[PDF][PDF] Self-sovereign identity: A comparison of IRMA and Sovrin

JC Nauta, R Joosten�- Technical Report TNO2019R11011, Tech�…, 2019 - publications.tno.nl
Over a decade ago, Kim Cameron and others dreamed of what was called an Internet Identity
Layer [1]; it would do for (the exchange of)(identity) data what IPv4 had done for network …

[BOOK][B] Comparing identity management frameworks in a business context

JH Hoepman, R Joosten, J Siljee - 2009 - Springer
Several frameworks for identity management exist, each of them with its own distinguishing
features. These frameworks are complex however, and their features not easily understood. …

[PDF][PDF] Specifications for the RGE security architecture

R Joosten, JW Knobbe, P Lenoir, H Schaafsma… - 2003 - researchgate.net
Within the Residential Gateway Environment (RGE) project (TS1021, together with TNO
Telecom, TUe and TUD) research is performed on aspects of residential gateways and home …

[BOOK][B] 'Gescoopt'Risico Management

R Joosten - 2010 - researchgate.net
Auteur: Rieks Joosten> Rieks Joosten doet onderzoek in het Claims-based lab van TNO in
Groningen op het gebied van robuuste, op bedrijfsregels gebaseerde processen. Speciale …

Practical schemes for privacy and security enhanced RFID

JH Hoepman, R Joosten�- …�Workshop on Information Security Theory and�…, 2010 - Springer
Proper privacy protection in RFID systems is important. However, many of the schemes
known are impractical, either because they use hash functions instead of the more hardware …

Service brokerage with prolog

CN Chong, S Etalle, PH Hartel, R Joosten, G Kleinhuis - 2004 - research.utwente.nl
Abstract Service brokerage is a complex problem. At the design stage the semantic gap
between user, device and system requirements must be bridged, and at the operational stage …

[PDF][PDF] Hoe goed bent u in control over de robuustheid van uw ICT-keten?

H Bastiaansen, R Joosten, E Meeuwissen, F Roijers�- Informatie, 2011 - tno.nl
ICT-ketens worden enerzijds steeds complexer en anderzijds van steeds vitaler belang voor
de maatschappij en voor organisaties. Daarmee neemt ook het belang van robuustheid van …

[PDF][PDF] A conceptual analysis on sovrin

R Joosten - 2018 - researchgate.net
Making ‘identity’work on the Internet is very hard. Some 10 years ago, people started to voice
the need for an identity framework that would effectively do for the creation, dissemination …

[PDF][PDF] Rules for Identity and Access Control

R Joosten, S Joosten�- Proceedings of the IFIP WG9 - cs.kau.se
The future of Identity in the automated contexts of information society depends on our ability
to (formally) express rules governing their use, and mechanisms to enforce such rules. …

Putting Identifiers in the Context of eHealth: Introduction of a Model

R Joosten, D Whitehouse, P Duquenoy�- …�Summer School on the Future of�…, 2007 - Springer
rieks.joosten@tno.nl 2 The Castlegate Consultancy, United Kingdom diane.whitehouse@…
As a result of the combination of persons present, particularly Rieks Joosten of TNO (…