issuer authorization introduced mathematical formalism and were detailed above. Nevertheless, [79] shares with two aforementioned papers [20,63] and [4] the characteristic of basing their approach to trust in Hyperledger Indy. More specifically, [4] presented the different user roles and transaction types stored in the Indy blockchain and then discussed the steps a verifier can take to gain confidence when receiving a presentation.…”
Section: Frederico Schardong and Ricardo Custódiomentioning
confidence: 97%
“…With a different perspective, Inoue et al [63] modeled as an Integer Linear Programming (ILP) a trust policy evaluation problem specifically for the task of updating a person's information in multiple RPs, each with its trust policy. In this ILP, trust policies are modeled as credibility requirements about incoming claims, and successfully updating a person's information in an RP increases credibility.…”
Section: Identitymentioning
confidence: 99%
See 1 more Smart Citation
“…The trust policy evaluation is covered in eight papers [ 99 , 100 , 101 , 110 , 142 , 143 , 144 , 145 ]. Three of them [ 99 , 100 , 101 ], which were previously introduced, are concerned with protocol integration and identity derivation .…”
Section: Rq-1: What Practical Problems Have Been Introduced and Solved?mentioning
confidence: 99%
“…One aims for issuer authorization [ 110 ], while the other aims for HCI [ 142 ]. The following are the three papers that attempt to address this problem [ 143 , 144 , 145 ].…”
Section: Rq-1: What Practical Problems Have Been Introduced and Solved?mentioning
confidence: 99%