메타버스의 진화에 따른 ID 관리 기술 현황 |
Jeong, Soo Yong
(공주대학교 융합과학과)
Seo, Chang Ho (공주대학교 융합과학과) CHO, in-Man (한국전자통신연구원) Jin, Seung-Hun (한국전자통신연구원) Kim, Soo Hyung (한국전자통신연구원) |
1 | Lee, Lik-Hang, et al. "All one needs to know about metaverse: A complete survey on technological singularity, virtual ecosystem, and research agenda." arXiv preprint arXiv:2110.05352 (2021). |
2 | Park, Sang-Min, and Young-Gab Kim. "A Metaverse: Taxonomy, components, applications, and open challenges." Ieee Access 10 (2022): 4209-4251. DOI |
3 | Bethencourt, John, Amit Sahai, and Brent Waters. "Ciphertext-policy attribute-based encryption." 2007 IEEE symposium on security and privacy (SP'07). IEEE, 2007. |
4 | Wei, Jianhao, et al. "LDP-based social content protection for trending topic recommendation." IEEE Internet of Things Journal 8.6 (2020): 4353-4372. |
5 | Wang, Yuntao, et al. "A survey on metaverse: Fundamentals, security, and privacy." arXiv preprint arXiv:2203.02662 (2022). |
6 | Yang, Qinglin, et al. "Fusing blockchain and AI with metaverse: A survey." IEEE Open Journal of the Computer Society (2022). |
7 | Di Pietro, Roberto, and Stefano Cresci. "Metaverse: Security and Privacy Issues." 2021 Third IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA). IEEE, 2021. |
8 | Antonioli, Daniele, Nils Ole Tippenhauer, and Kasper Rasmussen. "BIAS: bluetooth impersonation attacks." 2020 IEEE Symposium on Security and Privacy (SP). IEEE, 2020. |
9 | Han, Jinsoo, et al. "User-friendly home automation based on 3D virtual world." IEEE Transactions on consumer electronics 56.3 (2010): 1843-1847. DOI |
10 | Dionisio, John David N., William G. Burns III, and Richard Gilbert. "3D virtual worlds and the metaverse: Current status and future possibilities." ACM Computing Surveys (CSUR) 45.3 (2013): 1-38. |
11 | Lee, Lik Hang, et al. "Hibey: Hide the keyboard in augmented reality." 2019 IEEE International Conference on Pervasive Computing and Communications (PerCom. IEEE, 2019. |
12 | Hartmann, Jeremy, Yen-Ting Yeh, and Daniel Vogel. "AAR: Augmenting a wearable augmented reality display with an actuated head-mounted projector." Proceedings of the 33rd Annual ACM Symposium on User Interface Software and Technology. 2020. |
13 | Far, Saeed Banaeian, and Azadeh Imani Rad. "Applying Digital Twins in Metaverse: User Interface, Security and Privacy Challenges." Journal of Metaverse 2.1 (2022): 8-16. |
14 | Giaretta, Alberto. "Security and Privacy in Virtual Reality-A Literature Survey." arXiv preprint arXiv:2205.00208 (2022). |
15 | Huynh-The, Thien, et al. "Artificial Intelligence for the Metaverse: A Survey." arXiv preprint arXiv:2202.10336 (2022). |
16 | Kilger, Fabian, et al. "Detecting and Preventing Faked Mixed Reality." 2021 IEEE 4th International Conference on Multimedia Information Processing and Retrieval (MIPR). IEEE, 2021. |
17 | Zuckerberg, Mark, and Gayle King. "Facebook launches" Horizon Workrooms. "Here's how it works." (2021). |
18 | Ning, Huansheng, et al. "A Survey on Metaverse: the State-of-the-art, Technologies, Applications, and Challenges." arXiv preprint arXiv:2111.09673 (2021). |
19 | Zhernova, Ksenia, and Andrey Chechulin. "Overview of vulnerabilities of decision support interfaces based on virtual and augmented reality technologies." International Conference on Intelligent Information Technologies for Industry. Springer, Cham, 2021. |
20 | Dwork, Cynthia, et al. "Calibrating noise to sensitivity in private data analysis." Theory of cryptography conference. Springer, Berlin, Heidelberg, 2006. |
21 | Erlingsson, Ulfar, Vasyl Pihur, and Aleksandra Korolova. "Rappor: Randomized aggregatable privacy-preserving ordinal response." Proceedings of the 2014 ACM SIGSAC conference on computer and communications security. 2014. |
22 | Xu, Kaihe, et al. "My privacy my decision: Control of photo sharing on online social networks." IEEE Transactions on Dependable and Secure Computing 14.2 (2015): 199-210. DOI |
23 | Fromknecht, Conner, Dragos Velicanu, and Sophia Yakoubov. "A decentralized public key infrastructure with identity retention." Cryptology ePrint Archive (2014). |
24 | Chen, Jing, et al. "XAuth: Efficient privacy-preserving cross-domain authentication." IEEE Transactions on Dependable and Secure Computing (2021). |
25 | Casey, Peter, Ibrahim Baggili, and Ananya Yarramreddy. "Immersive virtual reality attacks and the human joystick." IEEE Transactions on Dependable and Secure Computing 18.2 (2019): 550-562. |
26 | XR Safety Initiative. "The XRSI Privacy Framework version 1.0." 0) (2020). |
27 | 데이터넷관리자, "개인정보 유출 위해 데스크톱 노린 공격 심화", IT정보마당 데이터넷, 2006.11.24. |
28 | "악성코드는 '디아블로3'를 타고?..게임계정 탈취 급증", 아주경제, 2012.07.15. |
29 | 금융보안원 보안연구부 보안기술팀, "바이오정보 사고사례 및 대응방안 조사", 금융보안원, 2016.03.04. |
30 | Srinivas, Jangirala, et al. "Cloud centric authentication for wearable healthcare monitoring system." IEEE Transactions on Dependable and Secure Computing 17.5 (2018): 942-956. DOI |
31 | Zhao, Tianming, et al. "Trueheart: Continuous authentication on wrist-worn wearables using ppg-based biometrics." IEEE INFOCOM 2020-IEEE Conference on Computer Communications. IEEE, 2020. |
32 | 닐 스티븐슨, 김장환 역, 「스노우 크래쉬」, 새와 물고기, 1996 |
33 | Jeong, Soo Yong, et al. "확장된 가상현실인 메타버스에서의 보안 위협 분석." Review of KIISC 31.6 (2021): 47-57. |
34 | John S., Jamais C., Jerry P., Corey B., Jochen H., James H., and Randal M. (2007) "Metaverse Roadmap", ASF |
35 | Meier, Manuel, et al. "TapID: Rapid touch interaction in virtual reality using wearable sensing." 2021 IEEE Virtual Reality and 3D User Interfaces (VR). IEEE, 2021. |
36 | Park, Sebeom, Shokhrukh Bokijonov, and Yosoon Choi. "Review of microsoft hololens applications over the past five years." Applied Sciences 11.16 (2021): 7259. |
37 | Happa, Jassim, Mashhuda Glencross, and Anthony Steed. "Cyber security threats and challenges in collaborative mixed-reality." Frontiers in ICT 6 (2019): 5. |
38 | 고준영, and 이근호. "M2M 환경에서의 SNS 개인정보 유출 위협 및 대응방안." 한국융합학회논문지 5.1 (2014): 29-34. DOI |
39 | Shang, Jiacheng, et al. "ARSpy: Breaking location-based multi-player augmented reality application for user location tracking." IEEE Transactions on Mobile Computing (2020). |
40 | 정성호, "인기 블록체인 게임서 대규모 해킹...7천 500억원 상당 탈취", 연합뉴스, 2022.03.30. |
41 | Zhao, Ruoyu, et al. "Metaverse: Security and Privacy Concerns." arXiv preprint arXiv:2203.03854 (2022). |
42 | Liu, Hong, et al. "Cooperative privacy preservation for wearable devices in hybrid computing-based smart health." IEEE Internet of Things Journal 6.2 (2018): 1352-1362. DOI |