Ç¥ÁØÈ­ Âü¿©¾È³»

TTAÀÇ Ç¥ÁØÇöȲ

Ȩ > Ç¥ÁØÈ­ °³¿ä > TTAÀÇ Ç¥ÁØÇöȲ

Ç¥ÁعøÈ£ TTAK.KO-12.0185 ±¸Ç¥ÁعøÈ£
Á¦°³Á¤ÀÏ 2011-12-21 ÃÑÆäÀÌÁö 21
ÇѱÛÇ¥ÁØ¸í ºñµ¿±â ´ëÈ­Çü À¥ ¼­ºñ½º Á¤º¸º¸È£ ¿ä±¸»çÇ×
¿µ¹®Ç¥Áظí Security Requirement of AJAX Web Service
Çѱ۳»¿ë¿ä¾à ¾ÈÀüÇÑ À¥2.0¼­ºñ½º Á¦°øÀ» À§ÇÑ ºñµ¿±â ´ëÈ­Çü À¥ ÀÀ¿ë ÇÁ·Î±×·¥À̳ª ¸®Ä¡ ÀÎÅÍ³Ý ¾ÖÇø®ÄÉÀ̼ÇÀÌ Àû¿ëµÇ´Â ±â¼úÀº ±âÁ¸ ÆäÀÌÁöÀÇ Ç¥½Ã¿Í ÇൿÀ» ¹æÇØÇÏÁö ¾Ê°í ¹é±×¶ó¿îµå¿¡¼­ ºñµ¿±âÀûÀ¸·Î ¼­¹ö¿¡¼­ µ¥ÀÌÅ͸¦ °Ë»öÇÒ ¼ö ÀÖ´Â »ó¿ëÈ­ ±â¼úÀÌ´Ù. º» Ç¥ÁØÀº AJAX ±â¼ú·Î ÀÎÇÏ¿© ¹ß»ýµÇ´Â À¥ ¼­ºñ½º Á¤º¸ º¸È£ À§ÇùºÐ¼® ¹× ÀÌ¿¡ µû¸¥ Á¤º¸ º¸È£ ¿ä±¸ »çÇ×À» Á¦½ÃÇÏ¿© ÀÌÁ¾ À¥ ºê¶ó¿ìÀú °£ÀÇ Á¤º¸ º¸È£ »óÈ£¿¬µ¿À» À§ÇÑ º¸¾È¿ä±¸ »çÇ×À» Á¤ÀÇÇÑ´Ù.
¿µ¹®³»¿ë¿ä¾à AJAX and RIA are the commercial technologies in order to provide the secure Web 2.0 services on the background no to disturb the traditional web services. This document analyzes the threats presents security requirements for interoperability between hetero-web applications.
±¹Á¦Ç¥ÁØ
°ü·ÃÆÄÀÏ TTAK_[1].KO-12.0185.zip TTAK_[1].KO-12.0185.zip            

ÀÌÀü
½Ç°¨ üÇè µðÁöÅРȨ½Ã¾îÅÍ ½Ã½ºÅÛ ±¸Á¶
´ÙÀ½
Àü±â öµµ¿¡ ÀÇÇÑ Åë½Å¼± À¯µµ ÀâÀ½Àü¾Ð Æò°¡ ¹æ¹ý