New Paper: Alice Attempts to Abuse a Verifiable Credential

I’m always happy when we publish our fifth paper from a conference, because five or more papers is our fundamental goal for each workshop. (Though lately, we’ve also been getting work that goes directly into working groups and proposals.)

For RWOT9, our fifth paper is “Alice Attempts to Abuse a Verifiable Credential”, which is a fun look at various ways that someone could try to abuse a verifiable credential and how good policies can make us proof against them.