SIUV: A Smart Car Identity Management and Usage Control System Based on Verifiable Credentials

Author(s):  
Ali Hariri ◽  
Subhajit Bandopadhyay ◽  
Athanasios Rizos ◽  
Theo Dimitrakos ◽  
Bruno Crispo ◽  
...  
IEEE Access ◽  
2018 ◽  
Vol 6 ◽  
pp. 44506-44518
Author(s):  
Bingfei Ren ◽  
Chuanchang Liu ◽  
Bo Cheng ◽  
Shuangxi Hong ◽  
Jie Guo ◽  
...  

Author(s):  
Wen-Jie Li ◽  
Hong-Wei Xie ◽  
Xin Fan ◽  
Bing-Shu Li ◽  
Chao Zhou ◽  
...  

Author(s):  
Nicolas Anciaux ◽  
Luc Bouganim ◽  
Philippe Pucheral

This chapter advocates the convergence between Access Control (AC) models, focusing on the granularity of sharing, and Digital Right Management (DRM) models focusing on conditional authorizations and obligations. The convergence is also expected in terms of control enforcement considering that both AC and DRM models must be equally protected against any form of tampering and piracy. We capitalize on the democratization of powerful secure chip platforms (e.g., smart cards, secure USB dongles) which can be plugged in a variety of client devices (PC, PDA, cell phones, consumer electronics) to design a new architecture of a trusted access and usage control system. The benefits of the proposed architecture are exemplified in two different contexts: a fair DRM scenario and a healthcare scenario.


Ledger ◽  
2021 ◽  
Vol 6 ◽  
Author(s):  
Meng Kang ◽  
Victoria Lemieux

This paper presents a design for a blockchain solution aimed at the prevention of unauthorized secondary use of data. This solution brings together advances from the fields of identity management, confidential computing, and advanced data usage control. In the area of identity management, the solution is aligned with emerging decentralized identity standards: decentralized identifiers (DIDs), DID communication and verifiable credentials (VCs). In respect to confidential computing, the Cheon-Kim-Kim-Song (CKKS) fully homomorphic encryption (FHE) scheme is incorporated with the system to protect the privacy of the individual’s data and prevent unauthorized secondary use when being shared with potential users. In the area of advanced data usage control, the solution leverages the PRIV-DRM solution architecture to derive a novel approach to licensing of data usage to prevent unauthorized secondary usage of data held by individuals. Specifically, our design covers necessary roles in the data-sharing ecosystem: the issuer of personal data, the individual holder of the personal data (i.e., the data subject), a trusted data storage manager, a trusted license distributor, and the data consumer. The proof-of-concept implementation utilizes the decentralized identity framework being developed by the Hyperledger Indy/Aries project. A genomic data licensing use case is evaluated, which shows the feasibility and scalability of the solution.


Author(s):  
W. J. Abramson ◽  
H. W. Estry ◽  
L. F. Allard

LaB6 emitters are becoming increasingly popular as direct replacements for tungsten filaments in the electron guns of modern electron-beam instruments. These emitters offer order of magnitude increases in beam brightness, and, with appropriate care in operation, a corresponding increase in source lifetime. They are, however, an order of magnitude more expensive, and may be easily damaged (by improper vacuum conditions and thermal shock) during saturation/desaturation operations. These operations typically require several minutes of an operator's attention, which becomes tedious and subject to error, particularly since the emitter must be cooled during sample exchanges to minimize damage from random vacuum excursions. We have designed a control system for LaBg emitters which relieves the operator of the necessity for manually controlling the emitter power, minimizes the danger of accidental improper operation, and makes the use of these emitters routine on multi-user instruments.Figure 1 is a block schematic of the main components of the control system, and Figure 2 shows the control box.


Sign in / Sign up

Export Citation Format

Share Document