Ç¥ÁØÈ­ Âü¿©¾È³»

TTAÀÇ Ç¥ÁØÇöȲ

Ȩ > Ç¥ÁØÈ­ °³¿ä > TTAÀÇ Ç¥ÁØÇöȲ

Ç¥ÁعøÈ£ TTAK.KO-12.0343 ±¸Ç¥ÁعøÈ£
Á¦°³Á¤ÀÏ 2018-12-19 ÃÑÆäÀÌÁö 21
ÇѱÛÇ¥ÁØ¸í ºñ½Äº° 󸮸¦ À§ÇÑ ¼ÒÇÁÆ®¿þ¾î ÇÁ·¹ÀÓ¿öÅ©
¿µ¹®Ç¥Áظí Software Framework for De-identification
Çѱ۳»¿ë¿ä¾à ÀÌ Ç¥ÁØÀÇ ¸ñÀûÀº ºñ½Äº° ó¸® ¼ÒÇÁÆ®¿þ¾îÀÇ ±â´ÉÀ» Á¤ÀÇÇÏ°í, ºòµ¥ÀÌÅÍ È°¿ë ½Ã °³ÀÎÁ¤º¸¸¦ º¸È£Çϱâ À§ÇØ ºñ½Äº° ó¸® Àü¿ë ¼ÒÇÁÆ®¿þ¾î¸¦ µµÀÔÇÒ °æ¿ì ÀûÇÕÇÑ ±â´ÉÀ» °¡Áø ¼ÒÇÁÆ®¿þ¾î¸¦ ½Äº°ÇÏ´Â µ¥ À̸¦ ÂüÁ¶ÇÒ ¼ö ÀÖµµ·Ï ÇÏ´Â °ÍÀÌ´Ù. ÀÌ Ç¥ÁØÀº ºòµ¥ÀÌÅÍ ºÐ¼®¡¤È°¿ë ½Ã, ºòµ¥ÀÌÅÍ ³»ÀÇ °³ÀÎÁ¤º¸¸¦ º¸È£Çϱâ À§ÇÑ ºñ½Äº° ó¸® ¼ÒÇÁÆ®¿þ¾îÀÇ ±¸Á¶¿Í °èÃþº° ¿ä±¸»çÇ× ¹× ±â´ÉÀ» Á¤ÀÇÇÑ´Ù.
¿µ¹®³»¿ë¿ä¾à The standard can be referred to adopt de-identification software for personal data protection when using big data. The standard defines architecture, requirements and functions of de-identification software by layer.
±¹Á¦Ç¥ÁØ
°ü·ÃÆÄÀÏ TTAK.KO-12.0343.pdf TTAK.KO-12.0343.pdf            

ÀÌÀü
3rd Generation Partnership Project;Technical Specification Group Services and System Aspects;ADMF logic for provisioning Lawful Interception (LI)(Release 18)
´ÙÀ½
3rd Generation Partnership Project;Technical Specification Group Radio Access Network;Internet Protocol (IP) multimedia call control protocol based on Session Initiation Protocol (SIP) and Session Description Protocol (SDP); User Equipment (UE) conformance specification; Part 2: Implementation Conformance Statement (ICS) specification(Release 16)