• Title/Summary/Keyword: Web Identity

Search Result 129, Processing Time 0.021 seconds

The Reliable Communication Method for Self-Sovereign Identity Ecosystems (자기주권 신원 생태계를 위한 신뢰할 수 있는 통신 방법)

  • Chio, Gyu Hyun;Kim, Geun-Hyung
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.11 no.3
    • /
    • pp.91-98
    • /
    • 2022
  • With the recent increase in interest in metaverse in which virtual and physical spaces are digitally fused, many activities in physical spaces are expected to take place in web-based virtual spaces. Therefore, there is a need for research on a self-sovereign identity system that can secure privacy and mutual trust in a DID(decentralized identifier)-based virtual space environment. We, in this paper, developed and validated a reliable communication method consisting of DIDComm messages, a procedure for generating distributed identifiers, asymmetric keys, and DID documents based on Hyperledger Indy and DIDComm open sources. The developed communication method can be applied to verify each other by exchanging additional information and verifiable credentials for trust among communication participants.

Web 2.0 and Web novels -Focusing on Web-based Romance Novels (웹 2.0 시대와 웹소설 -웹 로맨스 서사를 중심으로)

  • Ryu, Su-Yun
    • Journal of Popular Narrative
    • /
    • v.25 no.4
    • /
    • pp.9-43
    • /
    • 2019
  • Web novels are one of the most actively adapted genre novels under a new medium called the Internet. Research on cultural content implemented on top of digital media is naturally closely related to environmental changes in digital media. The same goes for Web novels sparked by the identity of Web platforms. Especially in the case of web novels, the platform itself that provides them has triggered direct changes in genre code and reading patterns. From this perspective, this thesis wanted to examine the formation process and strategic features of web novels, which became content and products on the web platform environment. First of all, through the formation process ranging from communication novels to Internet novels and web novels, I arranged the transition to digital media and the change of genre novel market. This was an attempt to extract that Web novels not only have continuity as genre novels, but also have a turning point as digital content. Web novels are digital content that internalizes the values of the Web 2.0 era. It should also be a core product that grows the pie in the market in its own right. This paper noted that web novels are content that embodies these consumption values. So this thesis considered about what is the visualization and commercialization strategy of the web-based novels that is currently formed, and what is the current status of the web-based romance novels as the content and the product that is driving OSMU most actively in the process of commercialization. Through this process, I found that the greatest characteristic of web novels as genre novels that have evolved into digital content is their division and crack of genre.

Analyses of Detection and Protection for Phishing on Web page (웹페이지의 피싱 차단 탐지 기술에 대한 분석)

  • Kim, Jung-Tae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.05a
    • /
    • pp.607-610
    • /
    • 2008
  • Phishing is a form of online identity theft that aims to steal sensitive information such as online banking passwords and credit card information from users. Phishing scams have been receiving extensive press coverage because such attacks have been escalating in number and sophistication. According to a study by Gartner, Many Internet users have identified the receipt of e-mail linked to phishing scams and about 2 million of them are estimated to have been tricked into giving away sensitive information. This paper presents a novel browser extension, AntiPhish, that aims to protect users against spoofed web site-based phishing attack.

  • PDF

Standardization Trends in Interoperability between Metaverse Platforms (메타버스 상호연동 표준화 동향)

  • H.Y. Jung;S.G. Khang
    • Electronics and Telecommunications Trends
    • /
    • v.38 no.3
    • /
    • pp.78-85
    • /
    • 2023
  • This paper presents a review of standardization activities toward the interoperability between different metaverse platforms, which is a research hotspot in the metaverse. The metaverse is often considered as the evolution of the current mobile Internet. Like for the Internet, interoperability is essential to provide continuous user experiences over different metaverse service environments. However, current metaverses have limitations in providing interoperability in terms of portability of services, digital objects, such as identity and avatars, and economic systems. To address these limitations, the metaverse industry and open-source communities have recently begin to develop metaverse interworking standards. We describe activities conducted by various representative standardization bodies such as the Metaverse Standardization Forum, W3C (World Wide Web Consortium) Open Metaverse Interoperability, Open Metaverse Foundation, Open Metaverse Alliance for Web3, and Metaverse Alliance. In addition, we discuss how to counteract interoperability issues from the Korean perspective.

A Record and Conservation of Cultural Heritages through Web Ecomuseum : the Case of Mountain Mudeung (웹 생태박물관을 활용한 문화유산의 기록과 보존 : 무등산을 중심으로)

  • Noh, Shi-Hun
    • The Korean Journal of Archival Studies
    • /
    • no.27
    • /
    • pp.209-238
    • /
    • 2011
  • Ecomuseum which appeared in France in 1968 and widely diffused over the world, is a new type of museum. The purpose of this museum is not to simply possess and exhibit the existing relics, but to discover the locational senses of a territory by in-situ conserving and interpreting its entire natural and cultural heritages, and to plan the participation of its population and the development of its local community. The significance of this museum can be found in the recovery of disappearing collective memories of a territory, the restoration of the cultural identity of its population and the revitalization of a underdeveloped area. As the majority of these museums are fragmented or open air museums, an 'web ecomuseum' which makes the remote offering of informations about whole dispersed heritages and their holistic interpretation possible by digitalizing, recording, conserving, interpreting and utilizing related heritages, is necessary. This paper considers the possibility of web ecomuseum and its constitution contents and methods through the case of Mountain Mudeung area. Especially, in relation to the latter, this paper suggests a plan which consists of selection of own local themes, construction of digital archives, design of web expositions and production of electronic cultural maps.

Development of SAML Software for JAVA Web Applications in Korea (국내 자바 웹 응용을 위한 SAML 소프트웨어의 개발)

  • Jo, Jinyong;Chae, Yeonghun;Kong, JongUk
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.9
    • /
    • pp.1160-1172
    • /
    • 2019
  • Federated authentication is a user authentication and authorization infrastructure that spans multiple security domains. Many overseas Web applications have been adopting SAML-based federated authentication. However, in Korea, it is difficult to apply the authentication because of the high market share of a specific Web (application) server, which is hard to use open-source SAML software and the high adoption of Java-based standard framework which is not easy to integrate with SAML library. This paper proposes the SAML4J, which is developed in order to have Web applications easily and safely integrated with the Java-based framework. SAML4J has a developer-friendly advantage of using a session storage independent of the framework and processing Web SSO flows through simple API. We evaluate the functionality, performance, and security of the SAML4J to demonstrate the high feasibility of it.

Policy Based Privacy Technology in Web Environment (웹 환경에서 정책 기반 개인정보보호 기술)

  • No, Jong-Hyeok;Jin, Seung-Heon
    • Electronics and Telecommunications Trends
    • /
    • v.22 no.4 s.106
    • /
    • pp.144-155
    • /
    • 2007
  • 본 논문에서는 웹 환경에서 개인정보를 안전하게 관리할 수 있는 기술을 소개한다. 프라이버시와 관련된 기술을 분류하고, 웹 환경에서 적용될 수 있는 정책 기반 프라이버시 기술인 P3P, EPAL, XACML을 설명한다. 또한 이 기술을 활용한 마이크로소프트 인터넷 익스플로러의 P3P 기능, AT&T의 웹 브라우저용 P3P 사용자 에이전트 privacy bird, 그리고 identity 관리 시스템 환경에서 XACML을 이용한 ETRI IDMS의 privacy controller에 대하여 자세히 기술한다. 그리고 상기 기술의 장단점을 비교하여 향후 해결해야 할 점을 고찰한다.

Social Motivational Factors Influencing the Intention to Use of Blog (블로그 사용의도에 영향을 미치는 사회 동기적 요인)

  • Hong, Seok-In;Choi, Hee-Jae;Lee, Zoon-Ky
    • The Journal of the Korea Contents Association
    • /
    • v.10 no.1
    • /
    • pp.122-137
    • /
    • 2010
  • Blogs are a new type of media that have recently become popular on the World Wide Web and have influence throughout society. The purpose of this study is to examine social motivations influencing intention of blog usage. Based on Technology Acceptance Model and Motivation Theory, this study considered perceived usefulness, perceived ease of use, reputation, reciprocity, enjoyment of helping, social identity as the determinants of influencing the intention to use of blog. The suggested model was empirically evaluated using online survey data collection from 342 users of popular blog site in Korea (NAVER Blog, Cyworld minihompy, Daum Blog, and Yahoo Blog). The results revealed that perceived usefulness, perceived ease of use, reciprocity, and social identity affect directly the intention of blog usage. Furthermore, social identity has moderate effect via reciprocity and enjoyment of helping on blog usage. This study contributes to a theoretical understanding of the factors as social motivation that affects the usage of blogs. Also, the results of this study provide blog service providers useful strategic insights and service guidelines to enhance user's intention of blogs practically.

Internet ID Management System based on ID Federation: e-IDMS (ID 연계 기반의 인터넷 ID Management System: e-IDMS)

  • Cho Yeong-Sub;Jin Seung-Hun;Moon Phil-Joo;Chung Kyo-Il
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.43 no.7 s.349
    • /
    • pp.104-114
    • /
    • 2006
  • In order to use an Internet service, it is a general procedure that user subscribes to the service and then registers her or his id(identifier). As Internet has been more widely used, however, user has more and more ids than ever before. In this environments, whenever user uses an Internet service, she or he must authenticate to the service provider, which makes her or him inconvenient. As user's data is scattered and unmanaged on various web sites, user privacy has been revealed more often. This paper specifies e-IDMS which ETRI has been developing to solve such problems. e-IDMS is an Internet ID(IDentity) management system based on ID Federation Mechanism e-IDMS provides ID Federation-based facilities such as composite authentication, Internet SSG, ID information management, privacy protection and interactive query. e-IDMS is used in establishing integrated ill management system for public institutions.

Proposal for Service Model for Internet Identity Management (인터넷 ID관리를 위한 서비스 모델 제안)

  • Song, Jung-Hwan;Kang, Yeon-Jung;Jang, Hwan-Seok
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.4
    • /
    • pp.143-152
    • /
    • 2008
  • The incredible progress of information and communication technology has allowed various information and communication services to emerge in the Web environment. Such a service is initiated when the user provides his/her personal information to the service provider and is then given an identifier and authentication data. A series of the processes is inconvenient as it requires authentication by the service provider each time that the user requests the service. Furthermore, as the user subscribes to more services, the volume of ID and authentication information increases. This compels the users to use an ID that is easy to remember or to register the same ID over and over, increasing the risk of ID hacking. It is clear that such threats will become more serious as our lives become more dependent upon the Internet and as the Internet service environment advances. With the introduction of different services, the need to efficiently manage ID has been raised. In this paper, a Internet Identity Management Service that enables the control of the flow of the user’s personal information, which is used and stored for the Internet service, is proposed from the user's perspective.