Software Transparency as a ServiceIn the context of our project DISCGRID we developed a web-based system that facilitates signing software releases. Our system can be…Apr 8Apr 8
Adding transparency and auditability to software signaturesAttacks on software supply chain is one of the most critical security risks facing enterprises and governments worldwide. Mandiant’s 2022…Dec 6, 2023Dec 6, 2023
Relation-based access control using Verifiable CredentialsIn a recent project, funded and supported by IoT-NGIN, we sought to provide an access control solution for IoT digital twins. To achieve…Sep 15, 20231Sep 15, 20231
Access control using Verifiable Credentials and the iSHARE frameworkA Verifiable Credential (VC) is a W3C recommendation that allows an issuer to assert some attributes about an entity referred to as the VC…Feb 28, 2023Feb 28, 2023
Decentralized Identifiers for the Internet of ThingsAt ExcID we are investigating methods for providing better authentication in the IoT. We believe that W3C’s Decentralized Identifiers can…Feb 12, 2023Feb 12, 2023
Enabling IoT data sharingWe are surrounded by IoT devices, which are constantly generating data. Naturally, this makes us wonder whether these data can be used for…Feb 7, 2023Feb 7, 2023