최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기디지털융복합연구 = Journal of digital convergence, v.19 no.8, 2021년, pp.205 - 217
조강우 (부경대학교 정보보호학과) , 전미현 (부경대학교 정보보호학과) , 신상욱 (부경대학교 IT융합응용공학과)
Decentralized SSI(Self Sovereign Identity) has become an alternative to a new digital identity solution, but an efficient de-identification technique has not been proposed due to the unique algorithmic characteristics of data transactions. In this study, to ensure the decentralized operation of SSI,...
C. Bruner, U. Gallersdorfer, F. Knirsch & D. Engel, F. Matthes, (2020) DID and VC : Untangling Decentralized Identifiers and Verifiable Credentials for the Web of Trust. en-trust, 01-06. DOI : 10.1145/3446983.3446992
Ministry of Science and ICT. (2021). Digital Signature Act (Online). https://law.go.kr/LSW/eng/engLsSc.do?menuId2§ionlawNm&query%EC%A0%84%EC%9E%90%EC%84%9C%EB%AA%85%EB%B2%95&x0&y0#liBgcolor0
A Muhle, A Gruner, T. Gayvoronskaya & C. Meinel. (2020) A survey on essential components of a self-sovereign identity, Elsevier Computer Science Review. 30, 80-85. DOI : 10.1016/j.cosrev.2018.10.002
Y. Liu, D. He, M. S. Obaidat, N. Kumar, M. K. Khan & K. K. R. Choo. (2020). Blockchain-based identity management systems : A review. Journal of Network and Computer Applications. 166(102731). 01-11. DOI : 10.1016/j.jnca.2020.102731
A. Tobin & D. Reed. (2016). The inevitable rise of self-sovereign identity. The Sovrin Foundation.
Q. Stokkink & J. Pouwelse. (2018). Deployment of a Blockchain-Based Self-Sovereign Identity. 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), Halifax, 1336-1342. DOI : 10.1109/Cybermatics_2018.2018.00230
Personal Information Protection Committee, (2020). Enforcement Decree of the Personal Information Protection Act (Online). https://law.go.kr/LSW/eng/engLsSc.do?menuId2§ionlawNm&query%EA%B0%9C%EC%9D%B8%EC%A0%95%EB%B3%B4%EB%B3%B4%ED%98%B8%EB%B2%95&x0&y0#liBgcolor0
H. S. Lee & J. H. Song. (2016). A Research on De-identification Technique for Personal Identifiable Information. Seongnam : Software Policy Research Institute(SPRi).
Council of the European Union. (2016) Regulation (EU) 2016/679 of the European Parliament and of the Council (General Data Protection Regulation).
S. Wachter. (2018). Normative challenges of identification in the Internet of Things: Privacy, profiling, discrimination, and the GDPR. Computer Law & Security Review. 103(1), 5-8. DOI : 10.1016/j.clsr.2018.02.002
J. B. Lee. (2018). A study on the Implications of Japanese Personal Information Protection Legislation and Improvement of Korean Legislation in the GDPR Era. KANGWON LAW REVIEW 55. Chuncheon : Institute of Comparative Legal Studies. DOI : 10.18215/kwlr.2018.55..95
P. Windley & D. Reed. (2018). SOVRIN TM : A Protocol and Token for Self-Sovereign Identity and Decentralized Trust. The Sovrin Foundation.
C. Lundvist, R. Heck, J. Torstensson, Z. Mitton & M. Sena. (2017). Uport: A platform for self-sovereign identity draft version. Delft : Blockchain Lab, 21 Feb, 2017.
C. Fei, J. Lohkamp, E. Rusu, K. Szawan & K. Wangner, (2018). Jolocom: Self-sovereign and decentralised identity by design. White paper.
J. Roos. (2018). Identity Management on the Blockchain, Seminar Innovation Internet Technologies and Services Departments of Informatics. Munich : Technical University of Munich.
D. Reed, M. Sporny & M. Sabadello, (2020) Decentralized Identifiers (DIDs) v1.0. W3C Working Draft (Online). https://www.w3.org/TR/did-core/
M. Sporny, G. Noble, D. Longley, D. C. Burnett & B. Zundel. (2019). Verifiable Credential Data Model 1.0. W3C Editor's Draft (Online). https://www.w3.org/TR/vc-data-model/
S. Goldwasser, S. Micali & C. Rackoff. (1989). The Knowledge Complexity of Interactive Proof Systems, SIAM Journal on computing 18(1). 186-208. DOI : 10.1137/0218012
M. Blum, P. Feldman & S. Micali. (2019). Non-interactive zero-knowledge and its applications. Providing Sound Foundations for Cryptography: On the work of Shafi Goldwasser and Silvio Micali. 329-349. DOI : 10.1145/3335741.3335757
A. Gabizon. (2017). Explaining SNARKs.. ELECTRONIC COIN CO. (Online), https://electriccoin.co/?sexplaining%20SNARKs%20Part%20&is_v1
P. J. Windley. (2016) How Sovrin Works. The Sovrin Foundation. (Online). https://sovrin.org/wp-content/uploads/2018/03/How-Sovrin-Works.pdf.
R. Belchior, B. Putz, G. Pernul, M. Correia, A. Vasconcelos & S. Guerreiro. (2020). SSIBAC: Self-Sovereign Identity Based Access Control. IEEE. 01-09. DOI : 10.5283/epub.44043
*원문 PDF 파일 및 링크정보가 존재하지 않을 경우 KISTI DDS 시스템에서 제공하는 원문복사서비스를 사용할 수 있습니다.
출판사/학술단체 등이 한시적으로 특별한 프로모션 또는 일정기간 경과 후 접근을 허용하여, 출판사/학술단체 등의 사이트에서 이용 가능한 논문
※ AI-Helper는 부적절한 답변을 할 수 있습니다.