DOI QR코드

DOI QR Code

A Study On User-centric Identity Information Management Model In Internet Environment

인터넷 환경에서의 사용자 중심 ID정보 관리 모델에 관한 연구

  • Rhy, Hae-Gyu (Department of Computer Science and Engineering, Seoul National University) ;
  • Shin, Hyeon-Shik (Department of Computer Science and Engineering, Seoul National University)
  • 이해규 (서울대학교 컴퓨터공학부) ;
  • 신현식 (서울대학교 컴퓨터공학부)
  • Published : 2009.06.30

Abstract

With the increase of number of internet services due to development of internet, it becomes a critical issue to appropriately manage the personal information about user's identity, that is ID information that service providers collect in terms of user's convenience improvement and privacy protection. But the existing ID information management models are service provider-centric or they insufficiently provide ID information management functions, so that they have not been satisfying user's requirement. In this paper, by establishing user-centric concept in we information management, we propose the new user-centric ID information management model in which user can make use of the internet service more conveniently and eventually enhance user's privacy.

인터넷의 발전으로 사용자들이 이용하는 인터넷 서비스들의 수가 많아지면서 서비스 제공자들이 수집하는 사용자의 실체(Identity)에 관한 개인정보, 즉 ID정보의 적절한 관리는 사용자의 편리성 증대와 프라이버시 보호 측면에서 매우 중요하게 되었다. 그러나 기존의 ID정보 관리 모델들은 서비스 제공자 중심의 관리이거나 제공하는 ID정보 관리 기능이 부족하여 사용자의 기대를 만족시키지 못했다. 본 논문에서는 ID정보 관리에서의 사용자 중심 개념을 정립하여, 사용자들의 인터넷 서비스 이용이 더욱 편리해지고, 궁극적으로 프라이버시가 강화될 수 있는 새로운 사용자 중심 ID정보 관리 모델을 제안한다.

Keywords

References

  1. Abhilasha Bhargav-Spantzel, "Establishing and Protection Digital Identity in Federation Systems," Journal of Computer Security, voL 14, no. 3, pp. 269-300, Nov. 2005
  2. D.W, Shin, "Ensuring Information Assurance in Federated Identity Management," Performance, Computing, and Communications 2004 IEEE International Conference on, Pp. 821-826, Apr. 2004
  3. D.R. Stinson, "CRYPTOGRAPHY," CRC Press, 1995
  4. K. Bhargavan. "Secure Session for Web Services." ACM Workshop on Secure Web Services, pp. 56-66, Oct. 2004
  5. "Liberty Alliance Project: Introduction to the Liberty Alliance Identity Architecture." 2003
  6. "Liberty Alliance Project: Liberty Trust Models Guidelines," 2003
  7. Microsoft, ''Microsoft.NET Passport," 2004
  8. Microsoft. http://msdn.microsoft.com/en-us/library/aa480189.aspx, 2008
  9. "OpenID Authentication 1.1." 2006
  10. T. Tsiakis and G. Sthephanides, "The concept of security and trust in electronic payments," Computers & Security, vol. 24, no. 1, pp. 10-15, Feb. 2005 https://doi.org/10.1016/j.cose.2004.11.001
  11. V. Samar, "Single Sigh-On Using Cookies for Web Applications," Proceedings of the 8th Workshop on Enabling Technologies on Infrastructure for Collaborative Enterprises, pp. 158-163, June 1999
  12. W. Diffie and M.E. Hellman, "New directions in cryptography," IEEE Transactions on Information Theory, vol. 22, no. 6, pp. 644-654, Nov. 1976 https://doi.org/10.1109/TIT.1976.1055638
  13. W. Stallings, CRYPTOGRAPHY AND NETWORK SECURITY, Prentice Hall, 1999
  14. W.G. Shieh, "Efficient remote mutual authentication and key agreement,"Computers & Security, vol. 25, no. 1. pp. 72-77, Feb. 2006 https://doi.org/10.1016/j.cose.2005.09.008