Enabling Decentralised Identifiers and Verifiable Credentials for Constrained IoT Devices using OAuth-based Delegation
dc.contributor | Aalto-yliopisto | fi |
dc.contributor | Aalto University | en |
dc.contributor.author | Lagutin, Dmitrij | en_US |
dc.contributor.author | Kortesniemi, Yki | en_US |
dc.contributor.author | Fotiou, Nikos | en_US |
dc.contributor.author | Siris, Vasilios A. | en_US |
dc.contributor.department | Department of Communications and Networking | en |
dc.contributor.department | Department of Computer Science | en |
dc.contributor.groupauthor | Group Turpeinen M. | en |
dc.contributor.groupauthor | Helsinki Institute for Information Technology (HIIT) | en |
dc.contributor.organization | Athens University of Economics and Business | en_US |
dc.date.accessioned | 2020-02-12T10:50:05Z | |
dc.date.available | 2020-02-12T10:50:05Z | |
dc.date.issued | 2019 | en_US |
dc.description | | openaire: EC/H2020/779984/EU//SOFIE | |
dc.description.abstract | Decentralised identifiers (DIDs) and verifiable credentials (VCs) are upcoming standards for self-sovereign privacy-preserving identifiers and authorisation, respectively. This focus on privacy can help improve many services and open up new business models, but using DIDs and VCs directly on constrained IoT devices can be problematic due to the management and resource overhead. This paper presents an OAuth-based method to delegate the processing and access policy management to the Authorisation Server thus allowing also systems with constrained IoT devices to benefit from DIDs and VCs. | en |
dc.description.version | Peer reviewed | en |
dc.format.extent | 6 | |
dc.format.mimetype | application/pdf | en_US |
dc.identifier.citation | Lagutin, D, Kortesniemi, Y, Fotiou, N & Siris, V A 2019, Enabling Decentralised Identifiers and Verifiable Credentials for Constrained IoT Devices using OAuth-based Delegation . in Proceedings of DISS 2019 – Workshop on Decentralized IoT Systems and Security . Internet Society, Workshop on Decentralized IoT Systems and Security, San Diego, California, United States, 24/02/2019 . https://doi.org/10.14722/diss.2019.23005 | en |
dc.identifier.doi | 10.14722/diss.2019.23005 | en_US |
dc.identifier.isbn | 1-891562-56-8 | |
dc.identifier.other | PURE UUID: a7af2fd5-d16b-480d-8e28-cdbc8aaaaf16 | en_US |
dc.identifier.other | PURE ITEMURL: https://research.aalto.fi/en/publications/a7af2fd5-d16b-480d-8e28-cdbc8aaaaf16 | en_US |
dc.identifier.other | PURE FILEURL: https://research.aalto.fi/files/33061874/ELEC_Lagutin_Enabling_NDSS2019_DISS.pdf | en_US |
dc.identifier.uri | https://aaltodoc.aalto.fi/handle/123456789/43110 | |
dc.identifier.urn | URN:NBN:fi:aalto-202002122179 | |
dc.language.iso | en | en |
dc.relation | info:eu-repo/grantAgreement/EC/H2020/779984/EU//SOFIE | en_US |
dc.relation.ispartof | Workshop on Decentralized IoT Systems and Security | en |
dc.relation.ispartofseries | Proceedings of DISS 2019 – Workshop on Decentralized IoT Systems and Security | en |
dc.rights | openAccess | en |
dc.subject.keyword | Internet of Things | en_US |
dc.subject.keyword | authorisation | en_US |
dc.subject.keyword | decentralised identifiers | en_US |
dc.subject.keyword | verifiable credentials | en_US |
dc.subject.keyword | privacy | en_US |
dc.subject.keyword | OAuth | en_US |
dc.subject.keyword | ACE | en_US |
dc.title | Enabling Decentralised Identifiers and Verifiable Credentials for Constrained IoT Devices using OAuth-based Delegation | en |
dc.type | A4 Artikkeli konferenssijulkaisussa | fi |
dc.type.version | publishedVersion |