Author of the publication

Establishing Trust in SSI Verifiers.

, , , and . Open Identity Summit, volume P-335 of LNI, Gesellschaft für Informatik e.V., (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Recognition of Authority in Virtual Organisations., , and . TrustBus, volume 4657 of Lecture Notes in Computer Science, page 3-13. Springer, (2007)Using WebDAV for Improved Certificate Revocation and Publication., and . EuroPKI, volume 4582 of Lecture Notes in Computer Science, page 265-279. Springer, (2007)Merging and extending the PGP and PEM trust models-the ICE-TEL trust model., , and . IEEE Netw., 11 (3): 16-24 (1997)Managing the X.500 Root Naming Context.. RFC, (March 1997)PERMIS: a modular authorization infrastructure., , , , , and . Concurr. Comput. Pract. Exp., 20 (11): 1341-1357 (2008)Authorisation in Grid computing.. Inf. Secur. Tech. Rep., 10 (1): 33-40 (2005)A novel approach to establish trust in verifiable credential issuers in Self-sovereign identity ecosystems using TRAIN., , and . Open Identity Summit, volume P-325 of LNI, page 27-38. Gesellschaft für Informatik e.V., (2022)Establishing Trust in SSI Verifiers., , , and . Open Identity Summit, volume P-335 of LNI, Gesellschaft für Informatik e.V., (2023)Enabling the Internet White Pages Service - the Directory Guardian., and . NDSS, The Internet Society, (1998)Automated Decomposition of Access Control Policies., , , and . POLICY, page 3-13. IEEE Computer Society, (2005)