2018
DOI: 10.20897/jisem/3943
|View full text |Cite
|
Sign up to set email alerts
|

Federation of Attribute Providers for User Self-Sovereign Identity

Abstract: In a world where people must subject themselves to high scrutiny in every process they initiate, and in a world where the digital environment grows incessantly, we anticipate more online services asking for personal attributes and their need to trust in such attributes. For tackling such need, we describe a proposal for a secure, decentralized and shared repository of certified personal attributes. Individuals benefit because they have full control over the disclosure of their set of certified attributes (e.g.… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
5
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
3
3

Relationship

1
5

Authors

Journals

citations
Cited by 7 publications
(5 citation statements)
references
References 0 publications
0
5
0
Order By: Relevance
“…Being a relatively new notion, the amount of scholarly works on this domain in the academic community is quite minimal. A very few examples of some of the academic works in this domain can be found in [13]- [17]. In [13], the authors explored the concept of self-sovereign identity as well as presented its challenges and opportunities in a rather informal way.…”
Section: A Existing Definitionsmentioning
confidence: 99%
See 1 more Smart Citation
“…Being a relatively new notion, the amount of scholarly works on this domain in the academic community is quite minimal. A very few examples of some of the academic works in this domain can be found in [13]- [17]. In [13], the authors explored the concept of self-sovereign identity as well as presented its challenges and opportunities in a rather informal way.…”
Section: A Existing Definitionsmentioning
confidence: 99%
“…On the other hand, the authors in [14] investigated different components of a self-sovereign identity using existing non-academic literature. The main focus of other works in [15]- [17] is on the application of self-sovereign identity, more specifically, to explore how a self-sovereign identity system can be built and developed. Within this aim, they proposed developed different systems.…”
Section: A Existing Definitionsmentioning
confidence: 99%
“…However, no solution is implemented, and it is not clear how SSI can be applied to access control. Coelho et al detail a self-sovereign identity system [32] using roles, attributes, policies, and user wallets. The proposed system does not support multiple ACMs, and lacks an implementation.…”
Section: Related Workmentioning
confidence: 99%
“…The identity attributes can be stored offline and hashes of certificate are stored in the blockchain upon successful verification between claim-issuer and relaying party [31]. In [32], attribute certification solution for SSI has been provided using blockchain. The attribute certificate requests and certified attributes are centrally stored in a permissioned blockchain and linked to unique user pseudonym and managed through user wallet.…”
Section: B Identity Proofing and Attribute Assurancementioning
confidence: 99%