Lifecycle Management of Resumés with Decentralized Identifiers and Verifiable Credentials
- URL: http://arxiv.org/abs/2406.11535v2
- Date: Mon, 2 Sep 2024 12:40:52 GMT
- Title: Lifecycle Management of Resumés with Decentralized Identifiers and Verifiable Credentials
- Authors: Patrick Herbke, Anish Sapkota, Sid Lamichhane,
- Abstract summary: This paper introduces a trust framework for managing digital resum'e credentials.
We propose a framework for real-time issuance, storage and verification of Verifiable Credentials without intermediaries.
- Score: 0.0
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: Trust in applications is crucial for fast and efficient hiring processes. Applicants must present verifiable credentials that employers can trust without delays or the risk of fraudulent information. This paper introduces a trust framework for managing digital resum\'e credentials, addressing trust challenges by leveraging Decentralized Applications, Decentralized Identifiers, and Verifiable Credentials. We propose a framework for real-time issuance, storage, and verification of Verifiable Credentials without intermediaries. We showcase the integration of the European Blockchain Service Infrastructure as a trust anchor. Furthermore, we demonstrate a streamlined application process, reducing verification times and fostering a reliable credentialing ecosystem across various sectors, including recruitment and professional certification.
Related papers
- Assessing the Trustworthiness of Electronic Identity Management Systems: Framework and Insights from Inception to Deployment [9.132025152225447]
This paper introduces an integrated Digital Identity Systems Trustworthiness Assessment Framework (DISTAF)
It is supported by over 65 mechanisms and over 400 metrics derived from international standards and technical guidelines.
We demonstrate the application of DISTAF through a real-world implementation using a Modular Open Source Identity Platform (MOSIP) instance.
arXiv Detail & Related papers (2025-02-15T11:26:30Z) - Distributed Identity for Zero Trust and Segmented Access Control: A Novel Approach to Securing Network Infrastructure [4.169915659794567]
This study assesses security improvements achieved when distributed identity is employed with ZTA principle.
The study suggests adopting distributed identities can enhance overall security postures by an order of magnitude.
The research recommends refining technical standards, expanding the use of distributed identity in practice, and its applications for the contemporary digital security landscape.
arXiv Detail & Related papers (2025-01-14T00:02:02Z) - Balancing Confidentiality and Transparency for Blockchain-based Process-Aware Information Systems [46.404531555921906]
We propose an architecture for blockchain-based PAISs aimed at preserving both confidentiality and transparency.
Smart contracts enact, enforce and store public interactions, while attribute-based encryption techniques are adopted to specify access grants to confidential information.
arXiv Detail & Related papers (2024-12-07T20:18:36Z) - The Future of Document Verification: Leveraging Blockchain and Self-Sovereign Identity for Enhanced Security and Transparency [0.2621730497733947]
This paper proposes a new strategy using decentralized technologies such as blockchain and self-sovereign identity.
Traditional methods also lack real-time tracking capabilities for attesting entities and requesters.
arXiv Detail & Related papers (2024-12-02T14:20:46Z) - Securing Legacy Communication Networks via Authenticated Cyclic Redundancy Integrity Check [98.34702864029796]
We propose Authenticated Cyclic Redundancy Integrity Check (ACRIC)
ACRIC preserves backward compatibility without requiring additional hardware and is protocol agnostic.
We show that ACRIC offers robust security with minimal transmission overhead ( 1 ms)
arXiv Detail & Related papers (2024-11-21T18:26:05Z) - AGORA: Open More and Trust Less in Binary Verification Service [16.429846973928512]
We introduce a novel binary verification service, AGORA, scrupulously designed to overcome the challenge.
Certain tasks can be delegated to untrusted entities, while the corresponding validators are securely housed within the trusted computing base.
Through a novel blockchain-based bounty task manager, it also utilizes crowdsourcing to remove trust in theorem provers.
arXiv Detail & Related papers (2024-07-21T05:29:22Z) - Towards Credential-based Device Registration in DApps for DePINs with ZKPs [46.08150780379237]
We propose a credential-based device registration (CDR) mechanism that verifies device credentials on the blockchain.
We present a general system model, and technically evaluate CDR using zkSNARKs with Groth16 and Marlin.
arXiv Detail & Related papers (2024-06-27T09:50:10Z) - A Survey and Comparative Analysis of Security Properties of CAN Authentication Protocols [92.81385447582882]
The Controller Area Network (CAN) bus leaves in-vehicle communications inherently non-secure.
This paper reviews and compares the 15 most prominent authentication protocols for the CAN bus.
We evaluate protocols based on essential operational criteria that contribute to ease of implementation.
arXiv Detail & Related papers (2024-01-19T14:52:04Z) - Combining Decentralized IDentifiers with Proof of Membership to Enable Trust in IoT Networks [44.99833362998488]
The paper proposes and discusses an alternative (mutual) authentication process for IoT nodes under the same administration domain.
The main idea is to combine the Decentralized IDentifier (DID)-based verification of private key ownership with the verification of a proof that the DID belongs to an evolving trusted set.
arXiv Detail & Related papers (2023-10-12T09:33:50Z) - Measuring Re-identification Risk [72.6715574626418]
We present a new theoretical framework to measure re-identification risk in compact user representations.
Our framework formally bounds the probability that an attacker may be able to obtain the identity of a user from their representation.
We show how our framework is general enough to model important real-world applications such as the Chrome's Topics API for interest-based advertising.
arXiv Detail & Related papers (2023-04-12T16:27:36Z) - Trust Me If You Can: Trusted Transformation Between (JSON) Schemas to
Support Global Authentication of Education Credentials [0.27961972519572437]
Recruiters and institutions around the world struggle with the verification of diplomas issued in a diverse and global education setting.
We introduce a decentralized and open system to automatically verify the legitimacy of issuers and interpret credentials in unknown schemas.
arXiv Detail & Related papers (2021-06-24T07:03:23Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.