Dmitrij Lagutin, Yki Kortesniemi, Nikos Fotiou and Vasilios A. Siris

Decentralised identifiers (DIDs) and verifiable credentials (VCs) are upcoming standards for self-sovereign privacy preserving identifiers and authorisation, respectively. This focus on privacy can help improve many services and open up new business models, but using DIDs and VCs directly on constrained IoT devices can be problematic due to the management and resource overhead. This paper presents an OAuth-based method to delegate the processing and access policy management to the Authorisation Server thus allowing also systems with constrained IoT devices to benefit from DIDs and VCs.

View More Papers

Tattle Tale Security: An Intrusion Detection System for Medical...

Lanier Watkins, Shreya Aggarwal, Omotola Akeredolu, William H. Robinson and Aviel Rubin

Read More

ADROIT: Detecting Spatio-Temporal Correlated Attack-Stages in IoT Networks

Dinil Mon Divakaran (Trustwave, Singapore); Rhishi Pratap Singh, Kushan Sudheera Kalupahana Liyanage, Mohan Gurusamy (National University of Singapore, Singapore); Vinay Sachidananda (Trustwave, Singapore)

Read More

Identity and Privacy vs. economic efficiency in the worldwide...

Prof. Virgil Gligor (CMU), Prof. Pekka Nikander (Aalto U.), Dr. Dmitrij Lagutin (Aalto U.), Dr. Michal Krol (UCL)

Read More

Information Leaks in Sequential Federated Learning

Anastassiya Pustozerova and Rudolf Mayer (SBA Research, Austria)

Read More