Qualified Ledgers - Breakthrough for proven security and legal trust in DLT through eIDAS2 Regulation?
Ignacio AlamilloSteffen SchwalmCarsten StöckerRicky ThiermannPublished in: Open Identity Summit (2024)
Keyphrases
- electronic transactions
- security services
- trust relationships
- trusted computing
- access control
- public key infrastructure
- electronic commerce
- information security
- trust management
- trust model
- trust negotiation
- policy enforcement
- security issues
- security requirements
- security management
- trust evaluation
- intrusion detection
- computer security
- security mechanisms
- security policies
- data protection
- key management
- legal cases
- access control models
- security protocols
- privacy concerns
- legal knowledge
- statistical databases
- personal information
- enterprise network
- network security
- computer networks