[go: up one dir, main page]

Lesavre et al., 2019 - Google Patents

A taxonomic approach to understanding emerging blockchain identity management systems

Lesavre et al., 2019

View PDF
Document ID
8991163916691390494
Author
Lesavre L
Varin P
Mell P
Davidson M
Shook J
Publication year
Publication venue
arXiv preprint arXiv:1908.00929

External Links

Snippet

Identity management systems (IDMSs) are widely used to provision user identities while managing authentication, authorization, and data sharing within organizations and on the web. Traditional identity systems typically suffer from single points of failure, lack of …
Continue reading at arxiv.org (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30067File systems; File servers

Similar Documents

Publication Publication Date Title
Lesavre et al. A taxonomic approach to understanding emerging blockchain identity management systems
Soltani et al. A Survey of Self‐Sovereign Identity Ecosystem
US10735397B2 (en) Systems and methods for distributed identity verification
US20230026665A1 (en) Digital fiat currency
Cruz et al. RBAC-SC: Role-based access control using smart contract
US10547643B2 (en) Systems and methods for distributed data sharing with asynchronous third-party attestation
Kaneriya et al. A comparative survey on blockchain based self sovereign identity system
Bandara et al. Casper: a blockchain-based system for efficient and secure customer credential verification
Kikitamara et al. Digital identity management on blockchain for open model energy system
Saleem et al. ProofChain: An X. 509-compatible blockchain-based PKI framework with decentralized trust
Hatefi et al. A conditional privacy-preserving fair electronic payment scheme based on blockchain without trusted third party
Antony Saviour et al. IPFS based file storage access control and authentication model for secure data transfer using block chain technique
Priyadarshini et al. A faster, integrated, and trusted certificate authentication and issuer validation system based on blockchain
Noh et al. PyRos: A State Channel‐Based Access Control System for a Public Blockchain Network
Dumas et al. Localpki: An interoperable and iot friendly pki
Senthilkumar Data confidentiality, integrity, and authentication
Hardjono et al. Privacy-preserving claims exchange networks for virtual asset service providers
Amujo et al. Development of a national identity management system using blockchain technology
Rech et al. A decentralized service-platform towards cross-domain entitlement handling
Pärni On self-sovereign identity: Verifiable credentials and presentations with OpenID connect
Agrawal¹ et al. Blockchain based access control systems
Papanchev An interoperable access control system based on self-sovereign identities
Babu et al. Secure exchange and effectual verification of educational academic records using hyperledger fabric block chain system
Azeem URS–A universal revocation service for applying in self-sovereign identity
Fischer User management of a privacy-based carpooling platform