Keyphrases
Tree Model
100%
Surface Mounting
100%
Self-sovereign Identity
100%
Attack Surface
100%
Attack Tree
100%
Potential Attacks
100%
Tree Risk
100%
Modelling Matrix
100%
Risk Matrix
100%
Security Threats
77%
Identity-based System
55%
Security Privacy
22%
IT Systems
11%
System Architecture
11%
Evaluation Approach
11%
Rapid Growth
11%
Identity Model
11%
Systematic Evaluation
11%
Identity Theft
11%
Digital Identity
11%
Identity Identity
11%
Personal Data
11%
Distributed Denial of Service (DDoS)
11%
Generalized Approach
11%
Economic Approach
11%
Security Services
11%
Security Technology
11%
Mitigation Strategies
11%
Blockchain
11%
Security Properties
11%
Privacy Services
11%
Model Matrix
11%
Central Governor
11%
Robust Security
11%
Attack Tree Model
11%
Privacy Properties
11%
Security Risk Evaluation
11%
Computer Science
Attack Surface
100%
Potential Attack
100%
Security and Privacy
28%
Evaluation Approach
14%
Identity Theft
14%
Digital Identity
14%
Personal Data
14%
Distributed Denial of Service Attack
14%
Mitigation Strategy
14%
Blockchain
14%
Security Technology
14%
Identity Model
14%
Privacy Property
14%
Security Properties
14%
System Architecture
14%