[HTML][HTML] The construction of self-sovereign identity: Extending the interpretive flexibility of technology towards institutions

L Weigl, T Barbereau, G Fridgen - Government Information Quarterly, 2023 - Elsevier
Ever-growing concerns over 'Big Brother'continue driving individuals towards user-centric
identity management systems. Nascent innovations are framed as offering Self-Sovereign …

[HTML][HTML] Digital authentication system in avatar using DID and SBT

G Kim, J Ryou - Mathematics, 2023 - mdpi.com
Anonymity forms the basis of decentralized ecosystems, leading to an increase in criminal
activities such as money laundering and illegal currency trading. Especially in blockchain …

“Who Should I Trust with My Data?” Ethical and Legal Challenges for Innovation in New Decentralized Data Management Technologies

H Asgarinia, A Chomczyk Penedo, B Esteves, D Lewis - Information, 2023 - mdpi.com
News about personal data breaches or data abusive practices, such as Cambridge
Analytica, has questioned the trustworthiness of certain actors in the control of personal …

Wallet wars or digital public infrastructure? Orchestrating a digital identity data ecosystem from a government perspective

K Degen, T Teubner - Electronic Markets, 2024 - Springer
Abstract With the eIDAS 2.0 legislation, the European Union seeks to establish a digital
identity data ecosystem and to empower citizens to manage digital credentials from various …

[HTML][HTML] A Comparative Survey of Centralised and Decentralised Identity Management Systems: Analysing Scalability, Security, and Feasibility

A Goel, Y Rahulamathavan - Future Internet, 2024 - mdpi.com
Traditional identity management (IdM) solutions based on centralised protocols, such as
Lightweight Directory Access Protocol (LDAP) and Security Assertion Markup Language …

[HTML][HTML] The Implementation of Federated Digital Identifiers in Health Care: Rapid Review

K Ramamoorthi, V Stamenova, RH Liu… - Journal of Medical …, 2024 - jmir.org
Background Federated digital identifiers (FDIs) have been cited to improve the
interoperability of data and information management while enhancing the privacy of …

Decentralized Credential Status Management: A Paradigm Shift in Digital Trust

P Herbke, T Cory, M Migliardi - 2024 6th Conference on …, 2024 - ieeexplore.ieee.org
Public key infrastructures are essential for Internet security, ensuring robust certificate
management and revocation mechanisms. The transition from centralized to decentralized …

[PDF][PDF] Trustworthy Age Assurance? A risk-based evaluation of available and upcoming age assurance technologies from a fundamental rights perspective.

M Sas, JT Mühlberg - 2024 - lirias.kuleuven.be
Children represent a substantial portion of internet users, which creates an imperative to
create a safe and secure online environment. Harmful content, however, is easily …

[PDF][PDF] Trustworthy Age Assurance?

M Sas, JT Mühlberg - The Greens Cluster: Social & Economy …, 2024 - greens-efa.eu
Children represent a substantial portion of internet users, which creates an imperative to
create a safe and secure online environment. Harmful content, however, is easily …

Designing digital identity infrastructure: A taxonomy of strategic governance choices

A Amard, E Hartwich, A Hoess, A Rieger, T Roth… - 2024 - scholarspace.manoa.hawaii.edu
Governments around the world increasingly deploy digital identity infrastructure. These
initiatives are considered a fundamental building block for their citizens to reap the benefits …