Decentralized Identity Explained
Packt Publishing Limited (Verlag)
978-1-80461-763-2 (ISBN)
Key Features
Explore decentralized identities and blockchain technology in depth
Gain practical insights for leveraging advanced digital identity management tools, frameworks, and solutions
Discover best practices for integrating decentralized identity solutions into existing systems
Purchase of the print or Kindle book includes a free PDF eBook
Book DescriptionLooking forward to mastering digital identity? This book will help you get to grips with complete frameworks, tools, and strategies for safeguarding personal data, securing online transactions, and ensuring trust in digital interactions in today's cybersecurity landscape.
Decentralized Identity Explained delves into the evolution of digital identities, from their historical roots to the present landscape and future trajectories, exploring crucial concepts such as IAM, the significance of trust anchors and sources of truth, and emerging trends such as SSI and DIDs. Additionally, you’ll gain insights into the intricate relationships between trust and risk, the importance of informed consent, and the evolving role of biometrics in enhancing security within distributed identity management systems. Through detailed discussions on protocols, standards, and authentication mechanisms, this book equips you with the knowledge and tools needed to navigate the complexities of digital identity management in both current and future cybersecurity landscapes.
By the end of this book, you’ll have a detailed understanding of digital identity management and best practices to implement secure and efficient digital identity frameworks, enhancing both organizational security and user experiences in the digital realm.What you will learn
Understand the need for security, privacy, and user-centric methods
Get up to speed with the IAM security framework
Explore the crucial role of sources of truth in identity data verification
Discover best practices for implementing access control lists
Gain insights into the fundamentals of informed consent
Delve into SSI and understand why it matters
Explore identity verification methods such as knowledge-based and biometric
Who this book is forThis book is for cybersecurity professionals and IAM engineers/architects who want to learn how decentralized identity helps to improve security and privacy and how to leverage it as a trust framework for identity management.
Rohan Pinto, a cryptography geek with three decades of experience in security and identity management, has founded multiple businesses leveraging blockchain and identity management advancements. He specializes as a senior identity and access management architect, focusing on large-scale infrastructures for identity management, authentication, and authorization (RBAC, ABAC, RiskBAC, and TrustBAC). Rohan was the lead architect for the Government of Ontario's security infrastructure and British Columbia's Health Information Access Layer (HIAL), and he is currently developing the US Department of Defense's Security Access Layer using Common Access Cards (CACs). He mentors emerging talent through Techstars and Founder Institute and is a member of the Forbes Technology Council, Decentralized Identity Foundation, and FIDO Alliance. Rohan combines strategic vision with technical expertise to drive tech-based growth, enhancing security and compliance throughout project life cycles.
Table of Contents
The History of Digital Identity
Identity Management Versus Access Management
IAM Best Practices
Trust Anchors/Sources of Truth and Their Importance
Historical Source of Authority
Relationships between Trust and Risk
Informed Consent and Why It Matters
IAM – the Security Perspective
Self-Sovereign Identity
Privacy by Design in the SSI Space
Relationship between DIDs and SSI
Protocols and Standards – DID Standards
DID Authentication
Identity Verification
Biometrics Security in Distributed Identity Management
Erscheinungsdatum | 22.08.2024 |
---|---|
Verlagsort | Birmingham |
Sprache | englisch |
Maße | 191 x 235 mm |
Themenwelt | Informatik ► Netzwerke ► Sicherheit / Firewall |
Informatik ► Theorie / Studium ► Kryptologie | |
ISBN-10 | 1-80461-763-6 / 1804617636 |
ISBN-13 | 978-1-80461-763-2 / 9781804617632 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich