Ç¥ÁØÈ­ Âü¿©¾È³»

TTAÀÇ Ç¥ÁØÇöȲ

Ȩ > Ç¥ÁØÈ­ °³¿ä > TTAÀÇ Ç¥ÁØÇöȲ

Ç¥ÁعøÈ£ TTAT.MM-TR.0008 v2.0.1 ±¸Ç¥ÁعøÈ£
Á¦°³Á¤ÀÏ 2018-10-12 ÃÑÆäÀÌÁö 43
ÇѱÛÇ¥Áظí oneM2M - Security (±â¼úº¸°í¼­) v2.0.1
¿µ¹®Ç¥Áظí oneM2M - Security (Technical Report) v2.0.1
Çѱ۳»¿ë¿ä¾à The scope of the present document is to create a common understanding on security within oneM2M systems. To achieve that, security services are explained, threats analysed and security requirements within oneM2M identified and derived from use cases. In addition the present document discusses how security mechanisms relate to the oneM2M architecture. Suitable security procedures and mechanisms are defined within [i.14].
¿µ¹®³»¿ë¿ä¾à The scope of the present document is to create a common understanding on security within oneM2M systems. To achieve that, security services are explained, threats analysed and security requirements within oneM2M identified and derived from use cases. In addition the present document discusses how security mechanisms relate to the oneM2M architecture. Suitable security procedures and mechanisms are defined within [i.14].
±¹Á¦Ç¥ÁØ
°ü·ÃÆÄÀÏ TTAT.MM-TR.0008 v2.0.1.pdf TTAT.MM-TR.0008 v2.0.1.pdf            

ÀÌÀü
oneM2M - Use Cases Collection (±â¼úº¸°í¼­) v2.4.2
´ÙÀ½
oneM2M - Industrial Domain Enablement (±â¼úº¸°í¼­) v2.5.2