| | SLO | ENG | Cookies and privacy

Bigger font | Smaller font

Search the digital library catalog Help

Query: search in
search in
search in
search in
* old and bologna study programme

Options:
  Reset


1 - 10 / 43
First pagePrevious page12345Next pageLast page
1.
Orchestrating Digital Wallets for On- and Off-Chain Decentralized Identity Management
Vid Keršič, Urban Vidovič, Andraž Vrečko, Martin Domajnko, Muhamed Turkanović, 2023, original scientific article

Abstract: Digital identity is becoming one of the core elements during the digitalization age, when more and more processes and interactions are taking place in the digital sphere. Therefore, current identity management approaches will define how these interactions will look in the future, but different fields and communities often approach management with their own solutions and tools, despite their similarities. This includes decentralized digital identities, where the identity is managed with asymmetric cryptographic keys, and no centralized entity oversees the whole identity system. This paper focuses on managing on- and off-chain decentralized digital identities, with the former being used for blockchain networks and the latter for self-sovereignty and privacy. While both types of decentralized identity build on the same cryptographic and identity primitives, there is no single wallet that handles both. Therefore, this paper proposes an orchestration solution for both wallet types, which enables their convergence to a single universal wallet and validates it with a real-life decentralized identity use case.
Keywords: decentralized identity, self-sovereign identity, wallet, identity, identity management, web3
Published in DKUM: 13.06.2024; Views: 231; Downloads: 11
.pdf Full text (3,25 MB)
This document has many files! More...

2.
Orchestrating Digital Wallets for On- and Off-Chain Decentralized Identity Management
Vid Keršič, Urban Vidovic, Andraz Vrecko, Martin Domajnko, Muhamed Turkanović, 2023, original scientific article

Abstract: Digital identity is becoming one of the core elements during the digitalization age, when more and more processes and interactions are taking place in the digital sphere. Therefore, current identity management approaches will define how these interactions will look in the future, but different fields and communities often approach management with their own solutions and tools, despite their similarities. This includes decentralized digital identities, where the identity is managed with asymmetric cryptographic keys, and no centralized entity oversees the whole identity system. This paper focuses on managing on- and off-chain decentralized digital identities, with the former being used for blockchain networks and the latter for self-sovereignty and privacy. While both types of decentralized identity build on the same cryptographic and identity primitives, there is no single wallet that handles both. Therefore, this paper proposes an orchestration solution for both wallet types, which enables their convergence to a single universal wallet and validates it with a real-life decentralized identity use case.
Keywords: blockchain networks, current identity management approaches, decentralized digital identities, digital identity, digital sphere, digitalization age, on-and-off-chain decentralized identity management, orchestrating digital wallets, real-life decentralized identity, same cryptographic identity
Published in DKUM: 06.12.2023; Views: 502; Downloads: 18
.pdf Full text (3,25 MB)
This document has many files! More...

3.
Towards a Catalogue of Self-Sovereign Identity Design Patterns
Špela Čučko, Vid Keršič, Muhamed Turkanović, 2023, original scientific article

Abstract: Self-sovereign identity (SSI) is a user-centric, decentralised identity approach that provides a means for identification, authentication, and authorisation without the involvement of external entities, responsible for identity provisioning and management in current centralised and federated approaches. In general, the basic building blocks of an SSI system include decentralised identifiers, verifiable credentials, identity wallets, a verifiable data registry, and three main actors: issuer, identity holder, and verifier. Even though the SSI field is dominated by proposals, SSI systems can be implemented in different ways, which is reflected in the absence of a well-defined architecture. Thus, the best implementation is still a matter of research, the requirements of the individual system, and its field of application. However, well-designed and implemented systems are crucial to avoiding failures, speeding up the development process, ensuring high quality, and the broader adoption of SSI solutions. Hence, the main objective of this study was to identify design patterns and good practices of the SSI ecosystems by reviewing and analysing the literature, technical documentation, and existing SSI implementations. Therefore, the study is built on existing knowledge, and presents a comprehensive catalogue of thirty-five SSI design patterns that can serve as a starting point for a possible SSI system design.
Keywords: self-sovereign identity, decentralised identity, design patterns, decentralised identifiers, verifiable credentials, blockchain, verifiable data registry, identity wallets
Published in DKUM: 05.12.2023; Views: 448; Downloads: 52
.pdf Full text (2,31 MB)
This document has many files! More...

4.
Postavitev sistema za upravljanje identitet v poslovnem okolju v Dockerju : diplomsko delo
David Brinovec, 2023, undergraduate thesis

Abstract: Diplomsko delo obravnava postavitev sistema za upravljanje identitet v Dockerju v poslovnem okolju. V diplomskem delu je opisano področje upravljanja identitet, različni pristopi k upravljanju identitet in prednosti avtomatizacije sistema za upravljanje identitet v poslovnem okolju. Po obravnavanju področja upravljanja identitet je bilo raziskano delovanje Dockerja. Postavljen je bil sistem za upravljanje identitet, ki je vseboval Docker vsebnike One Identity Manager. Za nadgradnjo celotnega sistema se je raziskalo in uporabilo orkestracijo s programsko opremo Kubernetes. Z uporabo Dockerja in Kubernetes je bilo ugotovljeno, da je bil sistem izboljšan.
Keywords: upravljanje identitet, avtomatizacija procesov, Docker, One Identity Manager, Kubernetes
Published in DKUM: 05.10.2023; Views: 366; Downloads: 33
.pdf Full text (945,12 KB)
This document has many files! More...

5.
Towards the classification of self-sovereign identity properties
Špela Čučko, Šeila Bećirović, Aida Kamišalić Latifić, Saša Mrdović, Muhamed Turkanović, 2022, original scientific article

Abstract: Self-Sovereign Identity (SSI) is a novel and emerging, decentralized digital identity approach that enables entities to control and manage their digital identifiers and associated identity data while enhancing trust, privacy, security, and the many other properties identified and analyzed in this paper. The paper provides an overview and classification of the SSI properties, focusing on an in-depth analysis, furthermore, presenting a comprehensive collection of SSI properties that are important for the implementation of the SSI system. In addition, it explores the general SSI process flow, and highlights the steps in which individual properties are important. After the initial purification and classification phase, we then validated properties among experts in the field of Decentralized and Self-Sovereign Identity Management using an online questionnaire, which resulted in a final set of classified and verified SSI properties. The results can be used for further work on definition and standardization of the SSI field.
Keywords: classification, credential, decentralized, identity, identified, principles, properties, selfsovereign, verifiable
Published in DKUM: 22.09.2023; Views: 324; Downloads: 39
.pdf Full text (5,62 MB)
This document has many files! More...

6.
Jordan maps and zero Lie product determined algebras
Matej Brešar, 2022, original scientific article

Abstract: Let ▫$A$▫ be an algebra over a field ▫$F$▫ with ▫$\mathrm{char} (F) \ne 2$▫. If ▫$A$▫ is generated as an algebra by ▫$[[A,A],[A,A]]$▫, then for every skew-symmetric bilinear map ▫$\Phi:A \times A \to X$▫, where ▫$X$▫ is an arbitrary vector space over ▫$F$▫, the condition that ▫$\Phi(x^2,x)=0$▫ for all ▫$x \in A$▫ implies that ▫$\Phi(xy,z) +\Phi(zx,y) + \Phi(yz,x)=0$▫ for all ▫$x,y,z \in A$▫. This is applicable to the question of whether ▫$A$▫ is zero Lie product determined, and is also used in proving that a Jordan homomorphism from ▫$A$▫ onto a semiprime algebra ▫$B$▫ is the sum of a homomorphism and an antihomomorphism.
Keywords: bilinear map, zero Lie product determined algebra, derivation, Jordan derivation, Jordan homomorphism, functional identity
Published in DKUM: 18.08.2023; Views: 421; Downloads: 35
.pdf Full text (215,86 KB)
This document has many files! More...

7.
Character representation in the romance genre: the example of the novel Outlander : master's thesis
Nataša Pernat, 2023, master's thesis

Abstract: Written by the American author Diana Gabaldon, the novel Outlander is one of the most popular books in the historical romance genre, but it also includes elements of the fantasy genre. The Master thesis explores the identification chains of the two protagonists – Jamie Fraser, Claire (Randall) Fraser, and the antagonist, Black Jack Randall. The analysis is based on the concept of reference and participant identification as proposed by Halliday and Hasan (1976) and Martin and Rose (2004). The purpose of the thesis is to analyse the diversity of references in identification chains of the three selected characters. References are divided into five specified categories. Additionally, references are also analysed by categories in each reference chain according to their evaluation (positive, negative, and neutral). Four hypotheses have been set to guide the analysis. H1: The most diverse identity chain belongs to the male protagonist (Jamie Fraser). H1 has been confirmed. H2: The majority of the references in the identity chain of the antagonist (Black Jack Randall) have a negative evaluation. H2 has been rejected. The antagonist (Black Jack Randall) has the least diverse identity chain, H3 has been confirmed. H4: The identity chain of the female protagonist (Claire Randall Fraser) is the longest. H4 has also been confirmed. The findings from the analysis are interpreted in connection to the characteristics of the romance genre.
Keywords: character representation, romance genre, cohesion, identity chain, Outlander, historical romance
Published in DKUM: 31.05.2023; Views: 537; Downloads: 36
.pdf Full text (2,79 MB)

8.
Identification of identical twins in police procedures
Miha Dvojmoč, Veronika Mrak Klavžar, Vanja Erčulj, 2022, original scientific article

Abstract: Purpose: The aim of the study was to review the treatment of identical twins in crimes and to determine to what extent people notice the switch of identities, to what extent they can distinguish between twins, and what factors are related to the ability to distinguish them. Design/Methods/Approach: We carried out an analysis of literature and a case review about identification of identical twins in police procedures and for the purpose of the article, an online survey was conducted among the general public. Findings: In line with existing research, the survey showed that age, but not gender or length of acquaintance, was related to the ability to distinguish between twins. The ability to distinguish between twins is positively correlated with the observation of confusion between them. Our survey of the public found that the most common indicators for distinguishing between identical twins were facial features, behavior, a distinctive voice, and recognizable accessories. Research Limitations/Implications: A review of the literature on the identification and treatment of twins in relation to criminality reveals several gaps in knowledge. More attention should thus be paid to the problem in the future, possibly to establish criteria for prosecution and to raise awareness that such deviant behavior can occur. In our research, we conducted survey among general public in the future maybe a survey of the experts should be conducted for more comprehensive view of the issue. Among the proposals for further research, it would be reasonable to consider the analysis of cases of identical twins in police practice. Originality/Value: In our own research, we examined the factors associated with identity swapping among identical twins.
Keywords: identical twins, distinction, identity switch, fraud
Published in DKUM: 13.04.2023; Views: 492; Downloads: 17
URL Link to file
This document has many files! More...

9.
Izračun donosnosti naložbe v sistem upravljanja identitet in pravic dostopa : magistrsko delo
Sašo Kolac, 2020, master's thesis

Abstract: V tej magistrski nalogi pregledamo osnove upravljanja uporabniških pravic in identitet, ter se podrobneje spustimo v izračun donosnosti naložbe v takšne sisteme. Ugotovimo kje in kako pridobiti potrebne podatke in kako jih uporabiti pri izračunih. Opravimo dejanske izračune in primerjamo rezultate, s pomočjo katerih lahko ugotovimo, če se takšen sistem v našem okolju splača in v kolikšnem času se nam investicija povrne. Predstavimo tudi spletno aplikacijo, katera nam avtomatizira približek izračuna z le nekaj potrebnimi osnovnimi podatki.
Keywords: upravljanje dostopa, upravljanje identitet, One Identity Manager, izračun donosnosti
Published in DKUM: 02.11.2020; Views: 948; Downloads: 74
.pdf Full text (1,33 MB)

10.
Linguistic Analysis of Expressing Gender, Gender Identity, Gender Inclusiveness, and Gender Neutrality in the Context of the Transgender Phenomenon in Contemporary English and Slovene Language
Tina Ritlop, 2020, master's thesis

Abstract: This thesis explores linguistic possibilities, limitations, and innovations concerning gender and gender identity in the context of the transgender phenomenon and how gender-inclusiveness or gender-neutrality affect their expression. To avoid ambiguity and misunderstandings, the terminological basis and theoretical background are presented and critically analysed, including English and Slovene sources; moreover, it is specified how certain terms are used in the following discussions. The thesis looks at early examples of gender-inclusive and gender-neutral English language as well as contemporary usages and innovations, especially in the field of alternative personal pronouns, and evaluates their practicality. Furthermore, linguistic and other issues are discussed in relation to the common transgender ideology through the analysis of selected examples of transgender people’s memoirs and other personal narratives (YouTube content), presenting their common perception of the state of being transgender and noting the stereotypies this entails or perpetuates. In relation to this, the thesis also reviews a recent study on the topic of transgender children’s gender development. The thesis then compares Slovene with English in the context of expressing gender to show some differences between them and notes certain grammatical and other limitations of Slovene. Additionally, the thesis provides its author’s own suggestions for English as well as Slovene gender-neutral language.
Keywords: transgender, gender-neutral, gender-inclusive, gender identity, pronouns
Published in DKUM: 07.10.2020; Views: 1018; Downloads: 163
.pdf Full text (1021,60 KB)

Search done in 0.31 sec.
Back to top
Logos of partners University of Maribor University of Ljubljana University of Primorska University of Nova Gorica