Analyzing and comparing the security of self-sovereign identity management systems through threat modeling