ÀÚ·á°Ë»ö-Ç¥ÁØ

Ȩ > ÀڷḶ´ç > ÀÚ·á°Ë»ö > Ç¥ÁØ

ÀÚ·á °Ë»ö°á°ú

°Ë»öÆäÀÌÁö·Î
Ç¥ÁØÁ¾·ù Á¤º¸Åë½Å´ÜüǥÁØ(TTAS)
Ç¥ÁعøÈ£ TTAS.KO-10.0169 ±¸ Ç¥ÁعøÈ£
Á¦°³Á¤ÀÏ 2004-12-23 ÃÑ ÆäÀÌÁö 25
ÇÑ±Û Ç¥Áظí EAM ±¸ÃàÀ» À§ÇÑ XML ±â¹Ý º¸¾È ±â¼ú Àû¿ë Áöħ
¿µ¹® Ç¥Áظí Guideline for Applying XML based Security Technologies to building the EAM system
ÇÑ±Û ³»¿ë¿ä¾à XML ±â¹Ý Á¤º¸±â¼úÀ» Àû¿ëÇÏ¿© ÅëÇÕÁ¢±Ù°ü¸®(EAM) ½Ã½ºÅÛÀ» ±¸ÃàÇϴµ¥ ÇÊ¿äÇÑ ¼öÇà ÀÛ¾÷ °úÁ¤ Áß ÇʼöÀûÀ¸·Î ¿ä±¸µÇ´Â ±³È¯ ¸Þ½ÃÁö ¹× µî·Ï±â/ÀúÀå¼Ò º¸¾È ¿ä±¸¸¦ Á¤ÀÇÇÏ°í XML ±â¹Ý ¸Þ½ÃÁö º¸¾È¿¡ ÃÖÀûÈ­µÈ XML ±â¹Ý º¸¾È ±â¼úÀÇ Àû¿ë ÁöħÀ» Á¦½ÃÇÔÀ¸·Î½á EAM ½Ã½ºÅÛ¿¡ ÀÖ¾î »óÈ£ ȣȯ¼º ÀÖ´Â º¸¾È¸ðµ¨À» ±¸Ãà ÇÒ ¼ö ÀÖµµ·Ï Ç¥ÁØÀ» Á¤ÀÇÇÑ´Ù.
¿µ¹® ³»¿ë¿ä¾à For construction of EAM system, we define the security demands of interchanging the transaction message and component parts.
And we propose standard EAM system scenario base on the XML security technologies for the Interoperability security model.
°ü·Ã IPR È®¾à¼­ Á¢¼öµÈ IPR È®¾à¼­ ¾øÀ½
°ü·ÃÆÄÀÏ    TTAS.KO-10.0169.zip TTAS.KO-10.0169.zip TTA-0055.pdf TTA-0055.pdf
Ç¥ÁØÀÌ·Â
Ç¥Áظí Ç¥ÁعøÈ£ Á¦°³Á¤ÀÏ ±¸ºÐ À¯È¿
¿©ºÎ
IPR
È®¾à¼­
ÆÄÀÏ
EAM ±¸ÃàÀ» À§ÇÑ XML ±â¹Ý º¸¾È ±â¼ú Àû¿ë Áöħ TTAS.KO-10.0169 2004-12-23 À¯È¿ ¾øÀ½ TTAS.KO-10.0169.zip TTA-0055.pdf