모바일 환경에서의 개인 정보보호를 위한 기술 동향

  • 박용수 (한양대학교 공과대학 컴퓨터공학부)
  • Published : 2009.12.15

Abstract

Keywords

References

  1. 정병목, '전자상거래 시장 뒤흔든 5대 뉴스', 아이뉴스 24. 2008.04.23
  2. 서명덕, '일부 대형닷컴, 회원동의 없이 개인정보 넘겨', 조선일보, 2008, 04.23
  3. D. Chaum, Security without identification: transaction systems to make Big Brother obsolete. Communications of the ACM, 28(1), 1985 https://doi.org/10.1145/4372.4373
  4. I. B. Damgard, Payment systems and credential mechanisms with provable security against abuse by individuals, CRYPTO'88, 1998 https://doi.org/10.1007/0-387-34799-2
  5. vid Chaum, Blind signatures for untraceable payments, Advances in Cryptology - Crypto '82, SpringerVerlag (1983), 199-203
  6. A. Lysyanskaya 등, Pseudonym Systems, SAC'99, LNCS 1758, 2000
  7. Alexandra Boldyreva, Nathan Chenette, Younho Lee, Adam O'Neill: Order-Preserving Symmetric Encryption. EUROCRYPT 2009: 224-241 https://doi.org/10.1007/978-3-642-01001-9
  8. William H. Winsborough Kent E. Seamons Vicki E. Jones, Automated Trust Negotiation, DISCEX'2000, 2000
  9. S. D. Kamvar, M. T. Schlosser, and H. Garcia-Molina, The EigenTrust Algorithm for Reputation Management in P2P Networks, In Proceedings of the Twelfth International World Wide Web Conference, 2003 https://doi.org/10.1145/775152.775242
  10. A. Josang and V.A. Bondi. Legal Reasoning with Subjective Logic. Artificial Intelligence and Law, 8(4), pp.289-315, Kluwer 2000 https://doi.org/10.1023/A:1011219731903
  11. Audun J o sang and Jochen Haller. Dirichlet Reputation Systems. Proceedings of the Second International Conference on Availability, Reliability and Security (ARES 2007), Vienna, April 2007 https://doi.org/10.1109/ARES.2007.71
  12. M. Blaze, Blaze, M., Feigenbaum, J., Ioannidis, J. and Keromytis, A. 'The KeyNote Trust Management System, Version 2. RFC-2704'. IETF, September 1999
  13. on Howell and David Kotz. A Formal Semantics for SPKI. (Extended version, 38 pages,) Technical Report TR 2000-363, Dartmouth College, 2000
  14. Ninghui Li John C. Mitchell, RT: A Role-based Trust-management Framework, DISCEX 2003, 2003
  15. N. Ragouzis et al., Security Assertion Markup Language (SAML) V2.0 Technical Overview. OASIS Committee Draft, March 2008. Document ID sstcsaml-tech-overview-2.0-cd-02, http://www.oasisopen.org/committees/download.php/27819/sstc-saml-tech-overview-2.0-cd-02.pdf
  16. PRIME White Paper Version 3, available at https://www.prime-proj ect.eu/prime_yroductsl/whitepaper/IPRIME-Whitepaper-V3. pdf