Citation Export
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Rhie, Min Hyung | - |
dc.contributor.author | Kim, Kyung Hoon | - |
dc.contributor.author | Hwang, Dong Yeop | - |
dc.contributor.author | Kim, Ki Hyung | - |
dc.date.issued | 2021-01-13 | - |
dc.identifier.issn | 1976-7684 | - |
dc.identifier.uri | https://aurora.ajou.ac.kr/handle/2018.oak/36694 | - |
dc.identifier.uri | https://www.scopus.com/inward/record.uri?partnerID=HzOxMe3b&scp=85100714862&origin=inward | - |
dc.description.abstract | In this paper, we analyzed the vulnerabilities that could occur when a third party who is not the owner of a Decentralized Identifier (DID) has the authority to modify a DID Document. DID is a technology that allows individuals to have data sovereignty. The DID Document contains information for authenticating the DID owner. A DID Controller has the authority to modify DID Document. This authority is being standardized so that it can be held by third parties as well as DID owners. It is a matter of changing the DID document against the will of the DID owner. To help owners assert their sovereignty even stronger, we propose a way for DID owners to use a policy, history, and service to verify the DID Document updating process. | - |
dc.description.sponsorship | This research was supported by Korea Institute for Advancement of Technology(KIAT) grant funded by the Korea Government(MOTIE) (P0008703, The Competency Development Program for Industry Specialist) | - |
dc.language.iso | eng | - |
dc.publisher | IEEE Computer Society | - |
dc.subject.mesh | Document updating | - |
dc.subject.mesh | Third parties | - |
dc.subject.mesh | Vulnerability analysis | - |
dc.title | Vulnerability Analysis of DID Document's Updating Process in the Decentralized Identifier Systems | - |
dc.type | Conference | - |
dc.citation.conferenceDate | 2021.1.13. ~ 2021.1.16. | - |
dc.citation.conferenceName | 35th International Conference on Information Networking, ICOIN 2021 | - |
dc.citation.edition | 35th International Conference on Information Networking, ICOIN 2021 | - |
dc.citation.endPage | 520 | - |
dc.citation.startPage | 517 | - |
dc.citation.title | International Conference on Information Networking | - |
dc.citation.volume | 2021-January | - |
dc.identifier.bibliographicCitation | International Conference on Information Networking, Vol.2021-January, pp.517-520 | - |
dc.identifier.doi | 10.1109/icoin50884.2021.9334011 | - |
dc.identifier.scopusid | 2-s2.0-85100714862 | - |
dc.identifier.url | http://www.icoin.org/ | - |
dc.subject.keyword | Authentication | - |
dc.subject.keyword | Blockchains | - |
dc.subject.keyword | Controllers | - |
dc.subject.keyword | Decentralized Identifiers | - |
dc.subject.keyword | Self-Sovereign Identity | - |
dc.type.other | Conference Paper | - |
dc.description.isoa | false | - |
dc.subject.subarea | Computer Networks and Communications | - |
dc.subject.subarea | Information Systems | - |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.