Ȩ > Ç¥ÁØÈ °³¿ä > TTAÀÇ Ç¥ÁØÇöȲ
Ç¥ÁعøÈ£ | TTAE.IT-X.1253 | ±¸Ç¥ÁعøÈ£ | |
---|---|---|---|
Á¦°³Á¤ÀÏ | 2011-12-21 | ÃÑÆäÀÌÁö | 31 |
ÇѱÛÇ¥Áظí | ID °ü¸® ½Ã½ºÅÛ º¸¾È Áöħ | ||
¿µ¹®Ç¥Áظí | Security Guidelines for Identity Management Systems | ||
Çѱ۳»¿ë¿ä¾à | º» Ç¥ÁØÀº ID °ü¸® ½Ã½ºÅÛ¿¡ ÇÊ¿äÇÑ º¸¾È Áöħ°ú ÇÁ¶óÀ̹ö½Ã ±Ç°í »çÇ×À» ¾Æ·¡¿Í °°ÀÌ Á¤ÀÇÇÏ°í ÀÖ´Ù.
- ID °ü¸® ½Ã½ºÅÛ¿¡ Á¸ÀçÇÏ´Â º¸¾È À§Çù - ID °ü¸® ½Ã½ºÅÛ ¼³Ä¡ ¹× ¿î¿µ ½Ã ÇÊ¿äÇÑ º¸¾È Áöħ - ID °ü¸® ¼¹ö ¹× Ŭ¶óÀ̾ðÆ®¿¡ ÇÊ¿äÇÑ º¸¾È Áöħ - ¸ð¹ÙÀÏ ID °ü¸® Ŭ¶óÀ̾ðÆ®¿¡ ÇÊ¿äÇÑ º¸¾È Áöħ - ID °ü¸® ½Ã½ºÅÛ ¿î¿ë ½Ã ÇÊ¿äÇÑ ÇÁ¶óÀ̹ö½Ã °í·Á »çÇ× |
||
¿µ¹®³»¿ë¿ä¾à | This standard proposes security guidelines for identity management (IdM) systems. The security guidelines provide how an IdM system should be deployed and operated for secure identity services in NGN (Next Generation Network) or cyberspace environment. The security guidelines focus on providing official advice how to employ various security mechanisms to protect a general IdM system and it also provides proper security procedures required when two IdM systems are interoperated. | ||
±¹Á¦Ç¥ÁØ | |||
°ü·ÃÆÄÀÏ | TTAE.IT-X.1253.pdf |