Ȩ > Ç¥ÁØÈ °³¿ä > TTAÀÇ Ç¥ÁØÇöȲ
Ç¥ÁعøÈ£ | TTAE.IT-Y.2720-Sup.12 | ±¸Ç¥ÁعøÈ£ | |
---|---|---|---|
Á¦°³Á¤ÀÏ | 2013-12-18 | ÃÑÆäÀÌÁö | 49 |
ÇѱÛÇ¥Áظí | NGN ¾ÆÀ̵§Æ¼Æ¼ °ü¸® ¸ÞÄ¿´ÏÁò ºÎ¼Ó¼ | ||
¿µ¹®Ç¥Áظí | Supplement on NGN Identity Management Mechanisms | ||
Çѱ۳»¿ë¿ä¾à | º» Ç¥ÁØÀº ¶óÀÌÇÁ »çÀÌŬ °ü¸®, ÀÎÁõ ¹× ÀÎÁõº¸Àå, ¾ÆÀ̵§Æ¼Æ¼ °ü¸® Åë½Å°ú Á¤º¸±³È¯, ¾ÆÀ̵§Æ¼Æ¼ Á¤º¸ Á¢¼ÓÁ¦¾î ±×¸®°í ÅëÇÕÀÎÁõ µîÀÇ ¾ÆÀ̵§Æ¼Æ¼ °ü¸® ¸ÞÄ¿´ÏÁòÀ» ±â¼úÇÑ´Ù. | ||
¿µ¹®³»¿ë¿ä¾à | This supplement provides a description of some example mechanisms that can be used to meet certain identity management(IdM) requirements and deployment needs of NGN. This supplement describes mechanisms and procedures that support IdM functions. | ||
±¹Á¦Ç¥ÁØ | |||
°ü·ÃÆÄÀÏ | TTAE.IT-Y.2720-Sup.12.pdf |