Self-Sovereign Identity Specifications: Govern Your Identity Through Your Digital Wallet using Blockchain Technology
暂无分享,去创建一个
[1] Nitin Naik,et al. Choice of suitable Identity and Access Management standards for mobile computing and communication , 2017, 2017 24th International Conference on Telecommunications (ICT).
[2] Nitin Naik,et al. A Secure Mobile Cloud Identity: Criteria for Effective Identity and Access Management Standards , 2016, 2016 4th IEEE International Conference on Mobile Cloud Computing, Services, and Engineering (MobileCloud).
[3] Nitin Naik,et al. An Analysis of Open Standard Identity Protocols in Cloud Computing Security Paradigm , 2016, 2016 IEEE 14th Intl Conf on Dependable, Autonomic and Secure Computing, 14th Intl Conf on Pervasive Intelligence and Computing, 2nd Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress(DASC/PiCom/DataCom/CyberSciTech).
[4] Nitin Naik,et al. Securing digital identities in the cloud by selecting an apposite Federated Identity Management from SAML, OAuth and OpenID Connect , 2017, 2017 11th International Conference on Research Challenges in Information Science (RCIS).
[5] K. Cameron,et al. The Laws of Identity , 2005 .