Ȩ > Ç¥ÁØÈ °³¿ä > TTAÀÇ Ç¥ÁØÇöȲ
Ç¥ÁعøÈ£ | TTAT.MM-TR.0008 v2.0.1 | ±¸Ç¥ÁعøÈ£ | |
---|---|---|---|
Á¦°³Á¤ÀÏ | 2018-10-12 | ÃÑÆäÀÌÁö | 43 |
ÇѱÛÇ¥Áظí | oneM2M - Security (±â¼úº¸°í¼) v2.0.1 | ||
¿µ¹®Ç¥Áظí | oneM2M - Security (Technical Report) v2.0.1 | ||
Çѱ۳»¿ë¿ä¾à | The scope of the present document is to create a common understanding on security within oneM2M systems. To achieve that, security services are explained, threats analysed and security requirements within oneM2M identified and derived from use cases. In addition the present document discusses how security mechanisms relate to the oneM2M architecture. Suitable security procedures and mechanisms are defined within [i.14]. | ||
¿µ¹®³»¿ë¿ä¾à | The scope of the present document is to create a common understanding on security within oneM2M systems. To achieve that, security services are explained, threats analysed and security requirements within oneM2M identified and derived from use cases. In addition the present document discusses how security mechanisms relate to the oneM2M architecture. Suitable security procedures and mechanisms are defined within [i.14]. | ||
±¹Á¦Ç¥ÁØ | |||
°ü·ÃÆÄÀÏ | TTAT.MM-TR.0008 v2.0.1.pdf |