Ȩ > Ç¥ÁØÈ °³¿ä > TTAÀÇ Ç¥ÁØÇöȲ
Ç¥ÁعøÈ£ | TTAK.KO-12.0311 | ±¸Ç¥ÁعøÈ£ | |
---|---|---|---|
Á¦°³Á¤ÀÏ | 2017-12-13 | ÃÑÆäÀÌÁö | 19 |
ÇѱÛÇ¥Áظí | IoT ±â±â °£ Á¢±ÙÁ¦¾î ¸ÞÄ¿´ÏÁò ¹× È°¿ë ¿¹ | ||
¿µ¹®Ç¥Áظí | IoT Device Access Control Mechanism and Use Case | ||
Çѱ۳»¿ë¿ä¾à | ÁÖ¿ä ³»¿ëÀ¸·Î´Â IoT ȯ°æ¿¡¼ Á¢±ÙÁ¦¾î¸¦ ÇÏ°íÀÚ ÇÒ ¶§ ÇÊ¿ä·Î ÇÏ´Â Á¢±ÙÁ¦¾îÀÇ ÄÄÆ÷³ÍÆ®µéÀ» ±â¼úÇÏ°í, °¢ ÄÄÆ÷³ÍÆ®ÀÇ À§Ä¡¿¡ µû¸¥ Á¢±ÙÁ¦¾î °úÁ¤À» ±â¼úÇÑ´Ù. ¶ÇÇÑ Á¢±ÙÁ¦¾î °áÁ¤ °úÁ¤¿¡¼ °í·ÁÇØ¾ß ÇÒ ¿ä¼Òµé°ú, Á¢±Ù ¿äû ¹æ¹ý, Á¢±Ù °áÁ¤ ¾Ë°í¸®Áò¿¡ ´ëÇØ ±â¼úÇÑ´Ù. ¸¶Áö¸·À¸·Î, ±â¼úÇÑ Á¢±ÙÁ¦¾î ¸ÞÄ¿´ÏÁòÀÌ È¨ IoT ȯ°æ¿¡ ¾î¶»°Ô Àû¿ëµÇ´ÂÁö ¿¹¸¦ µé¾î ¼³¸íÇÑ´Ù. | ||
¿µ¹®³»¿ë¿ä¾à | The main content of the standard is the component of access control and the process of the access control in home IoT environment. Furthermore, It is described with the factors to be considered in the access control decision process, access request method, access decision algorithm. Finally, it includes the application of access control in home IoT environment. | ||
±¹Á¦Ç¥ÁØ | |||
°ü·ÃÆÄÀÏ | TTAK.KO-12.0311.pdf |