Ȩ > Ç¥ÁØÈ °³¿ä > TTAÀÇ Ç¥ÁØÇöȲ
Ç¥ÁعøÈ£ | TTAK.KO-12.0185 | ±¸Ç¥ÁعøÈ£ | |
---|---|---|---|
Á¦°³Á¤ÀÏ | 2011-12-21 | ÃÑÆäÀÌÁö | 21 |
ÇѱÛÇ¥Áظí | ºñµ¿±â ´ëÈÇü À¥ ¼ºñ½º Á¤º¸º¸È£ ¿ä±¸»çÇ× | ||
¿µ¹®Ç¥Áظí | Security Requirement of AJAX Web Service | ||
Çѱ۳»¿ë¿ä¾à | ¾ÈÀüÇÑ À¥2.0¼ºñ½º Á¦°øÀ» À§ÇÑ ºñµ¿±â ´ëÈÇü À¥ ÀÀ¿ë ÇÁ·Î±×·¥À̳ª ¸®Ä¡ ÀÎÅÍ³Ý ¾ÖÇø®ÄÉÀ̼ÇÀÌ Àû¿ëµÇ´Â ±â¼úÀº ±âÁ¸ ÆäÀÌÁöÀÇ Ç¥½Ã¿Í ÇൿÀ» ¹æÇØÇÏÁö ¾Ê°í ¹é±×¶ó¿îµå¿¡¼ ºñµ¿±âÀûÀ¸·Î ¼¹ö¿¡¼ µ¥ÀÌÅ͸¦ °Ë»öÇÒ ¼ö ÀÖ´Â »ó¿ëÈ ±â¼úÀÌ´Ù. º» Ç¥ÁØÀº AJAX ±â¼ú·Î ÀÎÇÏ¿© ¹ß»ýµÇ´Â À¥ ¼ºñ½º Á¤º¸ º¸È£ À§ÇùºÐ¼® ¹× ÀÌ¿¡ µû¸¥ Á¤º¸ º¸È£ ¿ä±¸ »çÇ×À» Á¦½ÃÇÏ¿© ÀÌÁ¾ À¥ ºê¶ó¿ìÀú °£ÀÇ Á¤º¸ º¸È£ »óÈ£¿¬µ¿À» À§ÇÑ º¸¾È¿ä±¸ »çÇ×À» Á¤ÀÇÇÑ´Ù. | ||
¿µ¹®³»¿ë¿ä¾à | AJAX and RIA are the commercial technologies in order to provide the secure Web 2.0 services on the background no to disturb the traditional web services. This document analyzes the threats presents security requirements for interoperability between hetero-web applications. | ||
±¹Á¦Ç¥ÁØ | |||
°ü·ÃÆÄÀÏ | TTAK_[1].KO-12.0185.zip |