Decentralized identifiers

被引:0
作者
Mallare D. [1 ]
Dani N. [1 ]
Bonaci T. [1 ]
机构
[1] Northeastern University, Seattle, 98109, WA
来源
IEEE Potentials | 2023年 / 42卷 / 06期
关键词
723 Computer Software; Data Handling and Applications - 723.5 Computer Applications;
D O I
10.1109/MPOT.2023.3272774
中图分类号
学科分类号
摘要
Today, most of us have more accounts with corresponding usernames and passwords than we can count. Online banking, shopping, streaming, and social media, among other things, require the user to authenticate, or prove, their identity to utilize the provided service. Keeping track of a multitude of accounts becomes burdensome, and many of us turn toward the usage of weak or recycled credentials that pose a security risk. On the other hand, to avoid said security risks, many of us trade our privacy for convenience and use social identities to log in, giving the companies that manage these identities the ability to track our behavior. © 1988-2012 IEEE.
引用
收藏
页码:18 / 24
页数:6
相关论文
共 13 条
  • [11] Chang W., Lehner C., Caballero J., Thorstensson J., did:pkh method specification., (2023)
  • [12] Chain agnostic improvement proposals., (2023)
  • [13] Hamilton-Duffy K., Grant R., Gropper A., Use cases and requirements for decentralized identifiers, World Wide Web Consortium, (2021)