Some access control models are used in different fields, including the military sector. An example is the Mandatory Access Control model where resources may be categorized or marked. These models are frequently paired with Identity and Access Management systems, which control the processes of identification, authentication, and authorization. IdAM systems evolved from centralized authority to more user-centric models like Self-Sovereign Identity. The goal of this research is to employ an access control model in conjunction with SSI to manage access to verifiable credentials associated with the identities of individuals or units. To achieve this, we suggest using an ORCON paradigm, in which the creator of verifiable credentials establishes an access policy to improve privacy and protection from unauthorized access attempts.

A Military IdAM System Based on SSI and ORCON / Stefano Bistarelli; Chiara Luchini; Francesco Santini. - ELETTRONICO. - (2023), pp. 83-88. (Intervento presentato al convegno Technologies for Defense and Security (TechDefense)) [10.1109/TechDefense59795.2023.10380863].

A Military IdAM System Based on SSI and ORCON

Chiara Luchini;
2023

Abstract

Some access control models are used in different fields, including the military sector. An example is the Mandatory Access Control model where resources may be categorized or marked. These models are frequently paired with Identity and Access Management systems, which control the processes of identification, authentication, and authorization. IdAM systems evolved from centralized authority to more user-centric models like Self-Sovereign Identity. The goal of this research is to employ an access control model in conjunction with SSI to manage access to verifiable credentials associated with the identities of individuals or units. To achieve this, we suggest using an ORCON paradigm, in which the creator of verifiable credentials establishes an access policy to improve privacy and protection from unauthorized access attempts.
2023
2023 IEEE International Workshop on Technologies for Defense and Security (TechDefense)
Technologies for Defense and Security (TechDefense)
Stefano Bistarelli; Chiara Luchini; Francesco Santini
File in questo prodotto:
Non ci sono file associati a questo prodotto.

I documenti in FLORE sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificatore per citare o creare un link a questa risorsa: https://hdl.handle.net/2158/1350594
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 0
  • ???jsp.display-item.citation.isi??? ND
social impact