Ȩ > Ç¥ÁØÈ °³¿ä > TTAÀÇ Ç¥ÁØÇöȲ
Ç¥ÁعøÈ£ | TTAT.MM-TR.0008 v1.0.0 | ±¸Ç¥ÁعøÈ£ | |
---|---|---|---|
Á¦°³Á¤ÀÏ | 2014-11-26 | ÃÑÆäÀÌÁö | 47 |
ÇѱÛÇ¥Áظí | oneM2M - Analysis of Security Solutions for the oneM2M System (±â¼úº¸°í¼) v1.0.0 | ||
¿µ¹®Ç¥Áظí | oneM2M - Analysis of Security Solutions for the oneM2M System (Technical Report) v1.0.0 | ||
Çѱ۳»¿ë¿ä¾à | |||
¿µ¹®³»¿ë¿ä¾à | The TR analyses security issues which may arise from use cases, captures relevant threats, maps them to the security requirements and derives possible security mechanisms to realize the security features for oneM2M Release1 | ||
±¹Á¦Ç¥ÁØ | |||
°ü·ÃÆÄÀÏ | [2014-245]TTAT.MM-TR.0008_[1].pdf |