New Search

If you are not happy with the results below please do another search

7 search results for:

1

What contemporary identity management must fulfil

With increasing data protection requirements, it is becoming more and more important to take the data sovereignty of users into account. Therefore, user-centric approaches are being discussed in identity management that ensure user privacy in addition to overall system security. An identity holder should disclose as little information as possible to an auditing service and, […]

2

Will “Verifiable Credentials” replace X.509 certificates in the future?

X.509 certificates have been around for over 40 years. They are used for the identification of subjects (web servers, persons, etc.). They are considered trusted and proven credentials and we rely on them every day. So why introduce Verifiable Credentials (VC), a new technology unknown to the general public? In order to be able to […]

3

Centralised or decentralised identity?

In recent years, the term “decentralised identity” has appeared more and more frequently in discussions about electronic identities. This is also the case in the currently published “Target Image E-ID”, which is intended to publicly discuss the vision for a state electronic identity in Switzerland. What is hidden behind the term? What are the advantages […]

6

Self-Sovereign Identities – Will we control our identity ourselves in the future?

In the real world we can identify ourselves easily and securely, but in the virtual world we still cannot. For digital identification, there are now several variants, but not always satisfactory. Now, self-sovereign identity seems to be gaining acceptance. Our author, BFH researcher Gerhard Hassenstein, explains what it has over the other concepts. Decentralised identities […]