-
TEEvil: Identity Lease via Trusted Execution Environments
We investigate identity lease, a new type of service in which users leas...
read it
-
Identity and Personhood in Digital Democracy: Evaluating Inclusion, Equality, Security, and Privacy in Pseudonym Parties and Other Proofs of Personhood
Digital identity seems like a prerequisite for digital democracy: how ca...
read it
-
Trust Infrastructures for Virtual Asset Service Providers
Virtual asset service providers (VASPs) currently face a number of chall...
read it
-
Digital Identity: The Effect of Trust and Reputation Information on User Judgement in the Sharing Economy
The Sharing Economy (SE) is a growing ecosystem focusing on peer-to-peer...
read it
-
Self-sovereign Identity - Opportunities and Challenges for the Digital Revolution
The interconnectedness of people, services and devices is a defining asp...
read it
-
Two-tier blockchain timestamped notarization with incremental security
Digital notarization is one of the most promising services offered by mo...
read it
-
Model of Trust Management for Digital Industry Services. Towards E-Commerce 4.0
The progressive digitalization is changing the way businesses work and i...
read it
TAPESTRY: A Blockchain based Service for Trusted Interaction Online
We present a novel blockchain based service for proving the provenance of online digital identity, exposed as an assistive tool to help non-expert users make better decisions about whom to trust online. Our service harnesses the digital personhood (DP); the longitudinal and multi-modal signals created through users' lifelong digital interactions, as a basis for evidencing the provenance of identity. We describe how users may exchange trust evidence derived from their DP, in a granular and privacy-preserving manner, with other users in order to demonstrate coherence and longevity in their behaviour online. This is enabled through a novel secure infrastructure combining hybrid on- and off-chain storage combined with deep learning for DP analytics and visualization. We show how our tools enable users to make more effective decisions on whether to trust unknown third parties online, and also to spot behavioural deviations in their own social media footprints indicative of account hijacking.
READ FULL TEXT
Comments
There are no comments yet.