Author of the publication

Establishing Trust in SSI Verifiers.

, , , and . Open Identity Summit, volume P-335 of LNI, Gesellschaft für Informatik e.V., (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Open ecosystem platforms for assistants and IoT-devices: a look into corporate practice., and . Open Identity Summit, volume P-277 of LNI, page 159-166. GI, (2017)Enabling SMEs to comply with the complex new EU data protection regulation., and . Open Identity Summit, volume P-293 of LNI, page 177-183. GI, (2019)Service providers' requirements for eid solutions: empirical evidence from the leisure sector., , and . Open Identity Summit, volume P-223 of LNI, page 69-81. GI, (2013)A Trust Registries Enrollment Tool Supporting Decentralized Ecosystem Governance: Use Case Healthcare., , , and . Open Identity Summit, volume P-350 of LNI, page 103-114. Gesellschaft für Informatik e.V., (2024)Secure cloud computing with skidentity: A cloud-teamroom for the automotive industry., , and . Open Identity Summit, volume P-237 of LNI, page 39-49. GI, (2014)Realisierung von vertrauenswürdigem Cloud-Computing mit SkIDentity: Der Anwendungsfall in Wertschöpfungsketten der Automobilindustrie., , , and . GI-Jahrestagung, volume P-232 of LNI, page 271-276. GI, (2014)A shared responsibility model to support cross border and cross organizational federation on top of decentralized and self-sovereign identity: Architecture and first PoC., , , , , , and . Open Identity Summit, volume P-335 of LNI, Gesellschaft für Informatik e.V., (2023)A lightweight trust management infrastructure for self-sovereign identity., and . Open Identity Summit, volume P-312 of LNI, page 155-166. Gesellschaft für Informatik e.V., (2021)A user-centric approach to IT-security risk analysis for an identity management solution., , and . Open Identity Summit, volume P-325 of LNI, page 113-118. Gesellschaft für Informatik e.V., (2022)Consumer-Based Ranking for Strategic Selection of IoT Business Models., , and . ICIS, Association for Information Systems, (2019)