{"id":"https://openalex.org/W3094243856","doi":"https://doi.org/10.1109/brains49436.2020.9223281","title":"An analysis of digital identity management systems - a two-mapping view","display_name":"An analysis of digital identity management systems - a two-mapping view","publication_year":2020,"publication_date":"2020-09-01","ids":{"openalex":"https://openalex.org/W3094243856","doi":"https://doi.org/10.1109/brains49436.2020.9223281","mag":"3094243856"},"language":"en","primary_location":{"id":"doi:10.1109/brains49436.2020.9223281","is_oa":false,"landing_page_url":"https://doi.org/10.1109/brains49436.2020.9223281","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 2nd Conference on Blockchain Research &amp; Applications for Innovative Networks and Services (BRAINS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100425107","display_name":"Jianwei Liu","orcid":"https://orcid.org/0000-0003-2965-3518"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Jianwei Liu","raw_affiliation_strings":["ShipChain, Inc., Greenville, SC 29601"],"affiliations":[{"raw_affiliation_string":"ShipChain, Inc., Greenville, SC 29601","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5025367272","display_name":"Adam Hodges","orcid":"https://orcid.org/0000-0001-8576-5800"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Adam Hodges","raw_affiliation_strings":["ShipChain, Inc., Greenville, SC 29601"],"affiliations":[{"raw_affiliation_string":"ShipChain, Inc., Greenville, SC 29601","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5023170139","display_name":"Lucas Clay","orcid":"https://orcid.org/0000-0002-3077-7860"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Lucas Clay","raw_affiliation_strings":["ShipChain, Inc., Greenville, SC 29601"],"affiliations":[{"raw_affiliation_string":"ShipChain, Inc., Greenville, SC 29601","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5048037600","display_name":"John Monarch","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"John Monarch","raw_affiliation_strings":["ShipChain, Inc., Greenville, SC 29601"],"affiliations":[{"raw_affiliation_string":"ShipChain, Inc., Greenville, SC 29601","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5100425107"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":1.2349,"has_fulltext":false,"cited_by_count":10,"citation_normalized_percentile":{"value":0.84420927,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":93,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"92","last_page":"96"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/identity","display_name":"Identity (music)","score":0.7405741810798645},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6964882016181946},{"id":"https://openalex.org/keywords/sovereignty","display_name":"Sovereignty","score":0.569010853767395},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.5544869303703308},{"id":"https://openalex.org/keywords/identity-management","display_name":"Identity management","score":0.5505504608154297},{"id":"https://openalex.org/keywords/perspective","display_name":"Perspective (graphical)","score":0.520948052406311},{"id":"https://openalex.org/keywords/digital-identity","display_name":"Digital identity","score":0.5181968808174133},{"id":"https://openalex.org/keywords/core","display_name":"Core (optical fiber)","score":0.4890540540218353},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.39294224977493286},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.34226858615875244},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.32017165422439575},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.186081200838089},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.12700197100639343},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.12535715103149414},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.09450078010559082}],"concepts":[{"id":"https://openalex.org/C2778355321","wikidata":"https://www.wikidata.org/wiki/Q17079427","display_name":"Identity (music)","level":2,"score":0.7405741810798645},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6964882016181946},{"id":"https://openalex.org/C186229450","wikidata":"https://www.wikidata.org/wiki/Q42008","display_name":"Sovereignty","level":3,"score":0.569010853767395},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.5544869303703308},{"id":"https://openalex.org/C555379026","wikidata":"https://www.wikidata.org/wiki/Q977772","display_name":"Identity management","level":3,"score":0.5505504608154297},{"id":"https://openalex.org/C12713177","wikidata":"https://www.wikidata.org/wiki/Q1900281","display_name":"Perspective (graphical)","level":2,"score":0.520948052406311},{"id":"https://openalex.org/C2779813694","wikidata":"https://www.wikidata.org/wiki/Q528053","display_name":"Digital identity","level":3,"score":0.5181968808174133},{"id":"https://openalex.org/C2164484","wikidata":"https://www.wikidata.org/wiki/Q5170150","display_name":"Core (optical fiber)","level":2,"score":0.4890540540218353},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.39294224977493286},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.34226858615875244},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.32017165422439575},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.186081200838089},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.12700197100639343},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.12535715103149414},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.09450078010559082},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C94625758","wikidata":"https://www.wikidata.org/wiki/Q7163","display_name":"Politics","level":2,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C24890656","wikidata":"https://www.wikidata.org/wiki/Q82811","display_name":"Acoustics","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/brains49436.2020.9223281","is_oa":false,"landing_page_url":"https://doi.org/10.1109/brains49436.2020.9223281","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 2nd Conference on Blockchain Research &amp; Applications for Innovative Networks and Services (BRAINS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.44999998807907104,"id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":7,"referenced_works":["https://openalex.org/W1485200701","https://openalex.org/W1494178662","https://openalex.org/W2296550676","https://openalex.org/W2884325794","https://openalex.org/W2957579120","https://openalex.org/W2964062734","https://openalex.org/W4285719527"],"related_works":["https://openalex.org/W1807703735","https://openalex.org/W1597337390","https://openalex.org/W4296443062","https://openalex.org/W4226460554","https://openalex.org/W1985709755","https://openalex.org/W2491806188","https://openalex.org/W63873997","https://openalex.org/W3159214774","https://openalex.org/W4214824409","https://openalex.org/W2625931504"],"abstract_inverted_index":{"Digital":[0],"identity":[1,18,58,65],"is":[2,52],"essential":[3],"to":[4,22,144],"almost":[5],"all":[6],"information":[7],"systems.":[8],"This":[9],"paper":[10],"provides":[11],"a":[12,49,102],"new":[13],"perspective":[14],"for":[15,46,117],"reducing":[16],"digital":[17],"management":[19,59,66],"systems":[20],"(DIMS)":[21],"two":[23],"mappings,":[24,30],"the":[25,29,32,37,62,69,75,87,126,134],"core":[26],"operations":[27],"on":[28,133],"and":[31,71,82,96,107,122],"trust":[33,88,105],"model":[34,89,106],"built":[35],"around":[36],"mappings.":[38],"Using":[39],"this":[40],"two-mapping":[41,135],"view,":[42],"we":[43,73],"derive":[44],"criteria":[45],"determining":[47],"whether":[48],"DIMS":[50],"solution":[51],"self-sovereign.":[53],"We":[54],"also":[55],"compare":[56],"decentralized":[57,81,111,128],"solutions":[60,84,112,129],"with":[61],"traditional":[63],"centralized":[64,83],"solutions.":[67],"From":[68],"comparison":[70],"analysis,":[72],"have":[74],"following":[76],"findings.":[77],"The":[78],"differences":[79,90],"between":[80],"stem":[85],"from":[86],"which":[91,139],"dictate":[92],"storage":[93,108],"scheme":[94],"differences,":[95],"therefore":[97],"other":[98],"operation-level":[99],"differences.":[100],"With":[101],"more":[103],"trustless":[104],"scheme,":[109],"current":[110,127],"can":[113,140],"be":[114],"promising":[115],"candidates":[116],"self-sovereign":[118],"DIMS.":[119],"Design":[120],"considerations":[121],"certain":[123],"limitations":[124],"of":[125],"are":[130],"analyzed":[131],"based":[132],"view":[136],"as":[137],"well,":[138],"provide":[141],"useful":[142],"directions":[143],"further":[145],"study.":[146]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":4},{"year":2021,"cited_by_count":2}],"updated_date":"2026-03-31T07:56:22.981413","created_date":"2025-10-10T00:00:00"}
