Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Digital identity
biblio
Governing Principles of Self-Sovereign Identity Applied to Blockchain Enabled Privacy Preserving Identity Management Systems
Submitted by grigby1 on Mon, 03/29/2021 - 1:22pm
IdM
uPort
SSI ecosystem
SSI
Sovrin
Self-Sovereign Identity
Scalability
Resiliency
resilience
Reliability
pubcrawl
privacy
Principles of SSI
numerous governing principles
IDM systems
IDM system
Analytical models
identity management system
Identity management
Human behavior
federated identity management
Ecosystems
distributed ledger
digital transformation
digital services
Digital identity
digital form
data privacy
Cryptography
blockchain enabled privacy preserving identity management systems
blockchain
authorisation
biblio
Using Probabilistic Attribute Aggregation for Increasing Trust in Attribute Assurance
Submitted by aekwall on Mon, 07/13/2020 - 10:19am
online services
aggregation model
attribute aggregation method
attribute assurance
Credit cards
decentralized peer to peer scheme
Digital identity
identity assurance
identity management attribute aggregation
Aggregates
probabilistic attribute aggregation
self-sovereign identity solutions
Service Provisioning
statistical distributions
trust demand
trust requirement
trusted third party
trust
Trusted Computing
Resiliency
pubcrawl
composability
Peer-to-peer computing
internet
authentication
service providers
security of data
Probabilistic logic
Logic gates
trust model
Identity management
Identity provider
probability distributions
web of trust
biblio
Implementation and Evaluation of a Multi-Factor Web Authentication System with Individual Number Card and WebUSB
Submitted by aekwall on Mon, 02/10/2020 - 11:03am
integrated circuits
WebUSB
public personal identification service
multifactor web authentication system
Multi-factor authentication
Individual Number Card
cryptographic authenticator
multifactor authentication
Pins
Digital identity
Human Factors
Servers
Public key
password
authentication
Cybersecurity
Internet users
internet
Metrics
pubcrawl
Resiliency
Cryptography
biblio
Analysis of Identity Management Systems Using Blockchain Technology
Submitted by grigby1 on Tue, 01/21/2020 - 10:35am
internet
User control
uPort
Sovrin
ShoCard
Self-Sovereign Identity
security challenges
Scalability
resilience
pubcrawl
privacy
Peer-to-peer computing
authorisation
identity management systems
Identity management
Human behavior
Distributed databases
Digital identity
data privacy
Cryptography
blockchain technology
blockchain infrastructures
blockchain
Biological system modeling
biblio
Privacy and Identity Management in Learning Analytics Processes with Blockchain
Submitted by grigby1 on Tue, 11/19/2019 - 2:38pm
blockchain
collaboration
data privacy
data security management
Digital identity
Governance
learning analytics
Policy Based Governance
pubcrawl
biblio
RDI: Real Digital Identity Based on Decentralized PKI
Submitted by aekwall on Mon, 11/18/2019 - 10:49am
Brute-force Attack
PKI Trust Models
username-password approach
trusted source certificate authorities
Real Digital Identity based approach
RDI
public key binding
public key approach
point of trust attack
online transactions
Online banking
Internet banking applications
Digital identity
decentralized PKI scheme
decentralized PKI
automobiles
Registers
public key cryptography
Public key
smart contracts
message authentication
smart contract
blockchain
Metrics
pubcrawl
Human behavior
Resiliency
authorisation
Scalability
biblio
Recovery of Encrypted Mobile Device Backups from Partially Trusted Cloud Servers
Submitted by grigby1 on Fri, 03/22/2019 - 11:36am
biometric encryption
Cloud backup
Digital identity
Metrics
Password-Protected Secret Sharing
pubcrawl
resilience
Resiliency
Scalability
Secret key reconstruction