2019
DOI: 10.1109/mcomstd.001.1900020
|View full text |Cite
|
Sign up to set email alerts
|

Improved Identity Management with Verifiable Credentials and FIDO

Abstract: The version in the Kent Academic Repository may differ from the final published version. Users are advised to check http://kar.kent.ac.uk for the status of the paper. Users should always cite the published version of record.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
16
0

Year Published

2021
2021
2025
2025

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 35 publications
(23 citation statements)
references
References 3 publications
0
16
0
Order By: Relevance
“…At present, there are only few academic papers on the application of SSI in business scenarios. They include the application of SSI in "know-yourcustomer" processes in banking [7], access to public health services [8], remote management of industrial equipment [3], payback programmes in retail [9], student exchange [10], e-petitions [11], assigning medical information to persons without regular identity, e.g. to fight Covid-19 [12].…”
Section: Motivationmentioning
confidence: 99%
See 1 more Smart Citation
“…At present, there are only few academic papers on the application of SSI in business scenarios. They include the application of SSI in "know-yourcustomer" processes in banking [7], access to public health services [8], remote management of industrial equipment [3], payback programmes in retail [9], student exchange [10], e-petitions [11], assigning medical information to persons without regular identity, e.g. to fight Covid-19 [12].…”
Section: Motivationmentioning
confidence: 99%
“…• User data does not need to be stored at the service provider [7] • Identity issuer is not involved in identity access, verification, and resolution [7], [8], [10] • Identity data integrity and availability is ensured [7] • Privacy of users is ensured [7]- [12] • Users can trade their data for rewards [9] • Users can link different identity attributes from various issuers on their own [10] • Anonymous participation in transactions [11], [12] Besides these, also critical issues were raised that limit the adoption of SSI:…”
Section: Application Of Self-sovereign Identities In Business Scenariosmentioning
confidence: 99%
“…Although the W3C Verifiable Credential (VC) data model specification [9] is relatively recent and still evolving, it has already received a spike of attention. Works like [3,7] propose the usage of Verifiable Credentials empowered with other technologies like biometric authentication with FIDO. These solutions, however, are not optimal for privacy heavy scenarios, as they have problems achieving minimal disclosure and unlinkability.…”
Section: Related Workmentioning
confidence: 99%
“…We define a schema for validating our predicate data model using the tools of the JSON core schemas 3 . There are multiple ways to define a schema that fulfils our objective, like trying the "brute force' approach of defining a schema for each possibility and tying them with the "anyOf" keyword.…”
Section: Towards a Data Model For P-abcs In Verifiable Credentialsmentioning
confidence: 99%
See 1 more Smart Citation