Ȩ > Ç¥ÁØÈ °³¿ä > TTAÀÇ Ç¥ÁØÇöȲ
Ç¥ÁعøÈ£ | TTAK.KO-12.0335 | ±¸Ç¥ÁعøÈ£ | |
---|---|---|---|
Á¦°³Á¤ÀÏ | 2018-12-19 | ÃÑÆäÀÌÁö | 22 |
ÇѱÛÇ¥Áظí | ºÐ»ê¿øÀå±â¼úÀ» È°¿ëÇÑ ¿Â¶óÀÎÅõÇ¥ ¸ðµ¨ ¹× º¸¾È À§Çù ´ëÀÀ | ||
¿µ¹®Ç¥Áظí | Security threats to online voting using distributed ledger technology | ||
Çѱ۳»¿ë¿ä¾à | ÀÌ Ç¥ÁØÀº ºÐ»ê¿øÀå±â¼úÀ» È°¿ëÇÑ ¿Â¶óÀÎ ÅõÇ¥ ½Ã½ºÅÛÀÇ ¸ðµ¨À» Á¦½ÃÇÏ°í ÇØ´ç ¸ðµ¨¿¡ ±Ù°ÅÇÑ ÅõÇ¥ ÀýÂ÷ »óÀÇ ÀáÀçÀûÀÎ º¸¾È À§ÇùÀ» Å©°Ô 5°¡Áö ¹üÁÖ(µ¥ÀÌÅÍ ±â¹Ð¼º, µ¥ÀÌÅÍ ¹«°á¼º, ¼ºñ½º °¡¿ë¼º, ºñÀΰ¡µÈ Á¢±Ù, ¾ÇÀÇÀûÀÎ Çൿ)·Î ºÐ·ùÇÏ¿© ºÐ¼®ÇÏ°í ±×¿¡ µû¶ó º¸¾È À§ÇùÀ» ÃÖ¼ÒÈ ÇÒ ¼ö ÀÖ´Â ´ëÀÀ ¹æ¾ÈÀ» Æ÷ÇÔÇÑ´Ù. | ||
¿µ¹®³»¿ë¿ä¾à | The standard proposes a model of an online voting system using the distributed ledger technology, analyzes potential security threats to the voting process based on that model in 5 categories (data confidentiality, data integrity, service availability, unauthorized access, malicious behavior), and includes countermeasures which mitigate security threats. | ||
±¹Á¦Ç¥ÁØ | |||
°ü·ÃÆÄÀÏ | TTAK.KO-12.0335.pdf |