Description |
1 online resource |
Note |
Includes index. |
Summary |
In a world of changing privacy regulations, identity theft, and online anonymity, identity is a precious and complex concept. Self-Sovereign Identity (SSI) is a set of technologies that move control of digital identity from third party "identity providers" directly to individuals, and it promises to be one of the most important trends for the coming decades. Now in Self-Sovereign Identity, privacy and personal data experts Drummond Reed and Alex Preukschat lay out a roadmap for a future of personal sovereignty powered by the Blockchain and cryptography. Cutting through the technical jargon with dozens of practical use cases from experts across all major industries, it presents a clear and compelling argument for why SSI is a paradigm shift, and shows how you can be ready to be prepared for it. |
Contents |
Part 1 An introduction to SSI -- Part 2 SSI technology -- Part 3 Decentralization as a model for life -- Part 4 How SSI will change your business -- appendix A Additional Livebook chapters -- appendix B Landmark essays on SSI -- appendix C The path to self-sovereign identity -- appendix D Identity in the Ethereum blockchain ecosystem -- appendix E The principles of SSI -- index -- Self-Sovereign Identity-back. |
Bibliography |
References -- 8 Decentralized identifiers -- 8.1 The conceptual level: What is a DID? -- 8.1.1 URIs -- 8.1.2 URLs -- 8.1.3 URNs -- 8.1.4 DIDs -- 8.2 The functional level: How DIDs work -- 8.2.1 DID documents -- 8.2.2 DID methods -- 8.2.3 DID resolution -- 8.2.4 DID URLs -- 8.2.5 Comparison with the Domain Name System (DNS) -- 8.2.6 Comparison with URNs and other persistent Identifiers -- 8.2.7 Types of DIDs -- 8.3 The architectural level: Why DIDs work -- 8.3.1 The core problem of Public Key Infrastructure (PKI) -- 8.3.2 Solution 1: The conventional PKI model -- 8.3.3 Solution 2: The web-of-trust model -- 8.3.4 Solution 3: Public key-based identifiers -- 8.3.5 Solution 4: DIDs and DID documents -- 8.4 Four benefits of DIDs that go beyond PKI -- 8.4.1 Beyond PKI benefit 1: Guardianship and controllership -- 8.4.2 Beyond PKI benefit 2: Service endpoint discovery -- 8.4.3 Beyond PKI benefit 3: DID-to-DID connections -- 8.4.4 Beyond PKI benefit 4: Privacy by design at scale -- 8.5 The semantic level: What DIDs mean -- 8.5.1 The meaning of an address -- 8.5.2 DID networks and digital trust ecosystems -- 8.5.3 Why isn't a DID human-meaningful? -- 8.5.4 What does a DID identify? -- 9 Digital wallets and digital agents -- 9.1 What is a digital wallet, and what does it typically contain? -- 9.2 What is a digital agent, and how does it typically work with a digital wallet? -- 9.3 An example scenario -- 9.4 Design principles for SSI digital wallets and agents -- 9.4.1 Portable and Open-By-Default -- 9.4.2 Consent-driven -- 9.4.3 Privacy by design -- 9.4.4 Security by design -- 9.5 Basic anatomy of an SSI digital wallet and agent -- 9.6 Standard features of end-user digital wallets and agents -- 9.6.1 Notifications and user experience -- 9.6.2 Connecting: Establishing new digital trust relationships. |
Subject |
Computer security.
|
|
Data protection.
|
|
Identity theft -- Prevention.
|
|
Computer Security |
|
Sécurité informatique. |
|
Protection de l'information (Informatique) |
|
Computer security |
|
Data protection |
|
Identity theft -- Prevention |
Added Author |
Reed, Drummond, author.
|
|
Allen, Christopher, contributor.
|
|
Vogelsteller, Fabian, contributor.
|
|
Searls, Doc, writer of foreword.
|
Other Form: |
1-61729-659-7 |
ISBN |
9781638351023 (electronic bk.) |
|
1638351023 (electronic bk.) |
|
9781617296598 (electronic bk.) |
|
1617296597 (electronic bk.) |
|