


default search action
Open Identity Summit 2022: Copenhagen, Denmark
- Heiko Roßnagel, Christian H. Schunck, Sebastian Mödersheim:
Open Identity Summit 2022, Copenhagen, Denmark, July 7-8, 2022. LNI P-325, Gesellschaft für Informatik e.V. 2022, ISBN 978-3-88579-719-7 - Lothar Fritsch, Marie Mecaliff, Kathinka Wik Opdal, Mathias Rundgreen, Toril Sachse:
Towards robustness of keyboard-entered authentication factors with thermal wiping against thermographic attacks. 15-26 - Isaac Henderson Johnson Jeyakumar
, David W. Chadwick, Michael Kubach:
A novel approach to establish trust in verifiable credential issuers in Self-sovereign identity ecosystems using TRAIN. 27-38 - Nikos Fotiou, Evgenia Faltaka, Vasilis Kalos, Anna S. Kefala, Iakovos Pittaras, Vasilios A. Siris, George C. Polyzos:
Continuous authorization over HTTP using Verifiable Credentials and OAuth 2.0. 39-50 - Michael Kuperberg, Robin Klemens:
Integration of Self-Sovereign Identity into Conventional Software using Established IAM Protocols: A Survey. 51-62 - Steffen Schwalm, Daria Albrecht, Ignacio Alamillo:
eIDAS 2.0: Challenges, perspectives and proposals to avoid contradictions between eIDAS 2.0 and SSI. 63-74 - Kim Valerie Carl, Timothy M. C. Zilcher, Oliver Hinz:
Corporate Digital Responsibility and the current Corporate Social Responsibility standard: An analysis of applicability. 75-86 - Takashi Norimatsu, Yuichi Nakamura, Toshihiro Yamauchi:
Flexible Method for Supporting OAuth 2.0 Based Security Profiles in Keycloak. 87-98 - Sebastian Kurowski, Christian H. Schunck:
Risk variance: Towards a definition of varying outcomes of IT security risk assessment. 99-110 - Nicolas Fähnrich, Matthias Winterstetter, Michael Kubach:
A user-centric approach to IT-security risk analysis for an identity management solution. 113-118 - Andrea Horch, Christian H. Schunck, Christopher Ruff:
Adversary Tactics and Techniques specific to Cryptocurrency Scams. 119-124 - Hermann Strack, Sebastian Karius
, Marlies Gollnick, Meiko Lips, Sandro Wefel, Robert Altschaffel:
Preservation of (higher) Trustworthiness in IAM for distributed workflows and systems based on eIDAS. 125-130 - Nicolas Fähnrich, Heiko Roßnagel:
Online tool for matching company demands with IT-security offerings. 131-136 - Paul Bastian, Carsten Stöcker, Steffen Schwalm:
Combination of x509 and DID/VC for inheritance properties of trust in digital identities. 137-142

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.