Some access control models are used in different fields, including the military sector. An example is the Mandatory Access Control model where resources may be categorized or marked. These models are frequently paired with Identity and Access Management systems, which control the processes of identification, authentication, and authorization. IdAM systems evolved from centralized authority to more user-centric models like Self-Sovereign Identity. The goal of this research is to employ an access control model in conjunction with SSI to manage access to verifiable credentials associated with the identities of individuals or units. To achieve this, we suggest using an ORCON paradigm, in which the creator of verifiable credentials establishes an access policy to improve privacy and protection from unauthorized access attempts.
A Military IdAM System Based on SSI and ORCON
Bistarelli S.;Luchini C.
;Santini F.
2023
Abstract
Some access control models are used in different fields, including the military sector. An example is the Mandatory Access Control model where resources may be categorized or marked. These models are frequently paired with Identity and Access Management systems, which control the processes of identification, authentication, and authorization. IdAM systems evolved from centralized authority to more user-centric models like Self-Sovereign Identity. The goal of this research is to employ an access control model in conjunction with SSI to manage access to verifiable credentials associated with the identities of individuals or units. To achieve this, we suggest using an ORCON paradigm, in which the creator of verifiable credentials establishes an access policy to improve privacy and protection from unauthorized access attempts.I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.