Lesavre et al., 2019 - Google Patents
A taxonomic approach to understanding emerging blockchain identity management systemsLesavre et al., 2019
View PDF- Document ID
- 8991163916691390494
- Author
- Lesavre L
- Varin P
- Mell P
- Davidson M
- Shook J
- Publication year
- Publication venue
- arXiv preprint arXiv:1908.00929
External Links
Snippet
Identity management systems (IDMSs) are widely used to provision user identities while managing authentication, authorization, and data sharing within organizations and on the web. Traditional identity systems typically suffer from single points of failure, lack of …
- 238000005516 engineering process 0 abstract description 28
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2141—Access rights, e.g. capability lists, access control lists, access tables, access matrices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30067—File systems; File servers
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Lesavre et al. | A taxonomic approach to understanding emerging blockchain identity management systems | |
| Soltani et al. | A Survey of Self‐Sovereign Identity Ecosystem | |
| US10735397B2 (en) | Systems and methods for distributed identity verification | |
| US20230026665A1 (en) | Digital fiat currency | |
| Cruz et al. | RBAC-SC: Role-based access control using smart contract | |
| US10547643B2 (en) | Systems and methods for distributed data sharing with asynchronous third-party attestation | |
| Kaneriya et al. | A comparative survey on blockchain based self sovereign identity system | |
| Bandara et al. | Casper: a blockchain-based system for efficient and secure customer credential verification | |
| Kikitamara et al. | Digital identity management on blockchain for open model energy system | |
| Saleem et al. | ProofChain: An X. 509-compatible blockchain-based PKI framework with decentralized trust | |
| Hatefi et al. | A conditional privacy-preserving fair electronic payment scheme based on blockchain without trusted third party | |
| Antony Saviour et al. | IPFS based file storage access control and authentication model for secure data transfer using block chain technique | |
| Priyadarshini et al. | A faster, integrated, and trusted certificate authentication and issuer validation system based on blockchain | |
| Noh et al. | PyRos: A State Channel‐Based Access Control System for a Public Blockchain Network | |
| Dumas et al. | Localpki: An interoperable and iot friendly pki | |
| Senthilkumar | Data confidentiality, integrity, and authentication | |
| Hardjono et al. | Privacy-preserving claims exchange networks for virtual asset service providers | |
| Amujo et al. | Development of a national identity management system using blockchain technology | |
| Rech et al. | A decentralized service-platform towards cross-domain entitlement handling | |
| Pärni | On self-sovereign identity: Verifiable credentials and presentations with OpenID connect | |
| Agrawal¹ et al. | Blockchain based access control systems | |
| Papanchev | An interoperable access control system based on self-sovereign identities | |
| Babu et al. | Secure exchange and effectual verification of educational academic records using hyperledger fabric block chain system | |
| Azeem | URS–A universal revocation service for applying in self-sovereign identity | |
| Fischer | User management of a privacy-based carpooling platform |