|
| |||||||||||||||
EDId 2026 : 3rd International Workshop on Emerging Digital Identities | |||||||||||||||
| Link: https://www.ares-conference.eu/edid | |||||||||||||||
| |||||||||||||||
Call For Papers | |||||||||||||||
|
3rd International Workshop on Emerging Digital Identities (EDId 2026)
Co-located with the 21st International Conference on Availability, Reliability and Security (ARES 2026) The identity environment has evolved into a complex ecosystem demanding seamless interoperability, stronger security measures, and user-centric experiences in an increasingly interconnected digital world. Addressing these difficulties necessitates collaboration among scholars and practitioners from diverse disciplines, establishing an interdisciplinary approach critical for shaping the future of identity management. EDId navigates various security, privacy, and legal compliance issues, addressing technical issues like security and interoperability and legal and regulatory considerations like data protection and privacy. Topics of interest include, but are not limited to: - Interoperability and user experience related to digital identities - Analysis of protocols and architectures in the area of digital identities, such as OAuth, OpenID Connect, and zero trust - Status of standardization and its adoption, such as OAuth 2.1, GNAP, OpenID4VC, and W3C VC/DID - Authentication methods, such as passwordless (including FIDO2 passkeys) and biometric authentication - Novel technologies and use cases for digital identities, such as self-sovereign identities and IoT - Mobile aspects of digital identity and smartphone identity wallets - Compliance with regulations, such as the eIDAS regulation - Analysis of security, such as social engineering and identity fraud - Cryptography for digital identity, such as selective disclosure signatures and zero-knowledge proofs - Behavioral and risk-based authentication mechanisms - Identification, onboarding, and Know Your Customer (KYC) procedures - Session management for seamless and continuous authentication - Trust frameworks for identity management solutions - Privacy-enhancing technologies for identity management - Case studies in secure implementation of identity management solutions - Risk Management in Identity Management: Methodologies and Strategies - Identity and Access Management Solutions for AI Agents |
|