Vis enkel innførsel

dc.contributor.authorFritsch, Lothar
dc.date.accessioned2023-06-20T08:30:30Z
dc.date.available2023-06-20T08:30:30Z
dc.date.created2023-06-13T17:27:13Z
dc.date.issued2023
dc.identifier.isbn978-3-88579-729-6
dc.identifier.issn1617-5468
dc.identifier.urihttps://hdl.handle.net/11250/3072222
dc.description.abstractA National Digital Identity Framework should be designed in a proactive manner, should focus on a resilience-oriented approach, and should be aimed at limiting the risks that may originate from identity data management [IT18]. What is the preparedness of digital identity providers for recovery from compromise that affects large numbers of identities? Failures or attacks may destroy authenticators, data or trust chains that are the foundations of large identity ecosystems. The re-issuance of digital identities, of authenticators or the re-enrollment of the user base should get planned as contingency measures. Important parameters will be recovery time, complexity of re-registering subjects, distribution of effort between certification authorities, registrars and relying parties, and the availability of alternative technologies and staff resources. The article will, based on a review of standards and requirements documents, present evidence for a shortage of recovery readiness that endangers relying parties and identity ecosystems. From a review of standards and practice, we extract recovery procedures as far as they are planned for.en_US
dc.language.isoengen_US
dc.publisherGesellschaft für Informationen_US
dc.relation.ispartofOpen Identity Summit 2023
dc.relation.ispartofseriesLecture Notes in Informatics;
dc.relation.urihttps://dl.gi.de/handle/20.500.12116/41687
dc.rightsNavngivelse-DelPåSammeVilkår 4.0 Internasjonal*
dc.rights.urihttp://creativecommons.org/licenses/by-sa/4.0/deed.no*
dc.titleElectronic identity mass compromize: Options for recoveryen_US
dc.typeChapteren_US
dc.typePeer revieweden_US
dc.description.versionpublishedVersionen_US
cristin.ispublishedtrue
cristin.fulltextpostprint
cristin.qualitycode1
dc.identifier.doihttp://dx.doi.org/10.18420/OID2023_13
dc.identifier.cristin2154242
dc.source.journalLecture Notes in Informaticsen_US
dc.source.pagenumber141-146en_US


Tilhørende fil(er)

Thumbnail

Denne innførselen finnes i følgende samling(er)

Vis enkel innførsel

Navngivelse-DelPåSammeVilkår 4.0 Internasjonal
Med mindre annet er angitt, så er denne innførselen lisensiert som Navngivelse-DelPåSammeVilkår 4.0 Internasjonal