Ç¥ÁØÈ­ Âü¿©¾È³»

TTAÀÇ Ç¥ÁØÇöȲ

Ȩ > Ç¥ÁØÈ­ °³¿ä > TTAÀÇ Ç¥ÁØÇöȲ

Ç¥ÁعøÈ£ TTAK.KO-12.0311 ±¸Ç¥ÁعøÈ£
Á¦°³Á¤ÀÏ 2017-12-13 ÃÑÆäÀÌÁö 19
ÇѱÛÇ¥Áظí IoT ±â±â °£ Á¢±ÙÁ¦¾î ¸ÞÄ¿´ÏÁò ¹× È°¿ë ¿¹
¿µ¹®Ç¥Áظí IoT Device Access Control Mechanism and Use Case
Çѱ۳»¿ë¿ä¾à ÁÖ¿ä ³»¿ëÀ¸·Î´Â IoT ȯ°æ¿¡¼­ Á¢±ÙÁ¦¾î¸¦ ÇÏ°íÀÚ ÇÒ ¶§ ÇÊ¿ä·Î ÇÏ´Â Á¢±ÙÁ¦¾îÀÇ ÄÄÆ÷³ÍÆ®µéÀ» ±â¼úÇÏ°í, °¢ ÄÄÆ÷³ÍÆ®ÀÇ À§Ä¡¿¡ µû¸¥ Á¢±ÙÁ¦¾î °úÁ¤À» ±â¼úÇÑ´Ù. ¶ÇÇÑ Á¢±ÙÁ¦¾î °áÁ¤ °úÁ¤¿¡¼­ °í·ÁÇØ¾ß ÇÒ ¿ä¼Òµé°ú, Á¢±Ù ¿äû ¹æ¹ý, Á¢±Ù °áÁ¤ ¾Ë°í¸®Áò¿¡ ´ëÇØ ±â¼úÇÑ´Ù. ¸¶Áö¸·À¸·Î, ±â¼úÇÑ Á¢±ÙÁ¦¾î ¸ÞÄ¿´ÏÁòÀÌ È¨ IoT ȯ°æ¿¡ ¾î¶»°Ô Àû¿ëµÇ´ÂÁö ¿¹¸¦ µé¾î ¼³¸íÇÑ´Ù.
¿µ¹®³»¿ë¿ä¾à The main content of the standard is the component of access control and the process of the access control in home IoT environment. Furthermore, It is described with the factors to be considered in the access control decision process, access request method, access decision algorithm. Finally, it includes the application of access control in home IoT environment.
±¹Á¦Ç¥ÁØ
°ü·ÃÆÄÀÏ TTAK.KO-12.0311.pdf TTAK.KO-12.0311.pdf            

ÀÌÀü
ºí·ÏüÀÎ ±â¹Ý »ç¹°ÀÎÅÍ³Ý µð¹ÙÀ̽º ¹× ÀÚ¿ø °Ë»ö ÇÁ·¹ÀÓ¿öÅ©
´ÙÀ½
SDN ±â¹ÝÀÇ ³×Æ®¿öÅ© º¸¾È ±â´ÉÀÇ ÀÎÅÍÆäÀ̽º(I2NSF) ÇÁ·¹ÀÓ¿öÅ© - Á¦1ºÎ: °³¿ä