ÀÚ·á°Ë»ö-Ç¥ÁØ

Ȩ > ÀڷḶ´ç > ÀÚ·á°Ë»ö > Ç¥ÁØ

ÀÚ·á °Ë»ö°á°ú

°Ë»öÆäÀÌÁö·Î
Ç¥ÁØÁ¾·ù Á¤º¸Åë½Å´ÜüǥÁØ(TTAS)
Ç¥ÁعøÈ£ TTAK.KO-12.0104 ±¸ Ç¥ÁعøÈ£
Á¦°³Á¤ÀÏ 2009-12-22 ÃÑ ÆäÀÌÁö 23
ÇÑ±Û Ç¥ÁØ¸í »ç¿ëÀÚ Á᫐ ID °ü¸® ¼­ºñ½ºÀÇ ¾ÈÀü¼º °ËÁõ Ç׸ñ
¿µ¹® Ç¥Áظí Security Verification Items for User Centric ID Management Service
ÇÑ±Û ³»¿ë¿ä¾à º» Ç¥ÁØÀº »ç¿ëÀÚ Á᫐ ID °ü¸® ¼­ºñ½º¿¡¼­ ÇÁ¶óÀ̹ö½Ã ħÇØ À¯ÇüÀ» ºÐ¼®ÇÏ°í, À̸¦ ÅëÇØ ¼­ºñ½º ÁÖüº° º¸¾È ¿ä±¸»çÇ×À» Á¦½ÃÇÑ´Ù. ¶ÇÇÑ, »ç¿ëÀÚ Á᫐ ID°ü¸® ¼­ºñ½ºÀÇ ¾ÈÀü¼ºÀ» Æò°¡Çϱâ À§ÇÑ ¾ÈÀü¼º °ËÁõ Ç׸ñµµ ÇÔ²² Á¦½ÃÇÑ´Ù. ƯÈ÷, Ç¥ÁØ¿¡¼­´Â ¾ÈÀü¼º °ËÁõ Ç׸ñÀº ¼­ºñ½º ±¸¼º ÁÖü ¹× ¼­ºñ½º ´Ü°è¿¡ µû¶ó Á¤ÀǵǾî ÀÖÀ¸¸ç, °ËÁõÇ׸ñº° °ËÁõ ¿¹µµ ÇÔ²² Á¦½ÃÇÑ´Ù.
¿µ¹® ³»¿ë¿ä¾à The standard include the presentation of the required security requirements based on an analysis of privacy infringements of and security threats to the user-centric ID management service, which the user controls and manages the Identity information generated by the use of the Internet service in an integrated manner. And the standard include the definition of the safety verification items in relation to the composition subject and service flow, in order to secure service safety. In addition, a method of verifying each element of the safety verification item is also included.
°ü·Ã IPR È®¾à¼­ Á¢¼öµÈ IPR È®¾à¼­ ¾øÀ½
°ü·ÃÆÄÀÏ    TTAK.KO-12.0104.pdf TTAK.KO-12.0104.pdf
Ç¥ÁØÀÌ·Â
Ç¥Áظí Ç¥ÁعøÈ£ Á¦°³Á¤ÀÏ ±¸ºÐ À¯È¿
¿©ºÎ
IPR
È®¾à¼­
ÆÄÀÏ
»ç¿ëÀÚ Á᫐ ID °ü¸® ¼­ºñ½ºÀÇ ¾ÈÀü¼º °ËÁõ Ç׸ñ TTAK.KO-12.0104 2009-12-22 Á¦Á¤ À¯È¿ ¾øÀ½ TTAK.KO-12.0104.pdf
Ç¥ÁØÀ¯Áöº¸¼öÀÌ·Â
°ËÅäÀÏÀÚ °ËÅä°á°ú °ËÅä³»¿ë
2018-05-31 À¯Áö