Abstract is missing.
- Open Identity Summit 2021 - Complete Volume [doi]
- Mapping Identity Management in Data LakesJan Zibuschka, Lothar Fritsch. 15-24 [doi]
- Complexities of Identity Provenance MetadataRadovan Semancík. 25-36 [doi]
- Towards the COSCA framework for "COnseptualing Secure CArs"Giampaolo Bella, Pietro Biondi, Gianpiero Costantino, Ilaria Matteucci, Mirco Marchetti. 37-46 [doi]
- Decentralized Identities for Self-sovereign End-users (DISSENS)Martin Schanzenbach, Christian Grothoff, Hansjürg Wenger, Maximilian Kaul. 47-58 [doi]
- Evaluation of Account Recovery Strategies with FIDO2-based Passwordless AuthenticationJohannes Kunke, Stephan Wiefling, Markus Ullmann, Luigi Lo Iacono. 59-70 [doi]
- FAPI 2.0: A High-Security Profile for OAuth and OpenID ConnectDaniel Fett. 71-82 [doi]
- How Quantum Computers threat security of PKIs and thus eIDsSebastian Vogt, Holger Funke. 83-94 [doi]
- Self-sovereign identity systems and European data protection regulations: an analysis of roles and responsibilitiesAndrés Chomczyk Penedo. 95-106 [doi]
- Adapting the TPL Trust Policy Language for a Self-Sovereign Identity WorldLukas Alber, Stefan More, Sebastian Mödersheim, Anders Schlichtkrull. 107-118 [doi]
- DAMA - A transparent meta-assistant for data self-determination in smart environmentsChristopher Ruff, Andrea Horch, Benedict Benthien, Wulf Loh, Alexander Orlowski. 119-130 [doi]
- Records Management and Long-Term Preservation of Evidence in DLTTomasz Kusber, Steffen Schwalm, Ulrike Korte, Kalinda Schamburger. 131-142 [doi]
- On the Market for Self-Sovereign Identity: Structure and StakeholdersMichael Kubach, Rachelle Sellung. 143-154 [doi]
- A lightweight trust management infrastructure for self-sovereign identityMichael Kubach, Heiko Roßnagel. 155-166 [doi]
- Applying assurance levels when issuing and verifying credentials using Trust FrameworksVictor Martinez Jurado, Xavier Vilà, Michael Kubach, Isaac Henderson Johnson Jeyakumar, Albert Solana, Matteo Marangoni. 167-178 [doi]
- Extraction and Accumulation of Identity Attributes from the Internet of ThingsLothar Fritsch, Nils Gruschka. 179-192 [doi]
- Managing authorization grants beyond OAuth 2Fabien Imbault, Justin Richer, Aaron Parecki. 193-198 [doi]
- Why should they care? Conceptualizing the challenges of information security trainingSebastian Kurowski, Fatma Cetin, Rudolf Fischer. 199-204 [doi]
- Analyzing Requirements for Post Quantum Secure Machine Readable Travel DocumentsFrank Morgner, Jonas von der Heyden. 205-210 [doi]
- Role of Identity, Identification, and Receipts for ConsentHarshvardhan J. Pandit, Vitor Jesus, Shankar Ammai, Mark Lizar, Salvatore D'Agostino. 211-216 [doi]
- Permission and Privacy Challenges in Alternate-Tenant Smart SpacesVitor Jesus, Catarina Silva, João Paulo Barraca, Gilad Rosner, Antonio Nehme, Muhammad Waqas, Rui L. Aguiar. 217-222 [doi]
- "When need becomes necessity" - The Single Digital Gateway Regulation and the Once-Only Principle from a European Point of ViewCarsten Schmidt, Robert Krimmer, Thomas J. Lampoltshammer. 223-228 [doi]