Search icon CANCEL
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Conferences
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
Decentralized Identity Explained

You're reading from   Decentralized Identity Explained Embrace decentralization for a more secure and empowering digital experience

Arrow left icon
Product type Paperback
Published in Jul 2024
Publisher Packt
ISBN-13 9781804617632
Length 392 pages
Edition 1st Edition
Arrow right icon
Author (1):
Arrow left icon
Rohan Pinto Rohan Pinto
Author Profile Icon Rohan Pinto
Rohan Pinto
Arrow right icon
View More author details
Toc

Table of Contents (22) Chapters Close

Preface 1. Part 1 - Digital Identity Era: Then
2. Chapter 1: The History of Digital Identity FREE CHAPTER 3. Chapter 2: Identity Management Versus Access Management 4. Part 2 - Digital Identity Era: Now
5. Chapter 3: IAM Best Practices 6. Chapter 4: Trust Anchors/Sources of Truth and Their Importance 7. Chapter 5: Historical Source of Authority 8. Chapter 6: The Relationship between Trust and Risk 9. Chapter 7: Informed Consent and Why It Matters 10. Chapter 8: IAM – the Security Perspective 11. Part 3 - Digital Identity Era: The Near Future
12. Chapter 9: Self-Sovereign Identity 13. Chapter 10: Privacy by Design in the SSI Space 14. Chapter 11: Relationship between DIDs and SSI 15. Chapter 12: Protocols and Standards – DID Standards 16. Chapter 13: DID Authentication 17. Chapter 14: Identity Verification 18. Part 4 - Digital Identity Era: A Probabilistic Future
19. Chapter 15: Biometrics Security in Distributed Identity Management 20. Index 21. Other Books You May Enjoy

What is meant by access?

Yes/no choices are used to describe access decisions. When access control is established, it is associated with making a yes/no decision when an online user seeks to enter or utilize the resource. The online service can and usually does have several access control points. At the highest level, we may locate an access control point that’s attempting to determine if the user is authorized to enter the site. The access control point, on the other hand, is tied to the individual files on the hard drive at the lowest level. Some access control points are visible to the end user, requiring them to take action. The most obvious example would be authentication.

Access control in general

Access control is critical in guaranteeing the security and integrity of digital identification systems in today’s digital environment. Traditional access control strategies have been widely utilized in these systems to secure sensitive information and control user...

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at ₹800/month. Cancel anytime