2019
DOI: 10.1109/mcomstd.001.1900029
|View full text |Cite
|
Sign up to set email alerts
|

The Trust over IP Stack

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
22
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 51 publications
(29 citation statements)
references
References 0 publications
0
22
0
Order By: Relevance
“…While DLTs provide a tamper-evident and tamper-resistant trail of trust, it is often difficult to ensure raw data quality at the moment of input (e.g., EO and IOT data streams), which could lead to a trail of immutable but ultimately inaccurate data. Some of the most significant technology advances in response to this concern have come from the development of decentralized identifiers (DIDs) and their use in verifiable credentials that define the roles of holders, issuers and verifiers across complex networks (Davie et al, 2019 ). The application of DIDs within a network to establish trusted interactions, as in the case of the “Trust over IP stack” (Davie et al, 2019 ), can provide the needed rules and governance to ensure the data is trustworthy across the different layers outlined in Figure 2 .…”
Section: Discussion: Toward the Next Generation Of Tracking Climate Cmentioning
confidence: 99%
See 1 more Smart Citation
“…While DLTs provide a tamper-evident and tamper-resistant trail of trust, it is often difficult to ensure raw data quality at the moment of input (e.g., EO and IOT data streams), which could lead to a trail of immutable but ultimately inaccurate data. Some of the most significant technology advances in response to this concern have come from the development of decentralized identifiers (DIDs) and their use in verifiable credentials that define the roles of holders, issuers and verifiers across complex networks (Davie et al, 2019 ). The application of DIDs within a network to establish trusted interactions, as in the case of the “Trust over IP stack” (Davie et al, 2019 ), can provide the needed rules and governance to ensure the data is trustworthy across the different layers outlined in Figure 2 .…”
Section: Discussion: Toward the Next Generation Of Tracking Climate Cmentioning
confidence: 99%
“…Some of the most significant technology advances in response to this concern have come from the development of decentralized identifiers (DIDs) and their use in verifiable credentials that define the roles of holders, issuers and verifiers across complex networks (Davie et al, 2019 ). The application of DIDs within a network to establish trusted interactions, as in the case of the “Trust over IP stack” (Davie et al, 2019 ), can provide the needed rules and governance to ensure the data is trustworthy across the different layers outlined in Figure 2 . This requires IoT devices to be registered as specific “agents” within the network, and have pre-programmed disclosure settings, even with privacy tools such as zero-knowledge proofs, irrespective of who owns the IoT and where the data is stored (Huh et al, 2017 ).…”
Section: Discussion: Toward the Next Generation Of Tracking Climate Cmentioning
confidence: 99%
“…Further, some implementations of VCs can prove the correctness of claims, such as the existence of the issuers' signature on the VC, without the need to reveal the value of the signature itself or all attributes that are attested on the credential. This significantly mitigates the correlatability of conventional digital certificates by means of their digital signature, and ultimately allows for enhanced privacy while still exchanging the information that is required to build the trust relationship that is necessary for interactions and business [Davie et al, 2019;Hardman, 2020].…”
Section: Ssi and Its Proposed Application To Ekycmentioning
confidence: 99%
“…Third, user authenticity must be guaranteed; i.e., sharing and selling credentials must be prevented [Camenisch and Lysyanskaya, 2001]. However, various concepts that allow one to address these issues, such as initiatives to build governance frameworks [Davie et al, 2019] and the combination of biometrics, cryptography, economic incentives, and device coupling to create a strong bond between credentials and holders Hardman, 2020].…”
Section: Ssi and Its Proposed Application To Ekycmentioning
confidence: 99%
“…By processing the Verifiable Presentation document, the Verifier can use the accessible public keys to check that i) the presented proof pertains to the subject it is being presented on behalf of, ii) the presented proof contains assertions signed by the original Issuer, and finally iii) that the presented documents have not been tampered with. As such, triangles of trust [27] can be leveraged to enable parties to issue, hold and verify credentials without reliance on any central authority.…”
Section: B Verifiable Credentialsmentioning
confidence: 99%