Identity Systems and Threats: Towards a Holistic View
- Upcoming
- Tentative
- Breakout Sessions
- Upcoming
- Tentative
- Breakout Sessions
Meeting
Digital identities are crucial building blocks for our modern digital infrastructure. Over the last years, numerous governmental initiatives have been launched to establish certified digital identities, which are supposed to provide strong identification guarantees of their holders for digital processes in governmental as well as private sector applications. As a consequence, there are high security requirements for this type of identity system and all of its components. In this talk, we present relevant threat models on different layers of a system architecture for such a system and discuss potential challenges when composing their results. We thus argue for the necessity of a holistic approach to understand the threats against this type of a system.
Possible additional co-Chair (if registered): @carbeer
Agenda
Chairs:
Simone Onofri, Patrick Schaller
Description:
Digital identities are crucial building blocks for our modern digital infrastructure. Over the last years, numerous governmental initiatives have been launched to establish certified digital identities, which are supposed to provide strong identification guarantees of their holders for digital processes in governmental as well as private sector applications. As a consequence, there are high security requirements for this type of identity system and all of its components. In this talk, we present relevant threat models on different layers of a system architecture for such a system and discuss potential challenges when composing their results. We thus argue for the necessity of a holistic approach to understand the threats against this type of a system.
Possible additional co-Chair (if registered): @carbeer
Goal(s):
Present the Holistic view of Identity
Materials:
Joining Instructions
Instructions are restricted to W3C users . You need to log in to see them.
Export options
Personal Links
Please log in to export this event with all the information you have access to.
Public Links
The following links do not contain any sensitive information and can be shared publicly.