Login / Signup
Analyzing and comparing the security of self-sovereign identity management systems through threat modeling.
Andreas Grüner
Alexander Mühle
Niko Lockenvitz
Christoph Meinel
Published in:
Int. J. Inf. Sec. (2023)
Keyphrases
</>
identity management
access control
security systems
trade off
management system
distributed systems
intelligent systems
computer systems
personal information
critical infrastructure
security measures