Ȩ > Ç¥ÁØÈ °³¿ä > TTAÀÇ Ç¥ÁØÇöȲ
Ç¥ÁعøÈ£ | TTAK.KO-12.0368 | ±¸Ç¥ÁعøÈ£ | |
---|---|---|---|
Á¦°³Á¤ÀÏ | 2020-12-10 | ÃÑÆäÀÌÁö | 38 |
ÇѱÛÇ¥Áظí | ºÐ»ê¿øÀå½Ã½ºÅÛÀ» À§ÇÑ º¸¾È±â´É ¿ä±¸»çÇ× | ||
¿µ¹®Ç¥Áظí | Security functional requirements for distributed ledger systems | ||
Çѱ۳»¿ë¿ä¾à | ÀÌ Ç¥ÁØÀº ÀÌ¿ëÀÚ ¾ÖÇø®ÄÉÀ̼ÇÀ» ¿î¿µÇÏ´Â ºÐ»ê¿øÀå½Ã½ºÅÛ¿¡¼ ¹ß»ýÇÒ ¼ö ÀÖ´Â ÀÌ¿ëÀÚ ÀÍ¸í¼º, ¼ÒÇÁÆ®¿þ¾î À§‧º¯Á¶, ¾ÏȣŰ À¯Ãâ, ºñÀΰ¡µÈ Á¢±Ù, µ¥ÀÌÅÍ À¯Ãâ ¹× À§‧º¯Á¶, ½Ã½ºÅÛ Àå¾Ö, °¨»ç ±â·Ï ¼Õ½Ç µî º¸¾È À§ÇùÀ» ½Äº°ÇÏ°í, ÀÌ¿¡ ´ëÀÀÇÒ ¼ö ÀÖ´Â ½Äº° ¹× ÀÎÁõ, º¸¾È °¨»ç, Åë½Å º¸È£, ¾ÏÈ£ ÅëÁ¦, Á¢±Ù ÅëÁ¦, °³ÀÎÁ¤º¸ º¸È£, µ¥ÀÌÅÍ º¸È£, ÀÚ¿ø °¡¿ë¼º µî º¸¾È±â´É ¿ä±¸»çÇ×À» Á¤ÀÇÇÑ´Ù. | ||
¿µ¹®³»¿ë¿ä¾à | The standard identifies security threats (such as user anonymity, software tampering, crypto-key leakage, unauthorized access, data leakage and tampering, system failure, audit log loss, etc.) that can occur in a distributed ledger system running user applications and defines security functional requirements such as identification and authentication, security audit, communication protection, cryptography control, access control, privacy protection, data protection, and resource availability against security threats identified. | ||
±¹Á¦Ç¥ÁØ | - | ||
°ü·ÃÆÄÀÏ | TTAK.KO-12.0368.pdf |