Our demo showcases how a user is granted access to resources stored on a Solid Pod, i. e., a web server that adheres to the Solid Protocol, using Web-based Verifiable Credentials. To protect the privacy of the user, we rely on the BBS+ signatures scheme allowing for selective disclosure of only those attributes necessary. We present a PWA where a user can (a) request a Verifiable Credential from another user, (b) store it on their own Solid Pod, and (c) use it to gain access to a resource on a third user’s Solid Pod
With the rise of information and communication technologies, the need to authenticate individuals to...
The ubiquity of the Internet has led to increased resource sharing between large numbers of users in...
Attribute-based credentials (ABCs) are building blocks for user-centric identity management. They en...
This electronic version was submitted by the student author. The certified thesis is available in th...
Abstract—In an open environment such as the Internet, the decision to collaborate with a stranger (e...
This paper describes ongoing research and development aimed at creating a trustworthy software-based...
The Solid specification aims to empower data subjects by giving them direct access control over thei...
In automated trust negotiation, two parties exchange digitally signed credentials that contain attri...
The advancements in ICT allow people to use and access resources and services on the web anywhere an...
Attribute-based Credentials (ABCs) are a promising technology for protecting users' privacy and digi...
Digital identities and credentials are gradually replacing physical documents, as they can be verifi...
Many service systems rely on verifiable identity-related information of their users. Manipulation an...
As the web has become a place for sharing of information and resources across varied domains, there ...
Lack of standardization and the subsequent difficulty of integration has been one of the main reason...
A lately suggested access control model known as attribute-based access control is a good candidate ...
With the rise of information and communication technologies, the need to authenticate individuals to...
The ubiquity of the Internet has led to increased resource sharing between large numbers of users in...
Attribute-based credentials (ABCs) are building blocks for user-centric identity management. They en...
This electronic version was submitted by the student author. The certified thesis is available in th...
Abstract—In an open environment such as the Internet, the decision to collaborate with a stranger (e...
This paper describes ongoing research and development aimed at creating a trustworthy software-based...
The Solid specification aims to empower data subjects by giving them direct access control over thei...
In automated trust negotiation, two parties exchange digitally signed credentials that contain attri...
The advancements in ICT allow people to use and access resources and services on the web anywhere an...
Attribute-based Credentials (ABCs) are a promising technology for protecting users' privacy and digi...
Digital identities and credentials are gradually replacing physical documents, as they can be verifi...
Many service systems rely on verifiable identity-related information of their users. Manipulation an...
As the web has become a place for sharing of information and resources across varied domains, there ...
Lack of standardization and the subsequent difficulty of integration has been one of the main reason...
A lately suggested access control model known as attribute-based access control is a good candidate ...
With the rise of information and communication technologies, the need to authenticate individuals to...
The ubiquity of the Internet has led to increased resource sharing between large numbers of users in...
Attribute-based credentials (ABCs) are building blocks for user-centric identity management. They en...