{"id":"https://openalex.org/W4406892607","doi":"https://doi.org/10.1109/csnet64211.2024.10851747","title":"Towards the Removal of Identification and Authentication Authority from IM Systems","display_name":"Towards the Removal of Identification and Authentication Authority from IM Systems","publication_year":2024,"publication_date":"2024-12-04","ids":{"openalex":"https://openalex.org/W4406892607","doi":"https://doi.org/10.1109/csnet64211.2024.10851747"},"language":"en","primary_location":{"id":"doi:10.1109/csnet64211.2024.10851747","is_oa":false,"landing_page_url":"https://doi.org/10.1109/csnet64211.2024.10851747","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 8th Cyber Security in Networking Conference (CSNet)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5084541828","display_name":"David Cordova Morales","orcid":"https://orcid.org/0000-0002-9312-9596"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"David A. Cordova Morales","raw_affiliation_strings":["Instituto Polit&#x00E9;cnico Nacional,Center for Computing Research,Mexico"],"affiliations":[{"raw_affiliation_string":"Instituto Polit&#x00E9;cnico Nacional,Center for Computing Research,Mexico","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5041476109","display_name":"Ahmad Samer Wazan","orcid":"https://orcid.org/0000-0002-1611-2870"},"institutions":[{"id":"https://openalex.org/I91044093","display_name":"Zayed University","ror":"https://ror.org/03snqfa66","country_code":"AE","type":"education","lineage":["https://openalex.org/I91044093"]}],"countries":["AE"],"is_corresponding":false,"raw_author_name":"Ahmad Samer Wazan","raw_affiliation_strings":["College of Technological Innovation, Zayed University,UAE"],"affiliations":[{"raw_affiliation_string":"College of Technological Innovation, Zayed University,UAE","institution_ids":["https://openalex.org/I91044093"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5001626345","display_name":"Romain Laborde","orcid":"https://orcid.org/0000-0002-0943-6180"},"institutions":[{"id":"https://openalex.org/I4210119061","display_name":"Institut de Recherche en Informatique de Toulouse","ror":"https://ror.org/01rx4qw44","country_code":"FR","type":"facility","lineage":["https://openalex.org/I1294671590","https://openalex.org/I205747304","https://openalex.org/I205747304","https://openalex.org/I4210119061","https://openalex.org/I4387153255","https://openalex.org/I4405258862","https://openalex.org/I4405258862"]},{"id":"https://openalex.org/I134560555","display_name":"Universit\u00e9 Toulouse III - Paul Sabatier","ror":"https://ror.org/02v6kpv12","country_code":"FR","type":"education","lineage":["https://openalex.org/I134560555","https://openalex.org/I4405258862"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"Romain Laborde","raw_affiliation_strings":["Institut de Recherche en Informatique de Toulouse, Universit&#x00E9; Toulouse III Paul Sabatier,France"],"affiliations":[{"raw_affiliation_string":"Institut de Recherche en Informatique de Toulouse, Universit&#x00E9; Toulouse III Paul Sabatier,France","institution_ids":["https://openalex.org/I134560555","https://openalex.org/I4210119061"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5113422593","display_name":"Muhammad Imran Taj","orcid":null},"institutions":[{"id":"https://openalex.org/I91044093","display_name":"Zayed University","ror":"https://ror.org/03snqfa66","country_code":"AE","type":"education","lineage":["https://openalex.org/I91044093"]}],"countries":["AE"],"is_corresponding":false,"raw_author_name":"Muhammad Imran Taj","raw_affiliation_strings":["College of Interdisciplinary Studies, Zayed University,UAE"],"affiliations":[{"raw_affiliation_string":"College of Interdisciplinary Studies, Zayed University,UAE","institution_ids":["https://openalex.org/I91044093"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5085318263","display_name":"Adib Habbal","orcid":"https://orcid.org/0000-0002-3939-2609"},"institutions":[{"id":"https://openalex.org/I173761726","display_name":"Karab\u00fck University","ror":"https://ror.org/04wy7gp54","country_code":"TR","type":"education","lineage":["https://openalex.org/I173761726"]}],"countries":["TR"],"is_corresponding":false,"raw_author_name":"Adib Habbal","raw_affiliation_strings":["Karabuk University,Department of Computer Engineering,Turkey"],"affiliations":[{"raw_affiliation_string":"Karabuk University,Department of Computer Engineering,Turkey","institution_ids":["https://openalex.org/I173761726"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5090418041","display_name":"Gina Gallegos-Garc\u00eda","orcid":"https://orcid.org/0000-0002-5212-350X"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Gina Gallegos-Garc\u00eda","raw_affiliation_strings":["Instituto Polit&#x00E9;cnico Nacional,Center for Computing Research,Mexico"],"affiliations":[{"raw_affiliation_string":"Instituto Polit&#x00E9;cnico Nacional,Center for Computing Research,Mexico","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5084541828"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.42602146,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"243","last_page":"247"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T13999","display_name":"Digital Rights Management and Security","score":0.932699978351593,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T13999","display_name":"Digital Rights Management and Security","score":0.932699978351593,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/identification","display_name":"Identification (biology)","score":0.6693447828292847},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5699880123138428},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.5627350807189941},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4198421239852905}],"concepts":[{"id":"https://openalex.org/C116834253","wikidata":"https://www.wikidata.org/wiki/Q2039217","display_name":"Identification (biology)","level":2,"score":0.6693447828292847},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5699880123138428},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.5627350807189941},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4198421239852905},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C59822182","wikidata":"https://www.wikidata.org/wiki/Q441","display_name":"Botany","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/csnet64211.2024.10851747","is_oa":false,"landing_page_url":"https://doi.org/10.1109/csnet64211.2024.10851747","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 8th Cyber Security in Networking Conference (CSNet)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":13,"referenced_works":["https://openalex.org/W2112995928","https://openalex.org/W2126193037","https://openalex.org/W2254160488","https://openalex.org/W2266913699","https://openalex.org/W2484594147","https://openalex.org/W2592202875","https://openalex.org/W2944922632","https://openalex.org/W3160136825","https://openalex.org/W4309172153","https://openalex.org/W4312766124","https://openalex.org/W4324007072","https://openalex.org/W4400977096","https://openalex.org/W6677548862"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W4391913857","https://openalex.org/W2358668433","https://openalex.org/W4396701345","https://openalex.org/W2376932109","https://openalex.org/W3216707083","https://openalex.org/W2912135041"],"abstract_inverted_index":{"In":[0],"recent":[1],"years,":[2],"the":[3,12,63,84,105,121,127],"rise":[4],"of":[5,44,86],"Instant":[6],"Messaging":[7],"(IM)":[8],"platforms":[9],"has":[10],"underscored":[11],"need":[13],"for":[14,54],"secure":[15],"authentication":[16,32,57,96],"and":[17,41,75,95,112,126,131,137],"encryption":[18,21],"mechanisms.":[19],"While":[20],"challenges":[22],"have":[23],"been":[24],"addressed":[25],"by":[26],"protocols":[27],"like":[28,120],"Signal,":[29],"public":[30,55,81],"key":[31,56],"re-mains":[33],"problematic":[34],"due":[35],"to":[36,79,101],"centralized":[37],"infrastructure,":[38],"trust":[39],"issues,":[40],"user":[42,109],"misunderstanding":[43],"End-to-End":[45],"Encryption":[46],"(E2EE).":[47],"This":[48],"paper":[49],"introduces":[50],"a":[51],"decentralized":[52],"framework":[53,70,107],"in":[58],"IM":[59,87],"services,":[60],"based":[61],"on":[62],"Trust":[64,132],"over":[65],"IP":[66],"(ToIP)":[67],"model.":[68],"Our":[69],"utilizes":[71],"Decentralized":[72],"Identifiers":[73],"(DIDs)":[74],"Verifiable":[76],"Credentials":[77],"(VCs)":[78],"manage":[80],"keys":[82],"outside":[83],"control":[85,100],"providers,":[88],"eliminating":[89],"their":[90],"role":[91],"as":[92],"artificial":[93],"identification":[94],"authorities.":[97],"By":[98],"shifting":[99],"decentralized,":[102],"transparent":[103],"systems,":[104],"proposed":[106],"enhances":[108],"privacy,":[110],"security,":[111],"autonomy.":[113],"It":[114],"also":[115],"aligns":[116],"with":[117],"regulatory":[118],"standards":[119],"Digital":[122],"Markets":[123],"Act":[124],"(DMA)":[125],"Electronic":[128],"Identification,":[129],"Authentication,":[130],"Services":[133],"(eIDAS),":[134],"fostering":[135],"compliance":[136],"interoperability.":[138]},"counts_by_year":[],"updated_date":"2025-12-27T23:08:20.325037","created_date":"2025-10-10T00:00:00"}
