Ç¥ÁØÈ­ Âü¿©¾È³»

TTAÀÇ Ç¥ÁØÇöȲ

Ȩ > Ç¥ÁØÈ­ °³¿ä > TTAÀÇ Ç¥ÁØÇöȲ

Ç¥ÁعøÈ£ TTAS.KO-10.0169 ±¸Ç¥ÁعøÈ£
Á¦°³Á¤ÀÏ 2004-12-23 ÃÑÆäÀÌÁö 25
ÇѱÛÇ¥Áظí EAM ±¸ÃàÀ» À§ÇÑ XML ±â¹Ý º¸¾È ±â¼ú Àû¿ë Áöħ
¿µ¹®Ç¥Áظí Guideline for Applying XML based Security Technologies to building the EAM system
Çѱ۳»¿ë¿ä¾à XML ±â¹Ý Á¤º¸±â¼úÀ» Àû¿ëÇÏ¿© ÅëÇÕÁ¢±Ù°ü¸®(EAM) ½Ã½ºÅÛÀ» ±¸ÃàÇϴµ¥ ÇÊ¿äÇÑ ¼öÇà ÀÛ¾÷ °úÁ¤ Áß ÇʼöÀûÀ¸·Î ¿ä±¸µÇ´Â ±³È¯ ¸Þ½ÃÁö ¹× µî·Ï±â/ÀúÀå¼Ò º¸¾È ¿ä±¸¸¦ Á¤ÀÇÇÏ°í XML ±â¹Ý ¸Þ½ÃÁö º¸¾È¿¡ ÃÖÀûÈ­µÈ XML ±â¹Ý º¸¾È ±â¼úÀÇ Àû¿ë ÁöħÀ» Á¦½ÃÇÔÀ¸·Î½á EAM ½Ã½ºÅÛ¿¡ ÀÖ¾î »óÈ£ ȣȯ¼º ÀÖ´Â º¸¾È¸ðµ¨À» ±¸Ãà ÇÒ ¼ö ÀÖµµ·Ï Ç¥ÁØÀ» Á¤ÀÇÇÑ´Ù.
¿µ¹®³»¿ë¿ä¾à For construction of EAM system, we define the security demands of interchanging the transaction message and component parts.
And we propose standard EAM system scenario base on the XML security technologies for the Interoperability security model.
±¹Á¦Ç¥ÁØ
°ü·ÃÆÄÀÏ TTAS.KO-10.0169.zip TTAS.KO-10.0169.zip             TTA-0055.pdf TTA-0055.pdf

ÀÌÀü
BPEL4WSÀÇ »óÈ£¿î¿ëÀ» À§ÇÑ Choreography º¯È¯
´ÙÀ½
ebXML ¸Þ½ÃÁö ¼­ºñ½º º¸¾È ÀûÇÕ¼º ¹× »óÈ£¿î¿ë¼º °Ë»ç Áöħ