P325 - Open Identity Summit 2022

Permanent URI for this collectionhttps://dl.gi.de/handle/20.500.12116/38695

Authors with most Documents  

Browse

Search Results

1 - 2 of 2
  • Conference Paper
    A user-centric approach to IT-security risk analysis for an identity management solution
    (Gesellschaft für Informatik e.V., 2022) Fähnrich, Nicolas; Winterstetter, Matthias; Kubach, Michael; Roßnagel, Heiko; Schunck, Christian H.; Mödersheim, Sebastian
    In order to build identity management (IdM) solutions that are secure in the practical application context, a holistic approach their IT-security risk analysis is required. This complements the indispensable technical, and crypto-focused analysis of risks and vulnerabilities with an approach that puts another important vector for security in the center: the users and their usage of the technology over the whole lifecycle. In our short paper we focus exclusively on the user-centric approach and present an IT-security risk analysis that is structured around the IdM lifecycle.
  • Conference Paper
    A novel approach to establish trust in verifiable credential issuers in Self-sovereign identity ecosystems using TRAIN
    (Gesellschaft für Informatik e.V., 2022) Johnson Jeyakumar, Isaac H.; Chadwick, David W.; Kubach, Michael; Roßnagel, Heiko; Schunck, Christian H.; Mödersheim, Sebastian
    Self-sovereign identity (SSI) promises to bring decentralized privacy friendly identity management (IdM) ecosystems to everyone. Yet, trust management in SSI remains challenging. In particular, it lacks a holistic approach that combines trust and governance frameworks. A practical and scalable mechanism is needed for verifiers to externally verify their trust in credential issuers. This paper illustrates how TRAIN (Trust mAnagement INfrastructure), an approach based on established components like ETSI trust lists and the Domain Name System (DNS), can be used as a trust registry component to provide a holistic approach for trust management in SSI ecosystems. TRAIN facilitates individual trust decisions through the discovery of trust lists in SSI ecosystems, along with published credential schemas, so that verifiers can perform informed trust decisions about issued credentials.
Load citations