New Search

If you are not happy with the results below please do another search

54 search results for:

31

Self-Sovereign Identities – Will we control our identity ourselves in the future?

In the real world we can identify ourselves easily and securely, but in the virtual world we still cannot. For digital identification, there are now several variants, but not always satisfactory. Now, self-sovereign identity seems to be gaining acceptance. Our author, BFH researcher Gerhard Hassenstein, explains what it has over the other concepts. Decentralised identities […]

32

Secure identities are needed for the trust of customers

Isolated, centralised or decentralised – here, two researchers from BFH Technik und Informatik compare the advantages and disadvantages of the different solutions for identification Identity management refers to processes and services that deal with the collection, administration and use of electronic identities. An electronic identity management system must find the right balance between user-friendliness, security […]

33

February issue: About digital identities

It has become a matter of course in our daily lives to chat, make phone calls, shop, watch videos and listen to music via smartphone. Use is only limited by the battery level of the smartphone or the network coverage of the mobile phone provider. At the same time, there is a growing desire among […]

34

December Issue: Cybersecurity – exemplum docet, exempla obscurant

We are living in times of disagreement. Silicon Valley has turned rule braking into everybody’s practice. “We have to move fast, we have to conquer power as soon as possible, we have to establish us …” that is what many people tend to think these days. Indeed, the digital transformation is increasing heterogenity, transparency, and […]

35

Companies must also protect robots from cyberattacks

Robots are the interface through which IT systems have a very concrete impact on the real world. Until now, dangers to humans and the environment have been minimised through strict isolation. With increasing networking, new technologies and forms of cooperation, this isolation is being broken down. This places new demands on cyber security. Until a […]

36

How companies handle electronic business processes securely

The expansion of the Swissdec information platform places new security requirements on the identification and authentication of participating companies. The Swissdec Enterprise Authentication (SUA) comprises the processes for registration, configuration as well as renewal and revocation, which allow a company to obtain a Swissdec Enterprise Certificate and thus make the data exchange secure and binding. […]