Return to Article Details Hierarchical Sovereignty Management and Access Control based on Self-Sovereign Identity Download Download PDF