{"id":"https://openalex.org/W6962969727","doi":"https://doi.org/10.18420/oid2023_07","title":"Modeling the Threats to Self-Sovereign Identities","display_name":"Modeling the Threats to Self-Sovereign Identities","publication_year":2023,"publication_date":"2023-01-01","ids":{"openalex":"https://openalex.org/W6962969727","doi":"https://doi.org/10.18420/oid2023_07"},"language":"en","primary_location":{"id":"doi:10.18420/oid2023_07","is_oa":true,"landing_page_url":"https://doi.org/10.18420/oid2023_07","pdf_url":null,"source":{"id":"https://openalex.org/S7407052918","display_name":"Gesellschaft f\u00fcr Informatik (GI)","issn_l":null,"issn":[],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article-journal"},"type":"article","indexed_in":["datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://doi.org/10.18420/oid2023_07","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"P\u00f6hn, Daniela","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"P\u00f6hn, Daniela","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":null,"display_name":"Grabatin, Michael","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Grabatin, Michael","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":null,"display_name":"Hommel, Wolfgang","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Hommel, Wolfgang","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":3,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.5798,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.80616235,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":true,"primary_topic":{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.6761000156402588,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.6761000156402588,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.11159999668598175,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.03889999911189079,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/identity-management","display_name":"Identity management","score":0.8240000009536743},{"id":"https://openalex.org/keywords/identity","display_name":"Identity (music)","score":0.6930999755859375},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.5878999829292297},{"id":"https://openalex.org/keywords/ledger","display_name":"Ledger","score":0.5393999814987183},{"id":"https://openalex.org/keywords/identity-theft","display_name":"Identity theft","score":0.5037000179290771},{"id":"https://openalex.org/keywords/distributed-ledger","display_name":"Distributed ledger","score":0.5019999742507935},{"id":"https://openalex.org/keywords/core","display_name":"Core (optical fiber)","score":0.46369999647140503},{"id":"https://openalex.org/keywords/focus","display_name":"Focus (optics)","score":0.4474000036716461},{"id":"https://openalex.org/keywords/stride","display_name":"STRIDE","score":0.3790000081062317}],"concepts":[{"id":"https://openalex.org/C555379026","wikidata":"https://www.wikidata.org/wiki/Q977772","display_name":"Identity management","level":3,"score":0.8240000009536743},{"id":"https://openalex.org/C2778355321","wikidata":"https://www.wikidata.org/wiki/Q17079427","display_name":"Identity (music)","level":2,"score":0.6930999755859375},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6069999933242798},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.6032000184059143},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.5878999829292297},{"id":"https://openalex.org/C91302708","wikidata":"https://www.wikidata.org/wiki/Q2732056","display_name":"Ledger","level":2,"score":0.5393999814987183},{"id":"https://openalex.org/C522325796","wikidata":"https://www.wikidata.org/wiki/Q471880","display_name":"Identity theft","level":2,"score":0.5037000179290771},{"id":"https://openalex.org/C2777541363","wikidata":"https://www.wikidata.org/wiki/Q25110971","display_name":"Distributed ledger","level":3,"score":0.5019999742507935},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.4756999909877777},{"id":"https://openalex.org/C2164484","wikidata":"https://www.wikidata.org/wiki/Q5170150","display_name":"Core (optical fiber)","level":2,"score":0.46369999647140503},{"id":"https://openalex.org/C192209626","wikidata":"https://www.wikidata.org/wiki/Q190909","display_name":"Focus (optics)","level":2,"score":0.4474000036716461},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.4146000146865845},{"id":"https://openalex.org/C18007350","wikidata":"https://www.wikidata.org/wiki/Q7394815","display_name":"STRIDE","level":2,"score":0.3790000081062317},{"id":"https://openalex.org/C2776126399","wikidata":"https://www.wikidata.org/wiki/Q3942906","display_name":"Immutability","level":3,"score":0.3765000104904175},{"id":"https://openalex.org/C2779813694","wikidata":"https://www.wikidata.org/wiki/Q528053","display_name":"Digital identity","level":3,"score":0.3675999939441681},{"id":"https://openalex.org/C39549134","wikidata":"https://www.wikidata.org/wiki/Q133080","display_name":"Public relations","level":1,"score":0.353300005197525},{"id":"https://openalex.org/C2780900520","wikidata":"https://www.wikidata.org/wiki/Q100268981","display_name":"Denial","level":2,"score":0.34790000319480896},{"id":"https://openalex.org/C178005623","wikidata":"https://www.wikidata.org/wiki/Q308859","display_name":"Anonymity","level":2,"score":0.3400000035762787},{"id":"https://openalex.org/C128487930","wikidata":"https://www.wikidata.org/wiki/Q579488","display_name":"Information management","level":2,"score":0.33079999685287476},{"id":"https://openalex.org/C144024400","wikidata":"https://www.wikidata.org/wiki/Q21201","display_name":"Sociology","level":0,"score":0.3262999951839447},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.3158000111579895},{"id":"https://openalex.org/C169093310","wikidata":"https://www.wikidata.org/wiki/Q3702971","display_name":"Personally identifiable information","level":2,"score":0.3109999895095825},{"id":"https://openalex.org/C116834253","wikidata":"https://www.wikidata.org/wiki/Q2039217","display_name":"Identification (biology)","level":2,"score":0.29919999837875366},{"id":"https://openalex.org/C180198813","wikidata":"https://www.wikidata.org/wiki/Q121182","display_name":"Information system","level":2,"score":0.29670000076293945},{"id":"https://openalex.org/C127627568","wikidata":"https://www.wikidata.org/wiki/Q1639361","display_name":"Sociotechnical system","level":2,"score":0.2944999933242798},{"id":"https://openalex.org/C56739046","wikidata":"https://www.wikidata.org/wiki/Q192060","display_name":"Knowledge management","level":1,"score":0.2842000126838684},{"id":"https://openalex.org/C121017731","wikidata":"https://www.wikidata.org/wiki/Q11661","display_name":"Information technology","level":2,"score":0.27730000019073486},{"id":"https://openalex.org/C110406131","wikidata":"https://www.wikidata.org/wiki/Q41349","display_name":"Smart card","level":2,"score":0.2736000120639801},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.2712000012397766},{"id":"https://openalex.org/C2909731529","wikidata":"https://www.wikidata.org/wiki/Q334401","display_name":"Electronic surveillance","level":2,"score":0.26440000534057617},{"id":"https://openalex.org/C195094911","wikidata":"https://www.wikidata.org/wiki/Q14167904","display_name":"Process management","level":1,"score":0.2554999887943268},{"id":"https://openalex.org/C118463975","wikidata":"https://www.wikidata.org/wiki/Q220849","display_name":"Digital signature","level":3,"score":0.2533000111579895},{"id":"https://openalex.org/C2777710495","wikidata":"https://www.wikidata.org/wiki/Q5527195","display_name":"Gateway (web page)","level":2,"score":0.2515999972820282}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.18420/oid2023_07","is_oa":true,"landing_page_url":"https://doi.org/10.18420/oid2023_07","pdf_url":null,"source":{"id":"https://openalex.org/S7407052918","display_name":"Gesellschaft f\u00fcr Informatik (GI)","issn_l":null,"issn":[],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article-journal"}],"best_oa_location":{"id":"doi:10.18420/oid2023_07","is_oa":true,"landing_page_url":"https://doi.org/10.18420/oid2023_07","pdf_url":null,"source":{"id":"https://openalex.org/S7407052918","display_name":"Gesellschaft f\u00fcr Informatik (GI)","issn_l":null,"issn":[],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article-journal"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.6697800755500793,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"Self-sovereign":[0],"identity":[1,7,50],"(SSI)":[2],"is":[3,62],"a":[4,17],"relatively":[5],"young":[6],"management":[8,51,54],"paradigm":[9],"allowing":[10],"digital":[11],"identities":[12],"to":[13,64,68,89],"be":[14],"managed":[15],"in":[16,47],"user-centric,":[18],"decentralized":[19],"manner,":[20],"often":[21],"but":[22],"not":[23],"necessarily":[24],"utilizing":[25],"distributed":[26],"ledger":[27],"technologies.":[28],"This":[29],"emerging":[30],"technology":[31],"gets":[32],"into":[33],"the":[34,37,53,66,72,90,97,103],"focus":[35],"through":[36],"new":[38],"electronic":[39],"IDentification,":[40],"Authentication":[41],"and":[42,55,82,96,111],"trust":[43],"Services":[44],"(eIDAS)":[45],"regulation":[46],"Europe.":[48],"As":[49],"involves":[52],"use":[56],"of":[57,80,84,93],"personally":[58],"identifiable":[59],"information,":[60],"it":[61],"important":[63],"evaluate":[65],"threats":[67],"SSI.":[69],"We":[70],"apply":[71],"STRIDE":[73],"(Spoofing,":[74],"Tampering,":[75],"Repudiation,":[76],"Information":[77],"Disclosure,":[78],"Denial":[79],"Service,":[81],"Elevation":[83],"Privilege)":[85],"threat":[86],"modeling":[87],"approach":[88],"core":[91],"components":[92],"SSI":[94],"architecture":[95],"interactions":[98],"between":[99],"them.":[100],"Based":[101],"on":[102],"summarized":[104],"results,":[105],"we":[106],"discuss":[107],"relevant":[108],"mitigation":[109],"methods":[110],"future":[112],"research":[113],"areas.":[114]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2025-11-06T06:51:31.235846","created_date":"2025-10-10T00:00:00"}
