Citation Export
| DC Field | Value | Language |
|---|---|---|
| dc.contributor.author | Rhie, Min Hyung | - |
| dc.contributor.author | Kim, Kyung Hoon | - |
| dc.contributor.author | Hwang, Dong Yeop | - |
| dc.contributor.author | Kim, Ki Hyung | - |
| dc.date.issued | 2021-01-13 | - |
| dc.identifier.uri | https://aurora.ajou.ac.kr/handle/2018.oak/36694 | - |
| dc.identifier.uri | https://www.scopus.com/inward/record.uri?partnerID=HzOxMe3b&scp=85100714862&origin=inward | - |
| dc.description.abstract | In this paper, we analyzed the vulnerabilities that could occur when a third party who is not the owner of a Decentralized Identifier (DID) has the authority to modify a DID Document. DID is a technology that allows individuals to have data sovereignty. The DID Document contains information for authenticating the DID owner. A DID Controller has the authority to modify DID Document. This authority is being standardized so that it can be held by third parties as well as DID owners. It is a matter of changing the DID document against the will of the DID owner. To help owners assert their sovereignty even stronger, we propose a way for DID owners to use a policy, history, and service to verify the DID Document updating process. | - |
| dc.description.sponsorship | This research was supported by Korea Institute for Advancement of Technology(KIAT) grant funded by the Korea Government(MOTIE) (P0008703, The Competency Development Program for Industry Specialist) | - |
| dc.language.iso | eng | - |
| dc.publisher | IEEE Computer Society | - |
| dc.subject.mesh | Document updating | - |
| dc.subject.mesh | Third parties | - |
| dc.subject.mesh | Vulnerability analysis | - |
| dc.title | Vulnerability Analysis of DID Document's Updating Process in the Decentralized Identifier Systems | - |
| dc.type | Conference | - |
| dc.citation.conferenceDate | 2021.01.13.~2021.01.16. | - |
| dc.citation.conferenceName | 35th International Conference on Information Networking, ICOIN 2021 | - |
| dc.citation.edition | 35th International Conference on Information Networking, ICOIN 2021 | - |
| dc.citation.endPage | 520 | - |
| dc.citation.startPage | 517 | - |
| dc.citation.title | International Conference on Information Networking | - |
| dc.citation.volume | 2021-January | - |
| dc.identifier.bibliographicCitation | International Conference on Information Networking, Vol.2021-January, pp.517-520 | - |
| dc.identifier.doi | 10.1109/icoin50884.2021.9334011 | - |
| dc.identifier.scopusid | 2-s2.0-85100714862 | - |
| dc.identifier.url | http://www.icoin.org/ | - |
| dc.subject.keyword | Authentication | - |
| dc.subject.keyword | Blockchains | - |
| dc.subject.keyword | Controllers | - |
| dc.subject.keyword | Decentralized Identifiers | - |
| dc.subject.keyword | Self-Sovereign Identity | - |
| dc.type.other | Conference Paper | - |
| dc.identifier.pissn | 19767684 | - |
| dc.description.isoa | false | - |
| dc.subject.subarea | Computer Networks and Communications | - |
| dc.subject.subarea | Information Systems | - |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.