{"id":"https://openalex.org/W4408669299","doi":"https://doi.org/10.1186/s13635-025-00195-6","title":"Designing a security incident response process for self-sovereign identities","display_name":"Designing a security incident response process for self-sovereign identities","publication_year":2025,"publication_date":"2025-03-20","ids":{"openalex":"https://openalex.org/W4408669299","doi":"https://doi.org/10.1186/s13635-025-00195-6"},"language":"en","primary_location":{"id":"doi:10.1186/s13635-025-00195-6","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s13635-025-00195-6","pdf_url":"https://jis-eurasipjournals.springeropen.com/counter/pdf/10.1186/s13635-025-00195-6","source":{"id":"https://openalex.org/S4210195102","display_name":"EURASIP Journal on Information Security","issn_l":"2510-523X","issn":["2510-523X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"EURASIP Journal on Information Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://jis-eurasipjournals.springeropen.com/counter/pdf/10.1186/s13635-025-00195-6","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5009391137","display_name":"Leonhard Ziegler","orcid":null},"institutions":[{"id":"https://openalex.org/I40527276","display_name":"Universit\u00e4t der Bundeswehr M\u00fcnchen","ror":"https://ror.org/05kkv3f82","country_code":"DE","type":"education","lineage":["https://openalex.org/I1315109972","https://openalex.org/I40527276","https://openalex.org/I4387152969"]}],"countries":["DE"],"is_corresponding":true,"raw_author_name":"Leonhard Ziegler","raw_affiliation_strings":["RI CODE, University of the Bundeswehr Munich, Werner-Heisenberg-Weg 39, Neubiberg, 85579, Bavaria, Germany"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"RI CODE, University of the Bundeswehr Munich, Werner-Heisenberg-Weg 39, Neubiberg, 85579, Bavaria, Germany","institution_ids":["https://openalex.org/I40527276"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5022524031","display_name":"Michael Grabatin","orcid":null},"institutions":[{"id":"https://openalex.org/I40527276","display_name":"Universit\u00e4t der Bundeswehr M\u00fcnchen","ror":"https://ror.org/05kkv3f82","country_code":"DE","type":"education","lineage":["https://openalex.org/I1315109972","https://openalex.org/I40527276","https://openalex.org/I4387152969"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Michael Grabatin","raw_affiliation_strings":["RI CODE, University of the Bundeswehr Munich, Werner-Heisenberg-Weg 39, Neubiberg, 85579, Bavaria, Germany"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"RI CODE, University of the Bundeswehr Munich, Werner-Heisenberg-Weg 39, Neubiberg, 85579, Bavaria, Germany","institution_ids":["https://openalex.org/I40527276"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5087077755","display_name":"Daniela P\u00f6hn","orcid":"https://orcid.org/0000-0002-6373-3637"},"institutions":[{"id":"https://openalex.org/I40527276","display_name":"Universit\u00e4t der Bundeswehr M\u00fcnchen","ror":"https://ror.org/05kkv3f82","country_code":"DE","type":"education","lineage":["https://openalex.org/I1315109972","https://openalex.org/I40527276","https://openalex.org/I4387152969"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Daniela P\u00f6hn","raw_affiliation_strings":["RI CODE, University of the Bundeswehr Munich, Werner-Heisenberg-Weg 39, Neubiberg, 85579, Bavaria, Germany"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"RI CODE, University of the Bundeswehr Munich, Werner-Heisenberg-Weg 39, Neubiberg, 85579, Bavaria, Germany","institution_ids":["https://openalex.org/I40527276"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5054066129","display_name":"Wolfgang Hommel","orcid":"https://orcid.org/0000-0002-1013-7284"},"institutions":[{"id":"https://openalex.org/I40527276","display_name":"Universit\u00e4t der Bundeswehr M\u00fcnchen","ror":"https://ror.org/05kkv3f82","country_code":"DE","type":"education","lineage":["https://openalex.org/I1315109972","https://openalex.org/I40527276","https://openalex.org/I4387152969"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Wolfgang Hommel","raw_affiliation_strings":["RI CODE, University of the Bundeswehr Munich, Werner-Heisenberg-Weg 39, Neubiberg, 85579, Bavaria, Germany"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"RI CODE, University of the Bundeswehr Munich, Werner-Heisenberg-Weg 39, Neubiberg, 85579, Bavaria, Germany","institution_ids":["https://openalex.org/I40527276"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5009391137"],"corresponding_institution_ids":["https://openalex.org/I40527276"],"apc_list":{"value":660,"currency":"GBP","value_usd":809},"apc_paid":{"value":660,"currency":"GBP","value_usd":809},"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.04492595,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"2025","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9976000189781189,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9914000034332275,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8314764499664307},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6048306822776794},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.5657641291618347},{"id":"https://openalex.org/keywords/incident-response","display_name":"Incident response","score":0.46270042657852173},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.08221018314361572}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8314764499664307},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6048306822776794},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.5657641291618347},{"id":"https://openalex.org/C2985105721","wikidata":"https://www.wikidata.org/wiki/Q13479512","display_name":"Incident response","level":2,"score":0.46270042657852173},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.08221018314361572}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1186/s13635-025-00195-6","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s13635-025-00195-6","pdf_url":"https://jis-eurasipjournals.springeropen.com/counter/pdf/10.1186/s13635-025-00195-6","source":{"id":"https://openalex.org/S4210195102","display_name":"EURASIP Journal on Information Security","issn_l":"2510-523X","issn":["2510-523X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"EURASIP Journal on Information Security","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:0040a77ea0b34454bc10ca271e576f99","is_oa":true,"landing_page_url":"https://doaj.org/article/0040a77ea0b34454bc10ca271e576f99","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"EURASIP Journal on Information Security, Vol 2025, Iss 1, Pp 1-17 (2025)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1186/s13635-025-00195-6","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s13635-025-00195-6","pdf_url":"https://jis-eurasipjournals.springeropen.com/counter/pdf/10.1186/s13635-025-00195-6","source":{"id":"https://openalex.org/S4210195102","display_name":"EURASIP Journal on Information Security","issn_l":"2510-523X","issn":["2510-523X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"EURASIP Journal on Information Security","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4408669299.pdf"},"referenced_works_count":30,"referenced_works":["https://openalex.org/W1988699025","https://openalex.org/W2236523039","https://openalex.org/W2570229536","https://openalex.org/W2617200927","https://openalex.org/W2869624149","https://openalex.org/W2891872419","https://openalex.org/W2921777781","https://openalex.org/W2947934102","https://openalex.org/W2963549118","https://openalex.org/W2976538430","https://openalex.org/W2979994823","https://openalex.org/W3111742335","https://openalex.org/W3112186396","https://openalex.org/W3121396509","https://openalex.org/W3184791387","https://openalex.org/W3204342889","https://openalex.org/W3211894163","https://openalex.org/W4205498077","https://openalex.org/W4205546762","https://openalex.org/W4207015874","https://openalex.org/W4226460554","https://openalex.org/W4283123663","https://openalex.org/W4288722582","https://openalex.org/W4292158658","https://openalex.org/W4312810470","https://openalex.org/W4362721082","https://openalex.org/W4386585109","https://openalex.org/W4390174858","https://openalex.org/W4407734987","https://openalex.org/W6962969727"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W4251008024","https://openalex.org/W2170135113","https://openalex.org/W4403882784","https://openalex.org/W136373522","https://openalex.org/W1996967322","https://openalex.org/W4206206623","https://openalex.org/W1991606108"],"abstract_inverted_index":{"Abstract":[0],"While":[1],"self-sovereign":[2],"identities":[3],"(SSI)":[4],"have":[5],"been":[6],"gaining":[7],"more":[8,142,146],"traction,":[9],"the":[10,52,69,89,101,105,124,149,151,157,163,185,210,220,228],"topic":[11],"of":[12,91,107,126,138,187,195],"SSI":[13,167,188],"security":[14,25,43,94],"has":[15],"yet":[16],"to":[17,24,38,41,80,84,184],"be":[18,81],"addressed.":[19],"Especially":[20],"regarding":[21],"response":[22,34,75,96,119],"procedures":[23],"incidents,":[26],"no":[27],"prior":[28],"work":[29],"is":[30,154],"available.":[31],"However,":[32,121],"incident":[33,44,74,95,118,196,222,231],"processes":[35],"are":[36,77,206],"essential":[37],"systematically":[39],"respond":[40],"a":[42,46,57,93,116],"in":[45,123,156],"timely":[47],"manner.":[48],"We":[49],"first":[50,158],"evaluate":[51],"current":[53],"state-of-the-art":[54],"by":[55,160],"conducting":[56],"literature":[58],"survey":[59],"and":[60,144,169,174,215],"contacting":[61],"organizations":[62],"that":[63,73],"offer":[64],"SSI.":[65,99],"The":[66],"insights":[67],"underpin":[68],"subject\u2019s":[70],"relevance,":[71],"highlighting":[72],"capabilities":[76,202],"just":[78],"starting":[79],"developed.":[82],"Contributing":[83],"this":[85],"development,":[86],"we":[87,134],"identify":[88],"challenges":[90],"building":[92,115],"process":[97],"for":[98,203,224],"Mainly,":[100],"decentralized":[102],"nature":[103],"inhibits":[104],"utilization":[106],"known":[108],"best":[109],"practices,":[110],"which":[111],"all":[112,162],"focus":[113],"on":[114,209],"centralized":[117,129,143],"capability.":[120],"even":[122],"case":[125],"SSI,":[127],"some":[128],"entities":[130],"may":[131],"exist.":[132],"Therefore,":[133],"design":[135],"two":[136],"variants":[137],"SIR":[139],"processes:":[140],"one":[141,145],"decentralized.":[147],"For":[148,198],"latter,":[150],"problem":[152],"size":[153],"reduced":[155],"step":[159],"identifying":[161],"stakeholders":[164],"within":[165],"an":[166],"ecosystem":[168],"then":[170],"analyzing":[171],"possible":[172],"proactive":[173],"reactive":[175],"measures":[176],"each":[177,199,225],"participant":[178],"can":[179],"access.":[180],"This":[181],"procedure":[182],"leads":[183],"grouping":[186],"system":[189],"participants":[190],"into":[191],"three":[192],"distinct":[193],"domains":[194],"response.":[197],"domain,":[200],"different":[201],"handling":[204],"incidents":[205],"introduced":[207],"depending":[208],"involved":[211],"stakeholders,":[212],"their":[213,216],"infrastructure,":[214],"goals.":[217],"To":[218],"demonstrate":[219],"procedures,":[221],"scenarios":[223],"domain":[226],"highlight":[227],"workflows":[229],"during":[230],"handling.":[232]},"counts_by_year":[],"updated_date":"2026-05-06T08:25:59.206177","created_date":"2025-10-10T00:00:00"}
