Ȩ > Ç¥ÁØÈ °³¿ä > TTAÀÇ Ç¥ÁØÇöȲ
Ç¥ÁعøÈ£ | TTAS.KO-10.0169 | ±¸Ç¥ÁعøÈ£ | |
---|---|---|---|
Á¦°³Á¤ÀÏ | 2004-12-23 | ÃÑÆäÀÌÁö | 25 |
ÇѱÛÇ¥Áظí | EAM ±¸ÃàÀ» À§ÇÑ XML ±â¹Ý º¸¾È ±â¼ú Àû¿ë Áöħ | ||
¿µ¹®Ç¥Áظí | Guideline for Applying XML based Security Technologies to building the EAM system | ||
Çѱ۳»¿ë¿ä¾à | XML ±â¹Ý Á¤º¸±â¼úÀ» Àû¿ëÇÏ¿© ÅëÇÕÁ¢±Ù°ü¸®(EAM) ½Ã½ºÅÛÀ» ±¸ÃàÇϴµ¥ ÇÊ¿äÇÑ ¼öÇà ÀÛ¾÷ °úÁ¤ Áß ÇʼöÀûÀ¸·Î ¿ä±¸µÇ´Â ±³È¯ ¸Þ½ÃÁö ¹× µî·Ï±â/ÀúÀå¼Ò º¸¾È ¿ä±¸¸¦ Á¤ÀÇÇÏ°í XML ±â¹Ý ¸Þ½ÃÁö º¸¾È¿¡ ÃÖÀûÈµÈ XML ±â¹Ý º¸¾È ±â¼úÀÇ Àû¿ë ÁöħÀ» Á¦½ÃÇÔÀ¸·Î½á EAM ½Ã½ºÅÛ¿¡ ÀÖ¾î »óÈ£ ȣȯ¼º ÀÖ´Â º¸¾È¸ðµ¨À» ±¸Ãà ÇÒ ¼ö ÀÖµµ·Ï Ç¥ÁØÀ» Á¤ÀÇÇÑ´Ù. | ||
¿µ¹®³»¿ë¿ä¾à | For construction of EAM system, we define the security demands of interchanging the transaction message and component parts.
And we propose standard EAM system scenario base on the XML security technologies for the Interoperability security model. |
||
±¹Á¦Ç¥ÁØ | |||
°ü·ÃÆÄÀÏ | TTAS.KO-10.0169.zip TTA-0055.pdf |