Ajou University repository

Vulnerability Analysis of DID Document's Updating Process in the Decentralized Identifier Systems
  • Rhie, Min Hyung ;
  • Kim, Kyung Hoon ;
  • Hwang, Dong Yeop ;
  • Kim, Ki Hyung
Citations

SCOPUS

0

Citation Export

DC Field Value Language
dc.contributor.authorRhie, Min Hyung-
dc.contributor.authorKim, Kyung Hoon-
dc.contributor.authorHwang, Dong Yeop-
dc.contributor.authorKim, Ki Hyung-
dc.date.issued2021-01-13-
dc.identifier.issn1976-7684-
dc.identifier.urihttps://aurora.ajou.ac.kr/handle/2018.oak/36694-
dc.identifier.urihttps://www.scopus.com/inward/record.uri?partnerID=HzOxMe3b&scp=85100714862&origin=inward-
dc.description.abstractIn this paper, we analyzed the vulnerabilities that could occur when a third party who is not the owner of a Decentralized Identifier (DID) has the authority to modify a DID Document. DID is a technology that allows individuals to have data sovereignty. The DID Document contains information for authenticating the DID owner. A DID Controller has the authority to modify DID Document. This authority is being standardized so that it can be held by third parties as well as DID owners. It is a matter of changing the DID document against the will of the DID owner. To help owners assert their sovereignty even stronger, we propose a way for DID owners to use a policy, history, and service to verify the DID Document updating process.-
dc.description.sponsorshipThis research was supported by Korea Institute for Advancement of Technology(KIAT) grant funded by the Korea Government(MOTIE) (P0008703, The Competency Development Program for Industry Specialist)-
dc.language.isoeng-
dc.publisherIEEE Computer Society-
dc.subject.meshDocument updating-
dc.subject.meshThird parties-
dc.subject.meshVulnerability analysis-
dc.titleVulnerability Analysis of DID Document's Updating Process in the Decentralized Identifier Systems-
dc.typeConference-
dc.citation.conferenceDate2021.1.13. ~ 2021.1.16.-
dc.citation.conferenceName35th International Conference on Information Networking, ICOIN 2021-
dc.citation.edition35th International Conference on Information Networking, ICOIN 2021-
dc.citation.endPage520-
dc.citation.startPage517-
dc.citation.titleInternational Conference on Information Networking-
dc.citation.volume2021-January-
dc.identifier.bibliographicCitationInternational Conference on Information Networking, Vol.2021-January, pp.517-520-
dc.identifier.doi10.1109/icoin50884.2021.9334011-
dc.identifier.scopusid2-s2.0-85100714862-
dc.identifier.urlhttp://www.icoin.org/-
dc.subject.keywordAuthentication-
dc.subject.keywordBlockchains-
dc.subject.keywordControllers-
dc.subject.keywordDecentralized Identifiers-
dc.subject.keywordSelf-Sovereign Identity-
dc.type.otherConference Paper-
dc.description.isoafalse-
dc.subject.subareaComputer Networks and Communications-
dc.subject.subareaInformation Systems-
Show simple item record

Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Kim, Ki-Hyung  Image
Kim, Ki-Hyung 김기형
Department of Cyber Security
Read More

Total Views & Downloads

File Download

  • There are no files associated with this item.