Self-Sovereign Identity: A Systematic Review, Mapping and Taxonomy
Abstract
:1. Introduction
Novelty and Research Contributions
- Our survey examines both conceptual and practical advances in SSI, highlighting philosophical contributions to the definition of SSI, novel problems and proposed solutions, and promising directions for future research. The manuscript conducts an analysis of the body of knowledge established by over 80 research papers, scientific reports, patents, technological standards, and theses.
- Through a proposed taxonomy, we provide the reader with a comprehensive and organized understanding of the SSI literature. Additionally, the manuscript presents and discusses maps of authors’ relationships, publication venues, and the shift in the focus of research in the area over time. To our knowledge, this is the first survey of SSI to include a systematic literature review, a systematic mapping, and a taxonomy, all of which are based on rigorous criteria and reproducible methodology.
2. Preliminaries
2.1. Identity Documents
2.2. Electronic Identity
2.3. The Evolution of IAM Models
2.4. Self-Sovereign Identity
3. Related Work
4. Method
4.1. Planning
4.1.1. Research Questions
- RQ-1: What practical problems have been introduced and solved?
- RQ-2: What properties, formal definitions, and cryptographic tools have been used?
- RQ-3: What conceptual ideas have been introduced or refuted?
- RQ-4: When, where, and by whom were SSI studies published?
4.1.2. Search Strategy
self-sovereign identity OR self sovereign identity OR self-sovereignty OR self sovereignty |
4.1.3. Study Selection
4.1.4. Data Extraction
4.1.5. Taxonomy
4.2. Execution
4.2.1. Search Execution
4.2.2. Study Selection and Data Extraction
4.2.3. Threats to Validity
4.2.4. Findings
5. Taxonomy of Self-Sovereign Identity
6. RQ-1: What Practical Problems Have Been Introduced and Solved?
6.1. Management
6.1.1. Metadata Search
6.1.2. Protocol Integration
6.1.3. Identity Derivation
6.1.4. Wallet Security
6.1.5. Auditability
6.1.6. Credential as a Service
6.2. Operational
6.2.1. Verifiable Credentials
6.2.1.1. Revocation
6.2.1.2. Decentralized Identifiers
6.2.1.3. Issuer Authorization
6.2.1.4. Delegation
6.2.1.5. Backup and Recovery
6.2.2. Verifiable Presentation
6.2.2.1. Revocation
6.2.2.2. Verifier Authorization
6.2.2.3. Data Minimization
6.2.2.4. Reuse Prevention
6.3. System Design
6.3.1. SSI Design/Architecture
6.3.2. HCI
6.3.3. Risk Assessment and Threat/Attack Model
6.4. Trust
6.4.1. Reputation Model
6.4.2. Trust Policy Evaluation
7. RQ-2: What Properties, Formal Definitions and Cryptographic Tools Have Been Used?
8. RQ-3: What Conceptual Ideas Have Been Introduced or Refuted?
8.1. Add
8.1.1. Functional
8.1.2. Non-Functional
8.2. Refute
9. RQ-4: When, Where, and by Whom Were SSI Studies Published?
9.1. Frequency of Publication
Year | Total | Studies |
---|---|---|
2016 | 2 | [198,208] |
2017 | 5 | [58,197,201,202,204] |
2018 | 5 | [19,73,107,112,125] |
2019 | 14 | [59,60,66,67,91,95,99,103,122,128,134,147,148,200] |
2020 | 19 | [98,102,106,108,109,114,117,123,126,127,130,133,140,142,143,146,199,203,205] |
2021 | 37 | [65,92,93,94,96,97,100,101,104,105,110,111,113,115,116,118,119,120,121,124,129,131,132,135,136,137,138,139,141,144,145,149,150,151,152,206,207] |
9.2. Publishing Venues
9.3. Authors
10. Open Challenges
11. Final Remarks
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Acknowledgments
Conflicts of Interest
Appendix A
Venue Name | Total | Studies |
---|---|---|
Conference on Blockchain Research & Applications for Innovative Networks and Services | 2 | [102,127] |
Open Identity Summit | 2 | [144,145] |
International Conference on Information Networking | 2 | [131,151] |
IEEE Symposium Series on Computational Intelligence | 2 | [122,152] |
IEEE International Congress on Cybermatics | 2 | [112,125] |
IEEE International Conference on Blockchain and Cryptocurrency | 2 | [110,119] |
IEEE International Conference on Trust, Security and Privacy in Computing and Communications | 2 | [107,114] |
IEEE International Conference on Internet of Things: Systems, Management and Security | 1 | [91] |
IEEE International Conference on Mobile Cloud Computing, Services, and Engineering | 1 | [199] |
IEEE International Conference on Cloud Engineering | 1 | [121] |
IEEE International Symposium on Network Computing and Applications | 1 | [99] |
IEEE International Symposium on Dependable, Autonomic and Secure Computing | 1 | [134] |
IEEE International Conference on Pervasive Computing and Communications Workshops | 1 | [141] |
IEEE Annual Computers, Software, and Applications Conference | 1 | [132] |
IEEE Conference on Computer Vision and Pattern Recognition Workshops | 1 | [95] |
IEEE International Performance, Computing, and Communications Conference | 1 | [105] |
IEEE International Conference on Systems, Man, and Cybernetics | 1 | [96] |
IEEE Symposium on Computers and Communications | 1 | [104] |
IFIP International Conference on Information Security Theory and Practice | 1 | [133] |
IFIP International Summer School on Privacy and Identity Management | 1 | [203] |
IFIP International Conference on New Technologies, Mobility and Security | 1 | [137] |
ACM Celebration of Women in Computing | 1 | [111] |
International Conference on Information and Communications Security | 1 | [98] |
International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing | 1 | [136] |
International Conference on Security and Cryptography | 1 | [97] |
International Teletraffic Congress | 1 | [143] |
International Symposium on Networks, Computers and Communications | 1 | [123] |
International Conference on Business Process Management Workshops | 1 | [92] |
International Conference on Cryptology and Network Security | 1 | [118] |
Symposium on Cryptography and Information Security | 1 | [142] |
Annual Privacy Forum | 1 | [140] |
Annual Conference of the South African Institute of Computer Scientists and Information Technologists | 1 | [73] |
Rebooting the Web-of-Trust | 1 | [198] |
Gesellschaft fur Informatik (GI) | 1 | [101] |
Workshop on Decentralized IoT Systems and Security | 1 | [103] |
Facet | Total | Works |
---|---|---|
Metadata Search | 2 | [91,92] |
Protocol Integration | 11 | [99,100,101,102,103,104,105,106,107,108,109] |
Identity Derivation | 8 | [95,96,97,98,99,100,101,102] |
Wallet Security | 2 | [129,130] |
Auditability | 3 | [112,132,133] |
Credential as a Service | 3 | [119,120,121] |
Revocation | 6 | [58,98,113,114,115,116] |
Decentralized Identifiers | 7 | [59,146,147,148,149,150,151] |
Issuer Authorization | 3 | [109,110,111] |
Delegation | 5 | [73,109,111,130,131] |
Backup and Recovery | 6 | [73,133,134,135,136,137] |
Revocation | 4 | [107,108,112,113] |
Verifier Authorization | 1 | [93] |
Data Minimization | 9 | [58,65,66,67,98,112,114,117,118] |
Reuse Prevention | 1 | [94] |
SSI Design/Architecture | 6 | [58,112,126,127,128,130] |
HCI | 6 | [137,138,139,140,141,142] |
Risk Assessment | 3 | [133,151,152] |
Threat/Attack Model | 21 | [65,66,93,97,98,106,107,108,109,110,113,115,116,117,118,120,121,125,133,136,150] |
Reputation Model | 6 | [105,112,122,123,124,125] |
Trust Policy Evaluation | 8 | [99,100,101,110,142,143,144,145] |
References
- ISO Central Secretary. IT Security and Privacy—A Framework for Identity Management-Part 1: Terminology and Concepts; International Organization for Standardization: Geneva, Switzerland, 2019. [Google Scholar]
- Bertino, E.; Takahashi, K. Identity Management: Concepts, Technologies, and Systems; Artech House: London, UK, 2010. [Google Scholar]
- Allen, C. The Path to Self-Sovereign Identity. 2016. Available online: http://www.lifewithalacrity.com/2016/04/the-path-to-self-soverereign-identity.html (accessed on 13 February 2022).
- Hackett, R. LinkedIn Lost 167 Million Account Credentials in Data Breach. 2016. Available online: https://fortune.com/2016/05/18/linkedin-data-breach-email-password/ (accessed on 13 February 2022).
- Isaak, J.; Hanna, M.J. User data privacy: Facebook, Cambridge Analytica, and privacy protection. Computer 2018, 51, 56–59. [Google Scholar] [CrossRef]
- Melendez, S.; Pasternack, A. Here Are the Data Brokers Quietly Buying and Selling Your Personal Information. 2019. Available online: https://www.fastcompany.com/90310803 (accessed on 13 February 2022).
- The Sovrin Foundation. Sovrin. 2016. Available online: https://sovrin.org/ (accessed on 13 February 2022).
- uPort. uPort. 2020. Available online: https://www.uport.me/ (accessed on 13 February 2022).
- Liu, Y.; He, D.; Obaidat, M.S.; Kumar, N.; Khan, M.K.; Raymond Choo, K.K.K. Blockchain-based identity management systems: A review. J. Netw. Comput. Appl. 2020, 166, 102731. [Google Scholar] [CrossRef]
- Čučko, Š.; Turkanović, M. Decentralized and Self-Sovereign Identity: Systematic Mapping Study. IEEE Access 2021, 9, 139009–139027. [Google Scholar] [CrossRef]
- Ghaffari, F.; Gilani, K.; Bertin, E.; Crespi, N. Identity and access management using distributed ledger technology: A survey. Int. J. Netw. Manag. 2021, e2180. [Google Scholar] [CrossRef]
- Mulaji, S.S.; Roodt, S.S. The Practicality of Adopting Blockchain-Based Distributed Identity Management in Organisations: A Meta-Synthesis. Secur. Commun. Netw. 2021, 2021, 78. [Google Scholar] [CrossRef]
- Kuperberg, M. Blockchain-Based Identity Management: A Survey From the Enterprise and Ecosystem Perspective. IEEE Trans. Eng. Manag. 2019, 67, 1–20. [Google Scholar] [CrossRef]
- Zhu, X.; Badr, Y. Identity Management Systems for the Internet of Things: A Survey Towards Blockchain Solutions. Sensors 2018, 18, 4215. [Google Scholar] [CrossRef] [PubMed] [Green Version]
- Lim, S.Y.; Fotsing, P.T.; Almasri, A.; Musa, O.; Kiah, M.L.M.; Ang, T.F.; Ismail, R. Blockchain Technology the Identity Management and Authentication Service Disruptor: A Survey. Int. J. Adv. Sci. Eng. Inf. Technol. 2018, 8, 1735–1745. [Google Scholar] [CrossRef]
- Kaneriya, J.; Patel, H. A Comparative Survey on Blockchain Based Self Sovereign Identity System. In Proceedings of the 2020 3rd International Conference on Intelligent Sustainable Systems (ICISS), Coimbatore, India, 3–5 December 2020; pp. 1150–1155. [Google Scholar] [CrossRef]
- Gilani, K.; Bertin, E.; Hatin, J.; Crespi, N. A survey on blockchain-based identity management and decentralized privacy for personal data. In Proceedings of the 2020 2nd Conference on Blockchain Research & Applications for Innovative Networks and Services (BRAINS), Paris, France, 28–30 September 2020; pp. 97–101. [Google Scholar] [CrossRef]
- Dib, O.; Toumi, K. Decentralized identity systems: Architecture, challenges, solutions and future directions. Ann. Emerg. Technol. Comput. 2020, 4, 19–40. [Google Scholar] [CrossRef]
- Mühle, A.; Grüner, A.; Gayvoronskaya, T.; Meinel, C. A survey on essential components of a self-sovereign identity. Comput. Sci. Rev. 2018, 30, 80–86. [Google Scholar] [CrossRef] [Green Version]
- Schmidt, K.; Mühle, A.; Grüner, A.; Meinel, C. Clear the Fog: Towards a Taxonomy of Self-Sovereign Identity Ecosystem Members. In Proceedings of the 2021 18th International Conference on Privacy, Security and Trust (PST), Auckland, New Zealand, 13–15 December 2021; pp. 1–7. [Google Scholar] [CrossRef]
- ID123 Inc. ID123. 2021. Available online: https://www.id123.io/ (accessed on 13 February 2022).
- Ometov, A.; Bezzateev, S.; Mäkitalo, N.; Andreev, S.; Mikkonen, T.; Koucheryavy, Y. Multi-Factor Authentication: A Survey. Cryptography 2018, 2, 1. [Google Scholar] [CrossRef] [Green Version]
- Stallings, W. Cryptography and Network Security: Principles and Practice, 6th ed.; Prentice Hall Press: Hoboken, NJ, USA, 2013. [Google Scholar]
- View, M.; Rydell, J.; Pei, M.; Machani, S. TOTP: Time-Based One-Time Password Algorithm; RFC Society: London, UK, 2011; p. 6238. [Google Scholar] [CrossRef] [Green Version]
- Erdem, E.; Sandıkkaya, M.T. OTPaaS—One time password as a service. IEEE Trans. Inf. Forens. Secur. 2018, 14, 743–756. [Google Scholar] [CrossRef]
- Bank, W. ID4D Practitioner’s Guide. 2019. Available online: http://documents.worldbank.org/curated/en/248371559325561562/ID4D-Practitioner-s-Guide (accessed on 13 February 2022).
- Government Digital Service, U. Introducing GOV.UK Verify. 2014. Available online: https://www.gov.uk/government/publications/introducing-govuk-verify/introducing-govuk-verify (accessed on 13 February 2022).
- Miyata, T.; Koga, Y.; Madsen, P.; Adachi, S.I.; Tsuchiya, Y.; Sakamoto, Y.; Takahashi, K. A Survey on Identity Management Protocols and Standards. IEICE Trans. Inf. Syst. 2006, 89, 112–123. [Google Scholar] [CrossRef]
- El Maliki, T.; Seigneur, J.M. A Survey of User-centric Identity Management Technologies. In Proceedings of the International Conference on Emerging Security Information, Systems, and Technologies (SECUREWARE 2007), Valencia, Spain, 14–20 October 2007; pp. 12–17. [Google Scholar] [CrossRef]
- Ferdous, M. User-Controlled Identity Management Systems Using Mobile Devices. Ph.D. Thesis, University of Glasgow, Glasgow, UK, 2015. [Google Scholar]
- eBay Inc. eBay. 1995. Available online: https://www.ebay.com/ (accessed on 13 February 2022).
- Resnick, P.; Zeckhauser, R.; Swanson, J.; Lockwood, K. The value of reputation on eBay: A controlled experiment. Exp. Econ. 2006, 9, 79–101. [Google Scholar] [CrossRef]
- Kiennert, C.; Bouzefrane, S.; Thoniel, P. 3—Authentication Systems. In Digital Identity Management; Laurent, M., Bouzefrane, S., Eds.; Elsevier: Amsterdam, The Netherlands, 2015; pp. 95–135. [Google Scholar] [CrossRef]
- Ferdous, M.S.; Norman, G.; Poet, R. Mathematical Modelling of Identity, Identity Management and Other Related Topics. In Proceedings of the 7th International Conference on Security of Information and Networks, Lausanne, Switzerland, 10–13 June 2014; pp. 9–16. [Google Scholar] [CrossRef]
- Talib, S.; Clarke, N.L.; Furnell, S.M. An Analysis of Information Security Awareness within Home and Work Environments. In Proceedings of the 2010 International Conference on Availability, Reliability and Security, Krakow, Poland, 17–20 August 2010; pp. 196–203. [Google Scholar] [CrossRef] [Green Version]
- Scarfone, K.; Souppaya, M. Guide to Enterprise Password Management; Technical report; National Institute of Standards and Technology: Geneva, Switzerland, 2009. [Google Scholar]
- Hughes, J.; Maler, E. Security Assertion Markup Language (SAML) V2.0 Technical Overview; Technical Report; OASIS: Manchester, UK, 2005. [Google Scholar]
- Hardt, D. The OAuth 2.0 Authorization Framework; OAuth: Geneva, Switzerland, 2012. [Google Scholar] [CrossRef]
- Recordon, D.; Reed, D. OpenID 2.0: A platform for user-centric identity management. In Proceedings of the 2nd ACM Workshop on Digital Identity Management, Alexandria, VA, USA, 30 September–2 October 2006; pp. 11–16. [Google Scholar] [CrossRef]
- Jøsang, A.; Pope, S. User Centric Identity Management. In Proceedings of the AusCERT Asia Pacific Information Technology Security Conference; APCERT Secretariat: Kyoto, Japan, 2005; p. 77. [Google Scholar]
- Ingram, D. Facebook Hits 2 Billion-User Mark, Doubling in Size Since 2012. 2017. Available online: https://www.reuters.com/article/us-facebook-users-idUSKBN19I2GG (accessed on 13 February 2022).
- Galperin, E.; Ben Hassine, W. Changes to Facebook’s “Real Names” Policy Still Don’t Fix the Problem. 2015. Available online: https://www.eff.org/deeplinks/2015/12/changes-facebooks-real-names-policy-still-dont-fix-problem (accessed on 13 February 2022).
- Searls, D. The Identity Problem. 2012. Available online: https://blogs.harvard.edu/vrm/2012/11/08/the-identity-problem/ (accessed on 13 February 2022).
- Loffreto, D. Administrative Precedence. 2013. Available online: https://www.moxytongue.com/2013/01/administrative-precedence.html (accessed on 13 February 2022).
- European Parliament, Council of the European Union. Regulation (EU) 2016/679. 2016. Available online: http://data.europa.eu/eli/reg/2016/679/oj (accessed on 13 February 2022).
- Chau, E.P.; Hertzberg, R. California Consumer Privacy Act of 2018. 2018. Available online: https://leginfo.legislature.ca.gov/faces/billTextClient.xhtml?bill_id=201720180AB375 (accessed on 13 February 2022).
- Mill, J.S. On Liberty; John W. Parker and Son: London, UK, 1859. [Google Scholar]
- Uzgalis, W. John Locke. In The Stanford Encyclopedia of Philosophy, Spring 2020 ed.; Zalta, E.N., Ed.; Stanford University: Stanford, VA, USA, 2020. [Google Scholar]
- Loffreto, D. What is “Sovereign Source Authority”? 2012. Available online: https://www.moxytongue.com/2012/02/what-is-sovereign-source-authority.html (accessed on 13 February 2022).
- Searls, D. Some Perspective on Self-Sovereign Identity. 2018. Available online: https://www.kuppingercole.com/blog/guest/some-perspective-on-self-sovereign-identity (accessed on 13 February 2022).
- Young, I.K. The origins of the SSI community. In Self-Sovereign Identity: Decentralized Digital Identity and Verifiable Credentials; Manning: Shelter Island, CA, USA, 2021; Volume 1, pp. 310–321. [Google Scholar]
- Vescent, H.; Young, K.; Duffy, H.; Sabadello, M.; Zagidulin, D.; Caballero, J. A Comprehensive Guide to Self Sovereign Identity; Manning: Shelter Island, CA, USA, 2019. [Google Scholar]
- Young, K. The Domains of Identity: A Framework for Understanding Identity Systems in Contemporary Society; Anthem Press: London, UK, 2020. [Google Scholar]
- Searls, D. Leveraging Whitman. 2013. Available online: http://blogs.harvard.edu/vrm/2013/08/21/leveraging-whitman/ (accessed on 13 February 2022).
- Searls, D. IIW Challenge #1: Sovereign Identity in the Great Silo Forest. 2013. Available online: http://blogs.harvard.edu/doc/2013/10/14/iiw-challenge-1-sovereign-identity-in-the-great-silo-forest/ (accessed on 13 February 2022).
- Searls, D. Personal = Sovereign. 2014. Available online: http://blogs.harvard.edu/vrm/2014/02/06/personal-sovereign/ (accessed on 13 February 2022).
- Loffreto, D. Recalibrating Sovereignty. 2013. Available online: https://www.moxytongue.com/2013/04/recalibrating-sovereignty.html (accessed on 13 February 2022).
- Sporny, M.; Longley, D.; Chadwick, D. Verifiable Credentials Data Model 1.0. 2017. Available online: https://www.w3.org/TR/vc-data-model/ (accessed on 13 February 2022).
- Reed, D.; Sporny, M.; Longley, D.; Christopher, A.; Grant, R.; Sabadello, M. Decentralized Identifiers (DIDs). 2019. Available online: https://www.w3.org/TR/did-core/ (accessed on 13 February 2022).
- Toth, K.C.; Anderson-Priddy, A. Self-Sovereign Digital Identity: A Paradigm Shift for Identity. IEEE Secur. Priv. 2019, 17, 17–27. [Google Scholar] [CrossRef]
- Turner, S.; Farrell, S.; Housley, R. An Internet Attribute Certificate Profile for Authorization; RFC Society: London, UK, 2010; p. 5755. [Google Scholar] [CrossRef] [Green Version]
- Camenisch, J.; Lysyanskaya, A. An efficient system for non-transferable anonymous credentials with optional anonymity revocation. In Proceedings of the Advances in Cryptology—EUROCRYPT 2001; Pfitzmann, B., Ed.; Springer: Berlin/Heidelberg, Germany, 2001; pp. 93–118. [Google Scholar] [CrossRef] [Green Version]
- Camenisch, J.; Lysyanskaya, A. Dynamic Accumulators and Application to Efficient Revocation of Anonymous Credentials. In Proceedings of the Advances in Cryptology—CRYPTO 2002; Yung, M., Ed.; Springer: Berlin/Heidelberg, Germany, 2002; pp. 61–76. [Google Scholar]
- Chaum, D. Security without Identification: Transaction Systems to Make Big Brother Obsolete. Commun. ACM 1985, 28, 1030–1044. [Google Scholar] [CrossRef]
- Lee, J.; Choi, J.; Oh, H.; Kim, J. Privacy-preserving Identity Management System. Cryptology 2021, 2021, 1459. [Google Scholar]
- Lee, J.; Hwang, J.; Choi, J.; Oh, H.; Kim, J. SIMS: Self-Sovereign Identity Management System with Preserving Privacy in Blockchain. IACR Cryptol. 2019, 1, 1–13. [Google Scholar]
- Schanzenbach, M.; Kilian, T.; Schütte, J.; Banse, C. ZKlaims: Privacy-preserving Attribute-based Credentials using Non-interactive Zero-knowledge Techniques. In Proceedings of the 16th International Joint Conference on e-Business and Telecommunications-SECRYPT; SciTePress: Prague, Czech Republic, 2019; pp. 325–332. [Google Scholar] [CrossRef]
- Schnorr, C.P. Efficient Identification and Signatures for Smart Cards. In Proceedings of the Advances in Cryptology—CRYPTO’ 89; Brassard, G., Ed.; Springer: New York, NY, USA, 1990; pp. 239–252. [Google Scholar] [CrossRef] [Green Version]
- Swan, M. Blockchain: Blueprint for a New Economy; O’Reilly Media, Inc.: Sebastopol, CA, USA, 2015. [Google Scholar]
- Alboaie, S.; Cosovan, D. Private Data System Enabling Self-Sovereign Storage Managed by Executable Choreographies. In Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Springer: Neuchâtel, Switzerland, 2017; Volume 10320, pp. 83–98. [Google Scholar] [CrossRef] [Green Version]
- Alpár, G.; van den Broek, F.; Hampiholi, B.; Jacobs, B.; Lueks, W.; Ringers, S. IRMA: Practical, decentralized and privacy-friendly identity management using smartphones. In Proceedings of the 10th Workshop on Hot Topics in Privacy Enhancing Technologies (HotPETs 2017), Minneapolis, MA, USA, 8 May 2017; pp. 1–2. [Google Scholar]
- van Bokkem, D.; Hageman, R.; Koning, G.; Nguyen, L.; Zarin, N. Self-Sovereign Identity Solutions: The Necessity of Blockchain Technology. CoRR 2019, 1904, 1–8. [Google Scholar]
- Linklater, G.; Herbert, A.; Smith, C.; Irwin, B.; Herbert, A.; Irwin, B. Toward distributed key management for offline authentication. In Proceedings of the Annual Conference of the South African Institute of Computer Scientists and Information Technologists on—SAICSIT ’18; Association for Computing Machinery: New York, NY, USA, 2018; pp. 10–19. [Google Scholar] [CrossRef]
- Zhu, X.; Badr, Y. Fog computing security architecture for the internet of things using blockchain-based social networks. In Proceedings of the 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), Halifax, NS, Canada, 30 July–3 August 2018; pp. 1361–1366. [Google Scholar] [CrossRef]
- Zheng, Z.; Xie, S.; Dai, H.N.; Chen, W.; Chen, X.; Weng, J.; Imran, M. An overview on smart contracts: Challenges, advances and platforms. Future Gener. Comput. Syst. 2020, 105, 475–491. [Google Scholar] [CrossRef] [Green Version]
- Finfgeld-Connett, D. A Guide to Qualitative Meta-Synthesis; Routledge: New York, NY, USA, 2018. [Google Scholar]
- Petersen, K.; Vakkalanka, S.; Kuzniarz, L. Guidelines for conducting systematic mapping studies in software engineering: An update. Inf. Softw. Technol. 2015, 64, 1–18. [Google Scholar] [CrossRef]
- Petersen, K.; Feldt, R.; Mujtaba, S.; Mattsson, M. Systematic Mapping Studies in Software Engineering. In Proceedings of the 12th International Conference on Evaluation and Assessment in Software Engineering, Bari, Italy, 26–27 June 2008; pp. 1–10. [Google Scholar] [CrossRef] [Green Version]
- Kitchenham, B.; Charters, S. Guidelines for Performing Systematic Literature Reviews in Software Engineering; Technical Report; EBSE: London, UK, 2007. [Google Scholar]
- Association for Computing Machinery. ACM Digital Library. 2010. Available online: https://dl.acm.org (accessed on 13 February 2022).
- Institute of Electrical and Electronics Engineers. IEEE Xplore. 2000. Available online: https://ieeexplore.ieee.org/ (accessed on 13 February 2022).
- Elsevier. ScienceDirect. 1997. Available online: https://www.sciencedirect.com/ (accessed on 13 February 2022).
- Springer Nature. Springer Link. 2012. Available online: https://link.springer.com/ (accessed on 13 February 2022).
- Elsevier. Scopus Preview. 2010. Available online: https://www.scopus.com/ (accessed on 13 February 2022).
- Clarivate Analytics. Web of Science. 2006. Available online: https://www.webofknowledge.com/ (accessed on 13 February 2022).
- Google. Google Scholar. 2004. Available online: https://scholar.google.com/ (accessed on 13 February 2022).
- Google. Google Patents. 2006. Available online: https://patents.google.com/ (accessed on 13 February 2022).
- Elsevier. Mendeley. 2008. Available online: https://www.mendeley.com/ (accessed on 13 February 2022).
- Wohlin, C. Guidelines for snowballing in systematic literature studies and a replication in software engineering. In Proceedings of the 18th International Conference on Evaluation and Assessment in Software Engineering-EASE ’14; ACM Press: London, UK, 2014; pp. 1–10. [Google Scholar] [CrossRef]
- Schardong, F.; Custódio, R. Study Selection Process, Spreadsheet. 2021. Available online: https://docs.google.com/spreadsheets/d/1FzUJRqe3WUhtsNYV6PyMZO8F14iQO-DXnBHR9xUsaiw (accessed on 23 April 2022).
- Lux, Z.A.; Beierle, F.; Zickau, S.; Gondor, S. Full-text Search for Verifiable Credential Metadata on Distributed Ledgers. In Proceedings of the 2019 6th International Conference on Internet of Things: Systems, Management and Security (IOTSMS 2019), Granada, Spain, 22–25 October 2019; pp. 519–528. [Google Scholar] [CrossRef] [Green Version]
- Schardong, F.; Custódio, R.; Pioli, L.; Meyer, J. Matching Metadata on Blockchain for Self-Sovereign Identity. In Proceedings of the International Conference on Business Process Management; Springer: Berlin/Heidelberg, Germany, 2021; pp. 421–433. [Google Scholar] [CrossRef]
- Anaigoundanpudur Karthikeyan, N. Cryptographic Implementation of Issuer Policy for Self Sovereign Identity Systems. Master’s Thesis, University of Twente, Enschede, The Netherlands, 2021. [Google Scholar]
- Kang, M.; Lemieux, V. A Decentralized Identity-Based Blockchain Solution for Privacy-Preserving Licensing of Individual-Controlled Data to Prevent Unauthorized Secondary Data Usage. Ledger 2021, 6. [Google Scholar] [CrossRef]
- Bathen, L.; Flores, G.H.; Madl, G.; Jadav, D.; Arvanitis, A.; Santhanam, K.; Zeng, C.; Gordon, A. SelfIs: Self-sovereign biometric IDs. In Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW); IEEE Computer Society: Long Beach, CA, USA, 2019; pp. 2847–2856. [Google Scholar] [CrossRef]
- Mishra, P.; Modanwal, V.; Kaur, H.; Varshney, G. Pseudo-Biometric Identity Framework: Achieving Self-Sovereignity for Biometrics on Blockchain. In Proceedings of the IEEE 2021 IEEE International Conference on Systems, Man and Cybernetics (SMC), Prague, Czech Republic, 9–12 October 2021; pp. 945–951. [Google Scholar] [CrossRef]
- Abraham, A.; Schinnerl, C.; More, S. SSI Strong Authentication using a Mobile-Phone based Identity Wallet reaching a High Level of Assurance. In Proceedings of the 18th International Conference on Security and Cryptography-SECRYPT, Lisbon, Portugal, 6–8 June 2021. [Google Scholar] [CrossRef]
- Abraham, A.; Hörandner, F.; Omolola, O.; Ramacher, S. Privacy-Preserving eID Derivation for Self-Sovereign Identity Systems. In Proceedings of the Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Springer International Publishing: Copenhagen, Denmark, 2020; Volume 11999, pp. 307–323. [Google Scholar] [CrossRef]
- Grüner, A.; Mühle, A.; Meinel, C. An Integration Architecture to Enable Service Providers for Self-sovereign Identity. In Proceedings of the 2019 IEEE 18th International Symposium on Network Computing and Applications (NCA 2019), Cambridge, MA, USA, 26–28 September 2019; pp. 261–265. [Google Scholar] [CrossRef]
- Grüner, A.; Mühle, A.; Meinel, C. ATIB: Design and Evaluation of an Architecture for Brokered Self-Sovereign Identity Integration and Trust-Enhancing Attribute Aggregation for Service Provider. IEEE Access 2021, 9, 138553–138570. [Google Scholar] [CrossRef]
- Martinez Jurado, V.; Vila, X.; Kubach, M.; Henderson Johnson Jeyakumar, I.; Solana, A.; Marangoni, M. Applying assurance levels when issuing and verifying credentials using Trust Frameworks. In Proceedings of the Open Identity Summit 2021, Copenhagen, Denmark, 1–2 June 2021. [Google Scholar]
- Lux, Z.A.; Thatmann, D.; Zickau, S.; Beierle, F. Distributed-Ledger-based Authentication with Decentralized Identifiers and Verifiable Credentials. In Proceedings of the 2020 2nd Conference on Blockchain Research & Applications for Innovative Networks and Services (BRAINS), Paris, France, 28–30 September 2020; pp. 71–78. [Google Scholar] [CrossRef]
- Lagutin, D.; Kortesniemi, Y.; Fotiou, N.; Siris, V.A. Enabling decentralised identifiers and verifiable credentials for constrained IoT devices using OAuth-based delegation. In Proceedings of the Workshop on Decentralized IoT Systems and Security (DISS 2019), in Conjunction with the NDSS Symposium, San Diego, CA, USA, 24–27 February 2019; Volume 24. [Google Scholar] [CrossRef]
- Yildiz, H.; Ritter, C.; Nguyen, L.T.; Frech, B.; Martinez, M.M.; Küpper, A. Connecting Self-Sovereign Identity with Federated and User-centric Identities via SAML Integration. In Proceedings of the 2021 IEEE Symposium on Computers and Communications (ISCC), Athens, Greece, 5–8 September 2021; pp. 1–7. [Google Scholar] [CrossRef]
- Zhong, T.; Shi, P.; Chang, J. JointCloud Cross-chain Verification Model of Decentralized Identifiers. In Proceedings of the 2021 IEEE International Performance, Computing, and Communications Conference (IPCCC), Austin, TX, USA, 28–30 October 2021; pp. 1–8. [Google Scholar] [CrossRef]
- Hong, S.; Kim, H. VaultPoint: A Blockchain-Based SSI Model that Complies with OAuth 2.0. Electronics 2020, 9, 1231. [Google Scholar] [CrossRef]
- Schanzenbach, M.; Bramm, G.; Schütte, J. reclaimID: Secure, Self-Sovereign Identities Using Name Systems and Attribute-Based Encryption. In Proceedings of the 2018 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications/12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE), New York, NY, USA, 1–3 August 2018; pp. 946–957. [Google Scholar] [CrossRef] [Green Version]
- Xu, J.; Xue, K.; Tian, H.; Hong, J.; Wei, D.S.; Hong, P. An Identity Management and Authentication Scheme Based on Redactable Blockchain for Mobile Networks. IEEE Trans. Veh. Technol. 2020, 69, 6688–6698. [Google Scholar] [CrossRef]
- Schanzenbach, M. Towards Self-Sovereign, Decentralized Personal Data Sharing and Identity Management. Ph.D. Thesis, Technical University of Munich, Munich, Germany, 2020. [Google Scholar]
- Lauinger, J.; Ernstberger, J.; Regnath, E.; Hamad, M.; Steinhorst, S. A-PoA: Anonymous Proof of Authorization for Decentralized Identity Management. In Proceedings of the 2021 IEEE International Conference on Blockchain and Cryptocurrency (ICBC), Sydney, Australia, 3–6 May 2021; pp. 1–9. [Google Scholar] [CrossRef]
- Mukta, R.; Paik, H.y.; Lu, Q.; Kanhere, S.S. Credential-Based Trust Management in Self Sovereign Identity. womENcourage 2021. Available online: https://womencourage.acm.org/2021/wp-content/uploads/2021/07/87_extendedabstract.pdf (accessed on 19 April 2022).
- Stokkink, Q.; Pouwelse, J. Deployment of a Blockchain-Based Self-Sovereign Identity. In Proceedings of the 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), Halifax, NS, Canada, 30 July–3 August 2018; pp. 1336–1342. [Google Scholar] [CrossRef] [Green Version]
- Lax, G.; Russo, A. A Lightweight Scheme Exploiting Social Networks for Data Minimization According to the GDPR. IEEE Trans. Comput. Soc. Syst. 2021, 8, 388–397. [Google Scholar] [CrossRef]
- Abraham, A.; More, S.; Rabensteiner, C.; Hörandner, F. Revocable and offline-verifiable self-sovereign identities. In Proceedings of the 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom); IEEE Computer Society: Guangzhou, China, 2020; pp. 1020–1027. [Google Scholar] [CrossRef]
- Cho, K.W.; Jeong, B.G.; Shin, S.U. Verifiable Credential Proof Generation and Verification Model for Decentralized SSI-Based Credit Scoring Data. IEICE Trans. Inf. Syst. 2021, 104, 1857–1868. [Google Scholar] [CrossRef]
- Chotkan, R. Industry-Grade Self-Sovereign Identity: On the Realisation of a Fully Distributed Self-Sovereign Identity Architecture. Master’s Thesis, Delft University of Technology, Delft, The Netherlands, 2021. [Google Scholar]
- Yang, X.; Li, W. A zero-knowledge-proof-based digital identity management scheme in blockchain. Comput. Secur. 2020, 99, 102050. [Google Scholar] [CrossRef]
- Bobolz, J.; Eidens, F.; Krenn, S.; Ramacher, S.; Samelin, K. Issuer-Hiding Attribute-Based Credentials. In Proceedings of the International Conference on Cryptology and Network Security; Springer: Berlin/Heidelberg, Germany, 2021; pp. 158–178. [Google Scholar] [CrossRef]
- Jaroucheh, Z.; Álvarez, I.A. Secretation: Toward a Decentralised Identity and Verifiable Credentials Based Scalable and Decentralised Secret Management Solution. In Proceedings of the 2021 IEEE International Conference on Blockchain and Cryptocurrency (ICBC), Sydney, Australia, 6–8 December 2021; pp. 1–9. [Google Scholar] [CrossRef]
- Samir, E.; Wu, H.; Azab, M.; Xin, C.S.; Zhang, Q. DT-SSIM: A Decentralized Trustworthy Self-Sovereign Identity Management Framework. IEEE Internet Things J. 2021, 9, 7972–7988. [Google Scholar] [CrossRef]
- Siddiqui, H.; Idrees, M.; Gudymenko, I.; Fetzer, C. Credentials as a Service Providing Self Sovereign Identity as a Cloud Service Using Trusted Execution Environments. In Proceedings of the 2021 IEEE International Conference on Cloud Engineering (IC2E), San Francisco, CA, USA, 4–8 October 2021; pp. 210–216. [Google Scholar] [CrossRef]
- Gruner, A.; Muhle, A.; Meinel, C. Using Probabilistic Attribute Aggregation for Increasing Trust in Attribute Assurance. In Proceedings of the 2019 IEEE Symposium Series on Computational Intelligence (SSCI), Xiamen, China, 6–9 December 2019; pp. 633–640. [Google Scholar] [CrossRef]
- Bhattacharya, M.P.; Zavarsky, P.; Butakov, S. Enhancing the Security and Privacy of Self-Sovereign Identities on Hyperledger Indy Blockchain. In Proceedings of the 2020 International Symposium on Networks, Computers and Communications (ISNCC); IEEE Computer Society: Montreal, ON, Canada, 2020; pp. 1–7. [Google Scholar] [CrossRef]
- Abramson, W.; Hickman, N.; Spencer, N. Evaluating Trust Assurance in Indy-Based Identity Networks Using Public Ledger Data. Front. Blockchain 2021, 4, 18. [Google Scholar] [CrossRef]
- Grüner, A.; Mühle, A.; Gayvoronskaya, T.; Meinel, C. A Quantifiable Trust Model for Blockchain-Based Identity Management. In Proceedings of the 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), Halifax, NS, Canada, 30 July–3 August 2018; pp. 1475–1482. [Google Scholar] [CrossRef]
- Barclay, I.; Freytsis, M.; Bucher, S.; Radha, S.; Preece, A.; Taylor, I. Towards a Modelling Framework for Self-Sovereign Identity Systems. arXiv 2020, arXiv:2009.04327. [Google Scholar]
- Liu, J.; Hodges, A.; Clay, L.; Monarch, J. An analysis of digital identity management systems - a two-mapping view. In Proceedings of the 2020 2nd Conference on Blockchain Research and Applications for Innovative Networks and Services (BRAINS), Paris, France, 28–30 September 2020; pp. 92–96. [Google Scholar] [CrossRef]
- Ferdous, M.S.; Chowdhury, F.; Alassafi, M.O. In Search of Self-Sovereign Identity Leveraging Blockchain Technology. IEEE Access 2019, 7, 103059–103079. [Google Scholar] [CrossRef]
- GWON, O.G. Content Wallet Device and Self-Sovereign Identity and Copyright Authentication System Using Same. 2021. Available online: https://patents.google.com/patent/WO2021125586A1/en (accessed on 13 February 2022).
- Liu, Y.; Lu, Q.; Paik, H.Y.; Xu, X.; Chen, S.; Zhu, L. Design Pattern as a Service for Blockchain-Based Self-Sovereign Identity. IEEE Soft. 2020, 37, 30–36. [Google Scholar] [CrossRef]
- Lim, S.; Rhie, M.H.; Hwang, D.; Kim, K.H. A Subject-Centric Credential Management Method based on the Verifiable Credentials. In Proceedings of the 2021 International Conference on Information Networking (ICOIN), Bangkok, Thailand, 13–16 January 2021; pp. 508–510. [Google Scholar] [CrossRef]
- Lemieux, V.; Voskobojnikov, A.; Kang, M. Addressing Audit and Accountability Issues in Self-Sovereign Identity Blockchain Systems Using Archival Science Principles. In Proceedings of the 2021 IEEE 45th Annual Computers, Software, and Applications Conference (COMPSAC), Madrid, Spain, 12–16 July 2021; pp. 1210–1216. [Google Scholar] [CrossRef]
- Jakubeit, P.; Dercksen, A.; Peter, A. SSI-AWARE: Self-sovereign Identity Authenticated Backup with Auditing by Remote Entities. In Proceedings of the Information Security Theory and Practice; Laurent, M., Giannetsos, T., Eds.; Springer International Publishing: Cham, Switzerland, 2020; pp. 202–219. [Google Scholar] [CrossRef]
- Soltani, R.; Nguyen, U.T.; An, A. Practical Key Recovery Model for Self-Sovereign Identity Based Digital Wallets. In Proceedings of the IEEE 17th International Conference on Dependable, Autonomic and Secure Computing, IEEE 17th International Conference on Pervasive Intelligence and Computing, IEEE 5th International Conference on Cloud and Big Data Computing, 4th Cyber Scienc, Fukuoka, Japan, 5–8 August 2019; pp. 320–325. [Google Scholar] [CrossRef]
- Kostadinov, K.; de Vos, M.; Pouwelse, J. Towards Data Resilience for Fully Distributed Self-Sovereign Identity Managers. Bachelor’s Thesis, Delft University of Technology, Delft, The Netherlands, 2021. [Google Scholar]
- Kim, W.B.; Lee, I.Y.; Yim, K.B. Group Delegated ID-Based Proxy Re-encryption for PHR. In Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing; Barolli, L., Poniszewska-Maranda, A., Park, H., Eds.; Springer International Publishing: Cham, Switzerland, 2021; pp. 447–456. [Google Scholar] [CrossRef]
- Singh, H.P.; Stefanidis, K.; Kirstein, F. A Private Key Recovery Scheme Using Partial Knowledge. In Proceedings of the 2021 11th IFIP International Conference on New Technologies, Mobility and Security (NTMS), Paris, France, 19–21 April 2021; pp. 1–5. [Google Scholar] [CrossRef]
- Lockwood, M. An accessible interface layer for Self-Sovereign Identity. Front. Blockchain 2021, 3, 63. [Google Scholar] [CrossRef]
- Mustafa, K.; Sakir, S. Computer-Implemented Transaction System and Method. 2021. Available online: https://patents.google.com/patent/WO2021064182A1/en (accessed on 13 February 2022).
- Toth, K.C.; Cavoukian, A.; Anderson-Priddy, A. Privacy by Design Identity Architecture Using Agents and Digital Identities. In Proceedings of the Annual Privacy Forum; Springer: Lisbon, Portugal, 2020; pp. 73–94. [Google Scholar] [CrossRef]
- Shanmugarasa, Y.; Paik, H.Y.; Kanhere, S.S.; Zhu, L. Towards Automated Data Sharing in Personal Data Stores. In Proceedings of the 2021 IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events (PerCom Workshops), Pisa, Italy, 22–26 March 2021; pp. 328–331. [Google Scholar] [CrossRef]
- Wohlgemuth, S.; Umezawa, K.; Mishina, Y.; Takaragi, K. A Secure Decision-Support Scheme for Self-Sovereign Identity Management. In Proceedings of the Symposium on Cryptography and Information Security (SCIS); IEICE: Kochi, Japan, 2020; pp. 1–8. [Google Scholar]
- Inoue, K.; Suzuki, D.; Kurita, T.; Imai, S. Cooperative Task Scheduling for Personal Identity Verification in Networked Systems. In Proceedings of the 2020 32nd International Teletraffic Congress (ITC 32), Osaka, Japan, 22–24 September 2020; pp. 97–105. [Google Scholar] [CrossRef]
- Kubach, M.; Roßnagel, H. A lightweight trust management infrastructure for self-sovereign identity. In Proceedings of the Open Identity Summit 2021; Roßnagel, H., Schunck, C.H., Mödersheim, S., Eds.; Gesellschaft für Informatik e.V.: Lyngby, Denmark, 2021; pp. 155–166. [Google Scholar]
- Alber, L.; More, S.; Mödersheim, S.; Schlichtkrull, A. Adapting the TPL Trust Policy Language for a Self-Sovereign Identity World. In Proceedings of the Open Identity Summit 2021; Roßnagel, H., Schunck, C.H., Mödersheim, S., Eds.; Gesellschaft für Informatik e.V.: Lyngby, Denmark, 2021; pp. 107–118. [Google Scholar]
- Hardman, D. DIDComm Messaging. 2020. Available online: https://identity.foundation/didcomm-messaging/spec/ (accessed on 12 March 2022).
- West, R.; Bluhm, D.; Hailstone, M.; Curran, S.; Curren, S.; Aristy, G. Aries RFC 0023: DID Exchange Protocol 1.0; Technical Report; Linux Foundation: San Diego, CA, USA, 2019. [Google Scholar]
- Smith, S.M. Key Event Receipt Infrastructure (KERI). arXiv 2019, arXiv:1907.02143. [Google Scholar]
- Fedrecheski, G.; Costa, L.C.; Afzal, S.; Rabaey, J.M.; Lopes, R.D.; Zuffo, M.K. A low-overhead approach for self-sovereign identity in IoT. arXiv 2021, arXiv:2107.10232. [Google Scholar]
- Park, C.S.; Nam, H.M. A New Approach to Constructing Decentralized Identifier for Secure and Flexible Key Rotation. IEEE Internet Things J. 2021, 9, 10610–10624. [Google Scholar] [CrossRef]
- Kim, K.H.; Lim, S.; Hwang, D.Y.; Kim, K.H. Analysis on the Privacy of DID Service Properties in the DID Document. In Proceedings of the 2021 International Conference on Information Networking (ICOIN), Bangkok, Thailand, 13–16 January 2021; pp. 745–748. [Google Scholar] [CrossRef]
- Naik, N.; Grace, P.; Jenkins, P. An Attack Tree Based Risk Analysis Method for Investigating Attacks and Facilitating Their Mitigations in Self-Sovereign Identity. In Proceedings of the 2021 IEEE Symposium Series on Computational Intelligence (SSCI), Canberra, Australia, 5 December 2021; pp. 1–8. [Google Scholar] [CrossRef]
- Apache Software Foundation. Apache Solr. 2010. Available online: https://lucene.apache.org/solr/ (accessed on 13 February 2022).
- Hyperledger. Hyperledger Indy. 2020. Available online: https://www.hyperledger.org/use/hyperledger-indy (accessed on 13 February 2022).
- Honnibal, M.; Montani, I.; Van Landeghem, S.; Boyd, A. spaCy: Industrial-Strength Natural Language Processing in Python; spaCy: San Diego, CA, USA, 2020. [Google Scholar] [CrossRef]
- Mikolov, T.; Chen, K.; Corrado, G.; Dean, J. Efficient estimation of word representations in vector space. arXiv 2013, arXiv:1301.3781. [Google Scholar]
- Sakimura, N.; Bradley, J.; Jones, M.; De Medeiros, B.; Mortimore, C. Openid Connect Core 1.0; Technical Report; The OpenID Foundation: San Ramon, CA, USA, 2014. [Google Scholar]
- Fei, C.; Lohkamp, J.; Rusu, E.; Szawan, K.; Wagner, K.; Wittenberg, N. Self-Sovereign and Decentralised Identity By Design; Technical Report; Joloco: Berlin, Germany, 2018. [Google Scholar]
- Boeyen, S.; Santesson, S.; Polk, T.; Housley, R.; Farrell, S.; Cooper, D. Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile; RFC Society: London, UK, 2008; p. 5280. [Google Scholar] [CrossRef]
- Alliance, F. Client to Authenticator Protocol (ctap); Technical Report; Alliance FIDO: London, UK, 2019. [Google Scholar]
- Patel, V.M.; Ratha, N.K.; Chellappa, R. Cancelable biometrics: A review. IEEE Sign. Process. Mag. 2015, 32, 54–65. [Google Scholar] [CrossRef]
- Hermans, J.; Mennink, B.; Peeters, R. When a bloom filter is a doom filter: Security assessment of a novel iris biometric template protection system. In Proceedings of the 2014 International Conference of the Biometrics Special Interest Group (BIOSIG), Darmstadt, Germany, 10–12 September 2014; pp. 1–6. [Google Scholar]
- Bradski, G. The openCV library. Dr. Dobb’s J. Softw. Tools Prof. Program. 2000, 25, 120–123. [Google Scholar]
- Kaur, H.; Khanna, P. Random distance method for generating unimodal and multimodal cancelable biometric features. IEEE Trans. Inf. Forensics Secur. 2018, 14, 709–719. [Google Scholar] [CrossRef]
- Shamir, A. How to share a secret. Commun. ACM 1979, 22, 612–613. [Google Scholar] [CrossRef]
- Sabt, M.; Achemlal, M.; Bouabdallah, A. Trusted execution environment: What it is, and what it is not. In Proceedings of the 2015 IEEE Trustcom/BigDataSE/ISPA, Washington, DC, USA, 20–22 August 2015; Volume 1, pp. 57–64. [Google Scholar] [CrossRef] [Green Version]
- Galperin, S.; Adams, D.C.; Myers, M.; Ankney, R.; Malpani, A.N. X.509 Internet Public Key Infrastructure Online Certificate Status Protocol-OCSP; RFC Society: London, UK, 1999; p. 2560. [Google Scholar] [CrossRef] [Green Version]
- U.S. Federal Government. Internet Assigned Numbers Authority (IANA). 1998. Available online: https://www.iana.org/ (accessed on 11 April 2022).
- Berners-Lee, T.; Fielding, R.T.; Masinter, L.M. Uniform Resource Identifier (URI): Generic Syntax; RFC Society: London, UK, 2005; p. 3986. [Google Scholar] [CrossRef] [Green Version]
- Sporny, M.; Zagidulin, D.; Longley, D. The did:key Method. 2019. Available online: https://w3c-ccg.github.io/did-method-key/ (accessed on 13 February 2022).
- Josefsson, S.; Liusvaara, I. Edwards-Curve Digital Signature Algorithm (EdDSA); RFC Society: London, UK, 2017; p. 8032. [Google Scholar] [CrossRef]
- Benet, J.; Sporny, M. The Multibase Data Format. In Internet-Draft Draft-Multiformats-Multibase-03; Internet Engineering Task Force: Fremont, CA, USA, 2021. [Google Scholar]
- West, R.; Bluhm, D.; Hailstone, M.; Curran, S.; Curren, S.; Aristy, G. Aries RFC 0434: Out-of-Band Protocol 1.1. 2019. Available online: https://github.com/hyperledger/aries-rfcs/blob/main/features/0434-outofband/README.md (accessed on 13 February 2022).
- Bormann, C.; Hoffman, P.E. Concise Binary Object Representation (CBOR); RFC Society: London, UK, 2013; p. 7049. [Google Scholar] [CrossRef]
- Lamport, L. Password authentication with insecure communication. Commun. ACM 1981, 24, 770–772. [Google Scholar] [CrossRef]
- Mockapetris, P. Domain Names: Concepts and Facilities; RFC Society: London, UK, 1983; p. 882. [Google Scholar] [CrossRef] [Green Version]
- Wachs, M.; Schanzenbach, M.; Grothoff, C. On the feasibility of a censorship resistant decentralized name system. In Proceedings of the International Symposium on Foundations and Practice of Security; Springer: La Rochelle, France, 2013; pp. 19–30. [Google Scholar] [CrossRef] [Green Version]
- Blaze, M.; Bleumer, G.; Strauss, M. Divertible protocols and atomic proxy cryptography. In Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques; Springer: Espoo, Finland, 1998; pp. 127–144. [Google Scholar] [CrossRef] [Green Version]
- Krawczyk, H.; Rabin, T. Chameleon Hashing and Signatures. 1998. Available online: https://ia.cr/1998/010 (accessed on 13 February 2022).
- Ateniese, G.; Magri, B.; Venturi, D.; Andrade, E. Redactable Blockchain-or-Rewriting History in Bitcoin and Friends. In Proceedings of the 2017 IEEE European Symposium on Security and Privacy (EuroS&P); IEEE Computer Society: Paris, France, 2017; pp. 111–126. [Google Scholar] [CrossRef] [Green Version]
- Derler, D.; Samelin, K.; Slamanig, D.; Striecks, C. Fine-Grained and Controlled Rewriting in Blockchains: Chameleon-Hashing Gone Attribute-Based. 2019. Available online: https://eprint.iacr.org/2019/406 (accessed on 13 February 2022).
- Bethencourt, J.; Sahai, A.; Waters, B. Ciphertext-policy attribute-based encryption. In Proceedings of the 2007 IEEE Symposium on Security and Privacy (SP’07), Oakland, CA, USA, 20–23 May 2007; pp. 321–334. [Google Scholar] [CrossRef] [Green Version]
- Waters, B. Efficient identity-based encryption without random oracles. In Proceedings of the Annual International Conference on the Theory and Applications of Cryptographic Techniques; Springer: Aarhus, Denmark, 2005; pp. 114–127. [Google Scholar] [CrossRef] [Green Version]
- Boneh, D.; Lynn, B.; Shacham, H. Short signatures from the Weil pairing. In Proceedings of the International Conference on the Theory and Application of Cryptology and Information Security; Springer: Gold Coast, Australia, 2001; pp. 514–532. [Google Scholar] [CrossRef] [Green Version]
- Bitansky, N.; Canetti, R.; Chiesa, A.; Tromer, E. From extractable collision resistance to succinct non-interactive arguments of knowledge, and back again. In Proceedings of the 3rd Innovations in Theoretical Computer Science Conference; Association for Computing Machinery: New York, NY, USA, 2012; pp. 326–349. [Google Scholar] [CrossRef] [Green Version]
- Gentry, C. Fully homomorphic encryption using ideal lattices. In Proceedings of the Forty-First Annual ACM Symposium on Theory of Computing, Bethesda, MD, USA, 31 May 2009; pp. 169–178. [Google Scholar] [CrossRef] [Green Version]
- Martin, R.C.; Riehle, D.; Buschmann, F. Pattern Languages of Program Design 3; Addison-Wesley Longman Publishing Co., Inc.: Boston, MA, USA, 1997; pp. 529–574. [Google Scholar]
- Dalpiaz, F.; Franch, X.; Horkoff, J. iStar 2.0 Language Guide. arXiv 2016, arXiv:1605.07767. [Google Scholar]
- Mortier, R.; Haddadi, H.; Henderson, T.; McAuley, D.; Crowcroft, J. Human-Data Interaction: The Human Face of the Data-Driven Society. arXiv 2015, arXiv:1301.3781. [Google Scholar] [CrossRef] [Green Version]
- Schneier, B. Attack trees. Dr. Dobb’s J. 1999, 24, 21–29. [Google Scholar]
- CA/Browser Forum. Certification Authority Browser Forum. 2005. Available online: https://cabforum.org/ (accessed on 11 April 2022).
- Mödersheim, S.; Schlichtkrull, A.; Wagner, G.; More, S.; Alber, L. TPL: A Trust Policy Language. In Proceedings of the Trust Management XIII; Meng, W., Cofta, P., Jensen, C.D., Grandison, T., Eds.; Springer International Publishing: Cham, Switzerland, 2019; pp. 209–223. [Google Scholar] [CrossRef] [Green Version]
- Menezes, A.J.; Van Oorschot, P.C.; Vanstone, S.A. Handbook of Applied Cryptography; CRC Press: Boca Raton, FL, USA, 2018. [Google Scholar]
- Barker, E. Guideline for using cryptographic standards in the federal government: Cryptographic mechanisms. In NIST Special Publication; NIST: Maryland, MA, USA, 2016; pp. 175B–800B. [Google Scholar] [CrossRef]
- Schrijver, A. Theory of Linear and Integer Programming; John Wiley & Sons: Hoboken, NJ, USA, 1998. [Google Scholar]
- Goldreich, O. Secure multi-party computation. Manuscript. Prelim. Vers. 1998, 78, 110. [Google Scholar]
- W3C Technology and society domain. Verifiable Claims Working Group Frequently Asked Questions. 2017. Available online: https://w3c.github.io/webpayments-ig/VCTF/charter/faq.html#self-sovereign (accessed on 13 February 2022).
- Andrieu, J. A Technology-Free Definition of Self-Sovereign Identity. In Proceedings of the Rebooting the Web of Trust III; Web of Trust: San Francisco, CA, USA, 2016; pp. 2–5. [Google Scholar]
- Naik, N.; Jenkins, P. Self-Sovereign Identity Specifications: Govern Your Identity Through Your Digital Wallet using Blockchain Technology. In Proceedings of the 2020 8th IEEE International Conference on Mobile Cloud Computing, Services, and Engineering (MobileCloud), Oxford, UK, 13–16 April 2020; pp. 90–95. [Google Scholar] [CrossRef]
- Ellingsen, J. Self-Sovereign Identity Systems Opportunities and challenges. Master’s Thesis, Norwegian University of Science and Technology, Trondheim, Norway, 2019. [Google Scholar]
- Van Wingerde, M. Blockchain-Enabled Self-Sovereign Identity. Master’s Thesis, Tilburg University, Tilburg, The Netherlands, 2017. [Google Scholar]
- Abraham, A. Self-Sovereign Identity: Whitepaper about the Concept of Self-Sovereign Identity Including Its Potential; Technical Report; A-SIT: London, UK, 2017. [Google Scholar]
- Satybaldy, A.; Nowostawski, M.; Ellingsen, J. Self-Sovereign Identity Systems. In Privacy and Identity Management. Data for Better Living: AI and Privacy: 14th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Windisch, Switzerland, 19–23 August 2019, Revised Selected Papers; Springer International Publishing: Cham, Switzerland, 2020; pp. 447–461. [Google Scholar]
- Diebold, Z.; O’Mahony, D. Self-Sovereign Identity Using Smart Contracts on the Ethereum Blockchain. Master’s Thesis, University of Dublin, Dublin, UK, 2017. [Google Scholar]
- Speelman, T. Self-Sovereign Identity: Proving Power over Legal Entities. Master’s Thesis, Delft University of Technology, Delft, The Netherlands, 2020. [Google Scholar]
- Čučko, Š.; Bećirović, Š.; Kamišalić, A.; Mrdović, S.; Turkanović, M. Towards the classification of Self-Sovereign Identity properties. arXiv 2021, arXiv:2112.04155. [Google Scholar]
- Sovrin. The Principles of SSI. 2021. Available online: https://sovrin.org/principles-of-ssi/ (accessed on 12 March 2022).
- Schutte, M. Schutte’s Critique of the Self-Sovereign Identity Principles. 2016. Available online: http://matthewschutte.com/2016/10/25/schuttes-critique-of-the-self-sovereign-identity-principles/ (accessed on 13 February 2022).
- Evernym. Evernym. 2013. Available online: https://www.evernym.com/ (accessed on 13 February 2022).
- Tobin, A.; Reed, D. The Inevitable Rise of Self-Sovereign Identity; Technical Report; The Sovrin Foundation: Provo, UT, USA, 2016. [Google Scholar]
- The Sovrin Foundation. Write To The Sovrin Public Ledger. 2016. Available online: https://sovrin.org/issue-credentials/ (accessed on 13 February 2022).
- Cameron, K. The Laws of Identity; Technical Report; Microsoft Corporation: Albuquerque, NM, USA, 2005. [Google Scholar]
- Savić, M.; Ivanović, M.; Jain, L.C. Co-authorship Networks: An Introduction. In Complex Networks in Software, Knowledge, and Social Systems; Springer International Publishing: Cham, Switzerland, 2019; pp. 179–192. [Google Scholar] [CrossRef]
- Sporny, M.; Longley, D.; Chadwick, D. Verifiable Credentials Data Model 1.0-Trust Model. 2019. Available online: https://www.w3.org/TR/vc-data-model/#trust-model (accessed on 13 February 2022).
- Meier, S.; Schmidt, B.; Cremers, C.; Basin, D. The TAMARIN Prover for the Symbolic Analysis of Security Protocols. In Proceedings of the International Conference on Computer Aided Verification; Springer: Saint Petersburg, Russia, 2013; pp. 696–701. [Google Scholar] [CrossRef] [Green Version]
Systematic Review | Systematic Mapping | Taxonomy | Include Patents | Other than Blockchain | Conceptual or Pragmatic | Covered Works | |
---|---|---|---|---|---|---|---|
Liu et al. [9] | Yes 1 | No | No | Yes | No | Pragmatic | 50 |
Čučko et al. [10] | No | Yes | No | No | Yes | Pragmatic | 80 |
Ghaffari et al. [11] | No | No | Yes | No | No | Pragmatic | 21 |
Mulaji and Roodt [12] | No | No | No | Yes | No | Pragmatic | 69 |
Kuperberg [13] | No | No | No | No | No | Pragmatic | 43 |
Zhu and Badr [14] | No | No | No | No | No | Pragmatic | 15 |
Lim et al. [15] | No | No | No | No | No | Pragmatic | 15 |
Kaneriya and Patel [16] | No | No | No | No | No | Pragmatic | 6 |
Gilani et al. [17] | No | No | No | No | No | Pragmatic | 8 |
Dib and Toumi [18] | No | No | No | No | No | Pragmatic | 10 |
Mühle et al. [19] | No | No | No | No | No | Pragmatic | 9 |
Schmidt et al. [20] | No | Yes | Yes | No | No | Pragmatic | 147 |
This work | Yes | Yes | Yes | Yes | Yes | Both | 82 |
Inclusion Criteria | |
---|---|
IC-1 | The paper includes a novel conceptual contribution to SSI. |
IC-2 | The research work makes practical progress toward SSI. |
Exclusion Criterion | |
EC-1 | The research work is not in the area of computer science. |
Data Item | Description | RQ |
---|---|---|
General | ||
Study ID | Unique integer identifier per article | |
Article Title | Name of the article | |
Year | Year of publication | RQ-4 |
Article Authors | Name of the authors | RQ-4 |
Venue | Publication venue | RQ-4 |
Conceptual | ||
Add Concept | What concept/idea is introduced | RQ-3 |
Refute Concept | What concept/idea is refuted | RQ-3 |
Formalism | ||
Formal Model | How is SSI formally specified | RQ-2 |
Practical | ||
Novel Problem | What practical problem is presented | RQ-1 |
Proposed Solution | How is the practical problem solved | RQ-1 |
Tool | Total |
---|---|
ACM Digital Library | 16 |
IEEE Xplore Digital Library | 99 |
ScienceDirect | 17 |
Springer Link | 40 |
Scopus | 235 |
Web of Science | 131 |
Google Scholar | 180 |
Database Search | 718 |
Google Patents | 17 |
Patent Search | 17 |
Credential | System Design | Trust | |||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Management | Operational | ||||||||||||||||||||||||
VC | VP | ||||||||||||||||||||||||
Works | Metadata Search | Protocol Integration | Identity Derivation | Wallet Security | Auditability | Credential as a Service | Revocation | Decentralized Identifiers | Issuer Authorization | Delegation | Backup and Recovery | Revocation | Verifier Authorization | Data Minimization | Reuse Prevention | SSI Design/Architecture | HCI | Risk Assessment | Threat/Attack Model | Reputation Model | Trust Policy Evaluation | ||||
[91,92] | ✓ | ||||||||||||||||||||||||
[93] | ✓ | ✓ | |||||||||||||||||||||||
[94] | ✓ | ||||||||||||||||||||||||
[95,96] | ✓ | ||||||||||||||||||||||||
[97] | ✓ | ✓ | |||||||||||||||||||||||
[98] | ✓ | ✓ | ✓ | ✓ | |||||||||||||||||||||
[99,100,101] | ✓ | ✓ | ✓ | ||||||||||||||||||||||
[102] | ✓ | ✓ | |||||||||||||||||||||||
[103,104] | ✓ | ||||||||||||||||||||||||
[105] | ✓ | ✓ | |||||||||||||||||||||||
[106] | ✓ | ✓ | |||||||||||||||||||||||
[107,108] | ✓ | ✓ | ✓ | ||||||||||||||||||||||
[109] | ✓ | ✓ | ✓ | ✓ | |||||||||||||||||||||
[110] | ✓ | ✓ | ✓ | ||||||||||||||||||||||
[111] | ✓ | ✓ | |||||||||||||||||||||||
[112] | ✓ | ✓ | ✓ | ✓ | ✓ | ||||||||||||||||||||
[113] | ✓ | ✓ | ✓ | ||||||||||||||||||||||
[58] | ✓ | ✓ | ✓ | ||||||||||||||||||||||
[114] | ✓ | ✓ | |||||||||||||||||||||||
[115,116] | ✓ | ✓ | |||||||||||||||||||||||
[65,66,117,118] | ✓ | ✓ | |||||||||||||||||||||||
[67] | ✓ | ||||||||||||||||||||||||
[119] | ✓ | ||||||||||||||||||||||||
[120,121] | ✓ | ✓ | |||||||||||||||||||||||
[122,123,124] | ✓ | ||||||||||||||||||||||||
[125] | ✓ | ✓ | |||||||||||||||||||||||
[126,127,128] | ✓ | ||||||||||||||||||||||||
[129] | ✓ | ||||||||||||||||||||||||
[130] | ✓ | ✓ | ✓ | ||||||||||||||||||||||
[131] | ✓ | ||||||||||||||||||||||||
[132] | ✓ | ||||||||||||||||||||||||
[133] | ✓ | ✓ | ✓ | ✓ | |||||||||||||||||||||
[134,135] | ✓ | ||||||||||||||||||||||||
[73] | ✓ | ✓ | |||||||||||||||||||||||
[136] | ✓ | ✓ | |||||||||||||||||||||||
[137] | ✓ | ✓ | |||||||||||||||||||||||
[138,139,140,141] | ✓ | ||||||||||||||||||||||||
[142] | ✓ | ✓ | |||||||||||||||||||||||
[143,144,145] | ✓ | ||||||||||||||||||||||||
[59,146,147,148,149] | ✓ | ||||||||||||||||||||||||
[150] | ✓ | ✓ | |||||||||||||||||||||||
[151] | ✓ | ✓ | |||||||||||||||||||||||
[152] | ✓ |
Concept | Works | Formalism | Non-Crypto. Tools | Cryptographic Tools | |||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
ILP | Graph | NS | Prob. | MPC | SSS | PRE | CH | ABE | ZKP | CAcc | MS | FHE | |||||
Identity Derivation | [97] | ✓ | ✓ | ||||||||||||||
Credential as a Service | [120] | ✓ | ✓ | ✓ | |||||||||||||
Revocation | [107] | ✓ | ✓ | ✓ | |||||||||||||
[108] | ✓ | ✓ | |||||||||||||||
[115] | ✓ | ✓ | |||||||||||||||
[113,116] | ✓ | ||||||||||||||||
[114] | ✓ | ✓ | ✓ | ||||||||||||||
Decentralized Identifiers | [148] | ✓ | |||||||||||||||
Issuer Authorization | [110] | ✓ | ✓ | ✓ | |||||||||||||
[109] | ✓ | ✓ | ✓ | ||||||||||||||
Backup and Recovery | [133] | ✓ | ✓ | ||||||||||||||
[134,137] | ✓ | ✓ | |||||||||||||||
[136] | ✓ | ✓ | |||||||||||||||
Verifier Authorization | [93] | ✓ | ✓ | ||||||||||||||
Data Minimization | [65,66,67,117] | ✓ | ✓ | ||||||||||||||
[98] | ✓ | ✓ | ✓ | ||||||||||||||
Reuse Prevention | [94] | ✓ | ✓ | ||||||||||||||
SSI Design/Architecture | [128] | ✓ | |||||||||||||||
Reputation Model | [122] | ✓ | ✓ | ||||||||||||||
[123,125] | ✓ | ✓ | |||||||||||||||
Trust Policy Evaluation | [143] | ✓ | ✓ | ✓ |
Add | Refute | ||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Functional | Non-Functional | ||||||||||||||||||||||||
Works | No Central Authority | Legacy Compatible | Verifiable Presentation | Counterfeit Prevention | Identity Verification | Identity Assurance | Secure transactions | Delegation | Recoverability | Usability | Accessibility | Availability | Auditability | Scalability | Free | Regulatory | Existence | Control | Access | Consent | Persistence | Transparency | Protection | ||
[19,112,197] | ✓ | ||||||||||||||||||||||||
[60] | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | |||||||||||||||||
[116] | ✓ | ✓ | |||||||||||||||||||||||
[128] | ✓ | ✓ | ✓ | ✓ | |||||||||||||||||||||
[198] | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | |||||||||||||||||||
[199] | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ||||||||||||||||||
[200] | ✓ | ✓ | |||||||||||||||||||||||
[201] | ✓ | ✓ | ✓ | ||||||||||||||||||||||
[202] | ✓ | ||||||||||||||||||||||||
[203] | ✓ | ✓ | ✓ | ||||||||||||||||||||||
[204] | ✓ | ✓ | ✓ | ||||||||||||||||||||||
[205] | ✓ | ||||||||||||||||||||||||
[206] | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | |||||||||||||||||
[207] | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | |||||||||||||||||||
[208] | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ |
Venue Type | Total | 2016 | 2017 | 2018 | 2019 | 2020 | 2021 |
---|---|---|---|---|---|---|---|
Blog Post | 1 | [208] | |||||
Website | 2 | [197] | [207] | ||||
Report | 1 | [202] | |||||
Standard | 4 | [58] | [59,147] | [146] | |||
Web Archive | 7 | [66,67,148] | [126] | [65,149,206] | |||
Conference | 42 | [198] | [73,107,112,125] | [91,95,99,103,122,134] | [98,102,114,123,127,133,136,140,142,143,199,203] | [92,96,97,101,104,105,110,111,118,119,121,131,132,137,141,144,145,151,152] | |
Journal | 15 | [19] | [60,128] | [106,108,117,130] | [94,100,113,115,120,124,138,150] | ||
Patent | 2 | [129,139] | |||||
Bachelor Thesis | 1 | [135] | |||||
Master Thesis | 6 | [201,204] | [200] | [205] | [93,116] | ||
PhD Thesis | 1 | [109] |
Venue Name | Total | Studies |
---|---|---|
Conference on Blockchain Research & Applications for Innovative Networks and Services | 2 | [102,127] |
Open Identity Summit | 2 | [144,145] |
International Conference on Information Networking | 2 | [131,151] |
IEEE Symposium Series on Computational Intelligence | 2 | [122,152] |
IEEE International Congress on Cybermatics | 2 | [112,125] |
IEEE International Conference on Blockchain and Cryptocurrency | 2 | [110,119] |
IEEE International Conference on Trust, Security and Privacy in Computing and Communications | 2 | [107,114] |
Journal Name | Total | Studies |
---|---|---|
Frontiers in Blockchain | 2 | [124,138] |
IEEE Access | 2 | [100,128] |
IEEE Internet of Things Journal | 2 | [120,150] |
IEEE Software | 1 | [130] |
IEEE Security and Privacy | 1 | [60] |
IEEE Transactions on Vehicular Technology | 1 | [108] |
IEEE Transactions on Computational Social Systems | 1 | [113] |
Elsevier Computer Science Review | 1 | [19] |
Elsevier Computers & Security | 1 | [117] |
MDPI Electronics | 1 | [106] |
IEICE Transactions on Information and Systems | 1 | [115] |
Ledger | 1 | [94] |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Schardong, F.; Custódio, R. Self-Sovereign Identity: A Systematic Review, Mapping and Taxonomy. Sensors 2022, 22, 5641. https://doi.org/10.3390/s22155641
Schardong F, Custódio R. Self-Sovereign Identity: A Systematic Review, Mapping and Taxonomy. Sensors. 2022; 22(15):5641. https://doi.org/10.3390/s22155641
Chicago/Turabian StyleSchardong, Frederico, and Ricardo Custódio. 2022. "Self-Sovereign Identity: A Systematic Review, Mapping and Taxonomy" Sensors 22, no. 15: 5641. https://doi.org/10.3390/s22155641
APA StyleSchardong, F., & Custódio, R. (2022). Self-Sovereign Identity: A Systematic Review, Mapping and Taxonomy. Sensors, 22(15), 5641. https://doi.org/10.3390/s22155641