Login / Signup

Analyzing and comparing the security of self-sovereign identity management systems through threat modeling.

Andreas GrünerAlexander MühleNiko LockenvitzChristoph Meinel
Published in: Int. J. Inf. Sec. (2023)
Keyphrases
  • identity management
  • access control
  • security systems
  • trade off
  • management system
  • distributed systems
  • intelligent systems
  • computer systems
  • personal information
  • critical infrastructure
  • security measures