Ç¥ÁØÈ­ Âü¿©¾È³»

TTAÀÇ Ç¥ÁØÇöȲ

Ȩ > Ç¥ÁØÈ­ °³¿ä > TTAÀÇ Ç¥ÁØÇöȲ

Ç¥ÁعøÈ£ TTAE.IT-X.1253 ±¸Ç¥ÁعøÈ£
Á¦°³Á¤ÀÏ 2011-12-21 ÃÑÆäÀÌÁö 31
ÇѱÛÇ¥Áظí ID °ü¸® ½Ã½ºÅÛ º¸¾È Áöħ
¿µ¹®Ç¥Áظí Security Guidelines for Identity Management Systems
Çѱ۳»¿ë¿ä¾à º» Ç¥ÁØÀº ID °ü¸® ½Ã½ºÅÛ¿¡ ÇÊ¿äÇÑ º¸¾È Áöħ°ú ÇÁ¶óÀ̹ö½Ã ±Ç°í »çÇ×À» ¾Æ·¡¿Í °°ÀÌ Á¤ÀÇÇÏ°í ÀÖ´Ù.
- ID °ü¸® ½Ã½ºÅÛ¿¡ Á¸ÀçÇÏ´Â º¸¾È À§Çù
- ID °ü¸® ½Ã½ºÅÛ ¼³Ä¡ ¹× ¿î¿µ ½Ã ÇÊ¿äÇÑ º¸¾È Áöħ
- ID °ü¸® ¼­¹ö ¹× Ŭ¶óÀ̾ðÆ®¿¡ ÇÊ¿äÇÑ º¸¾È Áöħ
- ¸ð¹ÙÀÏ ID °ü¸® Ŭ¶óÀ̾ðÆ®¿¡ ÇÊ¿äÇÑ º¸¾È Áöħ
- ID °ü¸® ½Ã½ºÅÛ ¿î¿ë ½Ã ÇÊ¿äÇÑ ÇÁ¶óÀ̹ö½Ã °í·Á »çÇ×
¿µ¹®³»¿ë¿ä¾à This standard proposes security guidelines for identity management (IdM) systems. The security guidelines provide how an IdM system should be deployed and operated for secure identity services in NGN (Next Generation Network) or cyberspace environment. The security guidelines focus on providing official advice how to employ various security mechanisms to protect a general IdM system and it also provides proper security procedures required when two IdM systems are interoperated.
±¹Á¦Ç¥ÁØ
°ü·ÃÆÄÀÏ TTAE.IT-X.1253.pdf TTAE.IT-X.1253.pdf            

ÀÌÀü
B2B ¹× C2B ÀÎÅÍÆäÀ̽º¿¡¼­ÀÇ NGN appointment °ü¸®¸¦ À§ÇÑ ¿ä±¸ »çÇ× ¹× ºÐ¼®
´ÙÀ½
¸Á °ü¸® Áö¿øÀ» À§ÇÑ º¸¾È °ü¸® ¿ä±¸ »çÇ×