Identity Management through a global Discovery System based on Decentralized Identities

Digital identities today continue to be a company resource instead of belonging to the actual person they represent. At the same time, the digitalization of everyday services intensifies the Identity Management problem and leads to a constant increase of users online identities and identity related data. This paper presents DIMANDS2, a framework capable of organizing identity data that allows service providers and identity issuers securely exchange identity related information in a privacy-enabled manner while the user maintains full control over any activity related to his/her identity data. The framework is format-agnostic and can accommodate any type of identifier (existing or new), without requiring from existing services and providers to implement and adopt another new global identifier.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
12/05/2017

Self-sovereign Identity - Opportunities and Challenges for the Digital Revolution

The interconnectedness of people, services and devices is a defining asp...
research
01/01/2023

TaxIdMA: Towards a Taxonomy for Attacks related to Identities

Identity management refers to the technology and policies for the identi...
research
11/23/2022

A new Privacy Preserving and Scalable Revocation Method for Self Sovereign Identity – The Perfect Revocation Method does not exist yet

Digital Identities are playing an essential role in our digital lives. T...
research
01/01/2023

An Overview of Limitations and Approaches in Identity Management

Identity and access management (I AM) is the umbrella term for managin...
research
03/01/2019

TEEvil: Identity Lease via Trusted Execution Environments

We investigate identity lease, a new type of service in which users leas...
research
05/27/2022

Subverting machines, fluctuating identities: Re-learning human categorization

Most machine learning systems that interact with humans construct some n...
research
01/04/2019

Off-Policy Evaluation of Probabilistic Identity Data in Lookalike Modeling

We evaluate the impact of probabilistically-constructed digital identity...

Please sign up or login with your details

Forgot password? Click here to reset