-
Book Overview & Buying
-
Table Of Contents
Decentralized Identity Explained
By :
Decentralized Identity Explained
By:
Overview of this book
Looking forward to mastering digital identity? This book will help you get to grips with complete frameworks, tools, and strategies for safeguarding personal data, securing online transactions, and ensuring trust in digital interactions in today's cybersecurity landscape.
Decentralized Identity Explained delves into the evolution of digital identities, from their historical roots to the present landscape and future trajectories, exploring crucial concepts such as IAM, the significance of trust anchors and sources of truth, and emerging trends such as SSI and DIDs. Additionally, you’ll gain insights into the intricate relationships between trust and risk, the importance of informed consent, and the evolving role of biometrics in enhancing security within distributed identity management systems. Through detailed discussions on protocols, standards, and authentication mechanisms, this book equips you with the knowledge and tools needed to navigate the complexities of digital identity management in both current and future cybersecurity landscapes.
By the end of this book, you’ll have a detailed understanding of digital identity management and best practices to implement secure and efficient digital identity frameworks, enhancing both organizational security and user experiences in the digital realm.
Table of Contents (22 chapters)
Preface
Part 1 - Digital Identity Era: Then
Chapter 1: The History of Digital Identity
Chapter 2: Identity Management Versus Access Management
Part 2 - Digital Identity Era: Now
Chapter 3: IAM Best Practices
Chapter 4: Trust Anchors/Sources of Truth and Their Importance
Chapter 5: Historical Source of Authority
Chapter 6: The Relationship between Trust and Risk
Chapter 7: Informed Consent and Why It Matters
Chapter 8: IAM – the Security Perspective
Part 3 - Digital Identity Era: The Near Future
Chapter 9: Self-Sovereign Identity
Chapter 10: Privacy by Design in the SSI Space
Chapter 11: Relationship between DIDs and SSI
Chapter 12: Protocols and Standards – DID Standards
Chapter 13: DID Authentication
Chapter 14: Identity Verification
Part 4 - Digital Identity Era: A Probabilistic Future
Chapter 15: Biometrics Security in Distributed Identity Management
Index