Acknowledgement
This research was supported by the National Research Foundation of Korea(NRF) funded by the Ministry of Education and Ministry of Science and ICT (NRF-2019S1A5B5A07105353) in 2019.
References
- E.S.Jeong.(2014). A Design of the Encrypted File System with PKI Authentication : User Authentication using PKI. Soongsil University, Master's Thesis.
- Liu Y, Tome W, Zhang L, Choffnes D, Levin D, Maggs B, Mislove A, Schulman A & Wilson C. (2015). An end-to-end measurement of certificate revocation in the web's PKI. In Proceedings of the 2015 internet measurement conference. ACM, 183-196.
- J. Clark & P.C. Van Oorschot. (2013). SoK: SSL and HTTPS: revisiting past challenges and evaluating certificate trust model enhancements. In Proc. IEEE Symposium on Security and Privacy 2013, Berkeley, CA, USA, May 19-22, pp.511-525. IEEE Computer Society.
- J. A. Berkowsky & T. Hayajneh.(2017). Security issues with certificate authorities. Proc. IEEE 8th Annu. Ubiquitous Comput. Electron. Mobile Commun. Conf. (UEMCON). 449-455.
- S. Santesson, M. Myers, R. Ankney, A. Malpani, S. Galperin, & C. Adams. (2013). X.509 Internet public key infrastructure online certificate status protocol-OCSP, RFC 6960. 1-41. https://www.hjp.at/(en,st_b)/doc/rfc/rfc6960.html
- S.C. Park.(2017). A Comparative Analysis of PKI Authentication and FIDO Authentication. Journal of the Korea Institute of Information and Communication Engineering. 21(7), 1411-1419. https://doi.org/10.6109/JKIICE.2017.21.7.1411
- C. J. Chae, H. J. Cho & H.M. Jung. (2018). Authentication Method using Multiple Biometric Information in FIDO Environment. Journal of Digital Convergence, 16(1), 159-164. DOI : 10.14400/JDC.2018.16.1.159
- A. Balalaie, A. Heydarnoori & P. Jamshidi. (2016). Microservices architecture enables devops: Migration to a cloud-native architecture. IEEE Software, 33(3), 42-52. https://doi.org/10.1109/MS.2016.64
- S.H. Lee.(2007). Implementation of Call Service Application Modeling and Performance Measurement in Open API based Gateway System. KWANGWOON UNIVERSITY. Master's Thesis. http://www.riss.kr/link?id=T11101637.
- J. W. Lee & H. S. Seo (2021). A Study on the API Gateway for human resources management modules extensions in ERP. Journal of the Korea society of computer and information, 26(2), 79-88. DOI : 10.9708/JKSCI.2021.26.02.079
- Y. M. Park, Y. I. Choi, B. S. Lee.(2004). Technology Trend on Open API for Converged Telecommunication Services. Electronics and Telecommunications Trends, 19(6), 105-117. DOI:10.22648/ETRI.2004.J.190611
- R. Xu, W. Jin & D. Kim. (2019). Microservice security agent based on API gateway in edge computing. Sensors, 19(22), 4905. https://doi.org/10.3390/s19224905
- D. Macrinici, C. Cartofeanu & S. Gao. (2018). Smart contract applications within blockchain technology: A systematic mapping study. Telematics and Informatics, 35(8), 2337-2354. https://doi.org/10.1016/j.tele.2018.10.004
- A. Ouaddah, A. Abou Elkalam, A. Ait Ouahman. (2016). FairAccess: a new Blockchain-based access control framework for the Internet of Things. Security and communication networks, 9(18), 5943-5964. https://doi.org/10.1002/sec.1748
- M. Risius & K. Spohrer. (2017). A blockchain research framework, Business & Information Systems Engineering. 59(6). 385-409. https://doi.org/10.1007/s12599-017-0506-0
- C. Ebert, P. Louridas, T. M. Fernandez-Carames & P. Fraga-Lamas. (2020). Blockchain Technologies in Practice. IEEE Software, 37(4), 17-25. https://doi.org/10.1109/ms.2020.2986253
- S. T. Lee. (1994). A Study on the Development of Hierarchical Fuzzy Evaluation Algorithm and Its Application. Korea Maritime & Ocean University. Master's Thesis.
- S. J. Shin & I.K. Park.(2000). A New Approach to the Verification of a Message Protocol:Fuzzy Integral. Journal of Korea Information Processing Society. 7(6), pp. 1903-1910. DOI:10.3745/KIPSTE.2000.7.6.1903.