consistency, and missing endorsed tasks that were not
met by any property. Regrettably, the absence of en-
dorsed tasks indicates inconsistencies that may con-
tribute to improvement. In the following section, we
will examine the feasibility of adding the missing en-
dorsed tasks to the properties of the SSI system.
4.4 Revising the Properties
The inconsistencies discovered in the previous step
provide insights into areas where current proposals
for the properties of the SSI system fall short. In this
step, we either add the missing endorsed tasks from
Table 6 to existing properties or develop new prop-
erties to cover the gaps in compliance with credible
sources. Our improvement is based on three criteria,
which are listed below.
1. For a control C that is classified as IC:
(a) We enhance a property EP that relates to a con-
sistent pair (e, t) by adding missing endorsed
task t if there are fit to the property context.
(b) We introduce an additional property AP, which
includes missing endorsed tasks t ∈ C that are
not fit to the related property context P that con-
tains e from the consistent pair.
2. For a control C that is classified as DC, we intro-
duce an additional property AP that includes miss-
ing endorsed tasks t ∈ C.
3. For all properties, including current, enhanced,
and additional properties, we revise their elements
to subject to the SSI system.
We obtain a list of the SSI system’s properties using
the preceding criteria, as shown in Tables 7 and 8. As
can be seen from the list, we also specify three types
of properties: Ps are current properties that are only
revised based on the third criteria; EPs are enhanced
properties that include corresponding endorsed tasks
from controls from credible sources; APs are addi-
tional properties that are developed from discontent
controls or endorsed tasks from controls that are not
suitable for any property context.
The critical outcome of this paper will be a list
of the SSI system’s properties, which will aid in the
analysis, design, and development of the SSI system
implementation.
5 EVALUATION
This section will discuss how the proposed list of SSI
system properties was evaluated. They are evaluated
using two methods: use cases and a questionnaire for
experts. The subsequent sub-sections will detail the
evaluation procedure and results.
Table 7: A complete list of the enhanced SSI system prop-
erties with their definition.
Property Name P and Its Definition (Property Elements e)
P1. Existence: (1) An SSI system must allow its users to represent their real-world
characteristics in the digital domain; (2) An SSI system requires to utilize selective
information that is only necessary for use in the digital domain;
EP2. Sovereignty: (1) An SSI system must provide full control to an identity owner to
decide when they wish to release identity data and to which entity for whatever purpose;
(2) An SSI system must not allow other person, organization, or government to own or
control user’s identity in any way; (3) PR.7.(4) An SSI system should inform relevant
stakeholders to understand possible risks and actions they can take to control their iden-
tity;
P3. Access Control*: (1) An SSI system must allow identity owners to have unre-
stricted access and control over all access to their identity;
EP4. Transparency: All systems, protocols, and algorithms in the SSI domain should
be transparent for every involved entity; (2) All systems, protocols, and algorithms in the
SSI domain should be free, open-source, and as independent as possible; (3) PR7.(1) An
SSI system should provide notice about its policies and procedures to the identity owner;
EP5. Persistence: (1) An SSI system must persist SSIs as long as it is required by an
owner; (2) An SSI system must revoke or abandon SSIs as requested by an owner at any
time; (3) PR3.(2) An SSI system must observe the type and amount of SSI suitable for
its purpose; (4) Art.5.1.(d).(4) An SSI system must communicate any rectification or
erasure of SSIs to every participant;
P6. Portability: (1) An SSI system must allow SSIs and related data to transfer to
another medium or platform when it disappears due to any reason;
P7. Interoperability: (1) All involved systems in the SSI domain must be capable of
communicating with each other at any scale to maximize level of interoperability;
EP8. Consent: (1) An SSI system release SSIs to a third party after an owner has con-
sented to do so; (2) Art.5.1.(b).(2) An SSI system should demonstrate the processing of
SSIs regarding the owner consent; (3) Art.5.1.(b).(3) If the consent is given as a written
declaration, an SSI system should represent the consent in an intelligible and easily ac-
cessible form, using clear and plain language; (4) Art.5.1.(c) & O3.(2) An SSI system
must provide a right of an identity owner to withdraw their consent at any time with
noticing of the likely consequences; (5) Art.5.1.(d) An SSI system must provide any
information relating to the processing to the identity owner in a concise, transparent,
intelligible and easily accessible form, using clear and plain language; (6) O3.(3) Once
the consent is withdrawn, an SSI system must cease to collect, use or disclose the cor-
responding SSIs;
P9. Minimization: (1) When releasing SSIs to a third part, an SSI system must allow
an identity owner to release the minimum information of identity maintaining as much
anonymity as possible; (2) An SSI system must allow an identity owner to selectively
provide or disclose them;
EP10. Protection: (1) An SSI system protects SSIs and their communication channels
with the latest cryptographic mechanism satisfying the CIA (Confidentiality, Integrity,
and Authenticity) and non-repudiation properties; (2) An SSI system must use a secure
storage and communication channels for SSIs and related data; (3) A.14.(2) All services
of an SSI system must be protected from public networks; (4) V6.(2) When an SSI
system generates a randomized numerical data, a suitable random generator is used;
(5) PR9.(2) An SSI system must identify and protect both physical and logical against
privacy risks;
P11. Autonomy: (1) An SSI system must support full autonomy on the management
and administration of identity;
P12. Single Source: (1) An SSI system accepts SSIs from an owner who is a single
source; (2) An SSI system must maintain SSIs in the owner-controlled storage;
P13. Availability: (1) An infrastructure and services of an SSI system must be readily
available to all participants (including an identity owner) without any discrimination to
access from different platform;
P14. Sustainability: (1) An infrastructure and services of an SSI system should use
open standards; (2) An infrastructure and services of an SSI system should be environ-
mentally, economically, technically, and socially sustainable;
P15. Cost Free: (1) An SSI system should offer its services to anyone free of cost or
negligible cost; (2) An SSI system should not incur any hidden cost, license fees, or
other financial charges for creating, managing, and adopting SSIs;
P16. Flexibility: (1) An infrastructure and services of an SSI system should accommo-
date the changing demand by facilitating diverse, decomposable, and extensible at any
scale;
P17. Safeguard*: (1) The freedom and rights of every owners should be safeguarded
in any conditions;
P18. Verifiability: (1) An SSI system should allow the identity verification in the digital
domain, similar to a physical credential representing the real-world identity;
P19. Recovery*: (1) An infrastructure and services of an SSI system should be resilient
to successfully recover any SSI when a key, wallet, or device lost;
P20. Accessibility: (1) An infrastructure and services of an SSI system should be user-
friendly and accessible by as many people as possible;
AP21. Information Handling: (1) A.8.(6) An SSI system should label user per-
sonal information based on privacy and sensitivity; (2) A.8.(7) An SSI system should
handle user personal information properly according to its privacy and sensitivity;
(3) A.12.(6) Information should be backed up regularly;
AP22. Authentication: (1) A.9.(3) An SSI system must implement a formal user reg-
istration and de-registration; (2) V2.(8) & V4.(2) & V13.(1) An SSI system must au-
thenticate users with valid credentials to services before use; (3) V2.(2) & V2.(6) An
SSI system must use strong authenticator with single or multi-factor one time verifier;
(4) V2.(1) & V2.(3) An SSI system employs password security mechanisms and ver-
ifies valid lifecycle of password and credentials; (5) V3.(1) & V3.(2) & V13.(1) An
SSI system employs session management mechanisms using session tokens that bind to
the user authentication; (6) V3.(3) An SSI system must control session and enforce to
terminate due to timeout;
ICISSP 2022 - 8th International Conference on Information Systems Security and Privacy
140