Redefining Identity and Access Management for the Computing ContinuumIn today’s era of distributed computing, where cloud, edge, and IoT devices coexist, ensuring robust Identity and Access Management (IAM)…Jan 30Jan 30
Software Transparency as a ServiceIn the context of our project DISCGRID we developed a web-based system that facilitates signing software releases. Our system can be…Apr 8, 2024Apr 8, 2024
Adding transparency and auditability to software signaturesAttacks on software supply chain is one of the most critical security risks facing enterprises and governments worldwide. Mandiant’s 2022…Dec 6, 2023Dec 6, 2023
Relation-based access control using Verifiable CredentialsIn a recent project, funded and supported by IoT-NGIN, we sought to provide an access control solution for IoT digital twins. To achieve…Sep 15, 2023A response icon1Sep 15, 2023A response icon1
Access control using Verifiable Credentials and the iSHARE frameworkA Verifiable Credential (VC) is a W3C recommendation that allows an issuer to assert some attributes about an entity referred to as the VC…Feb 28, 2023Feb 28, 2023
Decentralized Identifiers for the Internet of ThingsAt ExcID we are investigating methods for providing better authentication in the IoT. We believe that W3C’s Decentralized Identifiers can…Feb 12, 2023Feb 12, 2023
Enabling IoT data sharingWe are surrounded by IoT devices, which are constantly generating data. Naturally, this makes us wonder whether these data can be used for…Feb 7, 2023Feb 7, 2023