ÀÚ·á°Ë»ö-Ç¥ÁØ

Ȩ > ÀڷḶ´ç > ÀÚ·á°Ë»ö > Ç¥ÁØ

ÀÚ·á °Ë»ö°á°ú

°Ë»öÆäÀÌÁö·Î
Ç¥ÁØÁ¾·ù Á¤º¸Åë½Å´ÜüǥÁØ(TTAS)
Ç¥ÁعøÈ£ TTAK.KO-12.0245 ±¸ Ç¥ÁعøÈ£
Á¦°³Á¤ÀÏ 2014-12-17 ÃÑ ÆäÀÌÁö 10
ÇÑ±Û Ç¥ÁØ¸í ½Å·Ú±â°üÀ» ÀÌ¿ëÇÑ ÅëÇÕÀÎÁõ¼­ºñ½º º¸¾È ¿ä±¸»çÇ×
¿µ¹® Ç¥Áظí Security Requirements for the Integrated Authentication Service using Trusted Third Party
ÇÑ±Û ³»¿ë¿ä¾à ÅëÇÕ ÀÎÁõ ¼­ºñ½º´Â ´Ù¼öÀÇ »ç¿ëÀÚ¿Í ¼­ºñ½º Á¦°øÀÚ¸¦ ÅëÇÕÇÏ¿© ´Ù¾çÇÑ ÀÎÁõ ¼­ºñ½º¸¦ Á¦°øÇÒ ¼ö ÀÖÀ¸¹Ç·Î °³º°ÀûÀÎ ÀÎÁõ ¼­ºñ½º¿¡ ºñÇØ »ó´ëÀûÀ¸·Î ÅõÀÚ ¹× °ü¸® ºñ¿ëÀÌ Àý°¨µÇ¸ç, ÅëÇÕº¸¾È°ü¸®¿¡ ÀÇÇØ º¸¾È¼ºÀÌ ÀÏÁ¤ÇÑ ±â´ë¼öÁØÀ¸·Î À¯ÁöµÉ ¼ö ÀÖ´Â ÀåÁ¡ÀÌ ÀÖ´Ù.
º» Ç¥ÁØ¿¡¼­´Â ½Å·Ú±â°ü¿¡ ´ëÇÑ ÀϹÝÀûÀÎ ±¸¼º¹æ½Ä µîÀ» ¼Ò°³ÇÏ°í, ÅëÇÕ ÀÎÁõ ¼­ºñ½º¿¡ ´ëÇÑ °³¿ä¿Í ¼¼ °¡Áö ¼­ºñ½º¸ðµ¨À» Á¤ÀÇÇÑ´Ù. ¶ÇÇÑ, ½Å·Ú±â°üÀÌ »ç¿ëÀÚ¿Í ¼­ºñ½º Á¦°øÀÚ°£¿¡ °øÁ¤ÇÏ°Ô ½Å·Ú¼ºÀ» ±¸ÃàÇϱâ À§ÇÑ ¿ä±¸ »çÇ×°ú ÅëÇÕ ÀÎÁõ ¼­ºñ½ºÀÇ ±â¹Ð¼º ¹× ¹«°á¼ºÀ» º¸ÀåÇϱâ À§ÇÑ ¿ä±¸ »çÇ×, ¸¶Áö¸·À¸·Î ÅëÇÕ ÀÎÁõ ¼­ºñ½º¸¦ ¾ÈÁ¤ÀûÀ¸·Î À¯ÁöÇϱâ À§ÇØ ÇÊ¿äÇÑ °¡¿ë¼º¿¡ ´ëÇØ ÃÖ¼ÒÇÑÀÇ º¸¾È ¿ä±¸ »çÇ×À» Á¤ÀÇÇÑ´Ù.
¿µ¹® ³»¿ë¿ä¾à Integrated authentication service can provide various authentication service to integrating a number of user and service provider, therefore it can reduce cost of maintenance and maintain expectation security level by integrated security management.
This standard describes general composition of TTP, and presents overview and three service models of integrated authentication service. Moreover, it defines requirements to build a reliability between user and service provider and requirements to ensure confidentiality and integrity of integrated authentication service. Lastly, it defines minimum security requirements of availability to maintain integrated authentication service in a stable manner.
°ü·Ã IPR È®¾à¼­ Á¢¼öµÈ IPR È®¾à¼­ ¾øÀ½
°ü·ÃÆÄÀÏ    TTAK.KO-12.0245.pdf TTAK.KO-12.0245.pdf
Ç¥ÁØÀÌ·Â
Ç¥Áظí Ç¥ÁعøÈ£ Á¦°³Á¤ÀÏ ±¸ºÐ À¯È¿
¿©ºÎ
IPR
È®¾à¼­
ÆÄÀÏ
½Å·Ú±â°üÀ» ÀÌ¿ëÇÑ ÅëÇÕÀÎÁõ¼­ºñ½º º¸¾È ¿ä±¸»çÇ× TTAK.KO-12.0245 2014-12-17 Á¦Á¤ À¯È¿ ¾øÀ½ TTAK.KO-12.0245.pdf
Ç¥ÁØÀ¯Áöº¸¼öÀÌ·Â
°ËÅäÀÏÀÚ °ËÅä°á°ú °ËÅä³»¿ë
2018-05-31 À¯Áö