Ç¥ÁØÈ­ Âü¿©¾È³»

TTAÀÇ Ç¥ÁØÇöȲ

Ȩ > Ç¥ÁØÈ­ °³¿ä > TTAÀÇ Ç¥ÁØÇöȲ

Ç¥ÁعøÈ£ TTAE.IT-X.1471 ±¸Ç¥ÁعøÈ£
Á¦°³Á¤ÀÏ 2024-12-06 ÃÑÆäÀÌÁö 58
ÇѱÛÇ¥ÁØ¸í ¿Â¶óÀÎ ºÐ¼® ¼­ºñ½º¸¦ À§ÇÑ ÂüÁ¶ ¸ð´ÏÅÍ
¿µ¹®Ç¥Áظí Reference monitor for online analytics services
Çѱ۳»¿ë¿ä¾à ÀÌ Ç¥ÁØÀº ºñÀΰ¡ ¶Ç´Â ÀǵµÇÏÁö ¾ÊÀº µ¥ÀÌÅÍ À¶ÇÕ ±×¸®°í ºÐ¼®À» ¹æÁöÇϱâ À§ÇÑ ÀϹÝÀû ÂüÁ¶ ¸ð´ÏÅ͸µ ¹× ¿î¿µ¿¡ ´ëÇÑ »ç¾çÀ» Á¦°øÇÑ´Ù. ±×¸®°í »óÈ£ ¿î¿ë¼ºÀ» À§ÇÑ ÂüÁ¶ ¸ð´ÏÅÍÀÇ ÀÛµ¿ ¹× ÇÁ·Î¼¼½º°¡ Æ÷ÇԵǸç, ´ÙÀ½ÀÇ ³»¿ëÀ» ´ã°í ÀÖ´Ù.
- ÂüÁ¶ ¸ð´ÏÅÍ °³¿ä
- ÂüÁ¶ ¸ð´ÏÅÍ À§Çù°ú Á¶Ä¡
- ºÐ¼® ¼­ºñ½º¸¦ À§ÇÑ ÂüÁ¶ ¸ð´ÏÅÍ
- ºñµð¿À ¹× ¿Àµð¿À µ¥ÀÌÅÍÀÇ ºÐ¼® ¼­ºñ½º¸¦ À§ÇÑ ÂüÁ¶ ¸ð´ÏÅÍ
- °ü°è µ¥ÀÌÅÍ ºÐ¼® ¼­ºñ½º¸¦ À§ÇÑ ÂüÁ¶ ¸ð´ÏÅÍ
¿µ¹®³»¿ë¿ä¾à Big data analysis service is based on the undefined unstructured data including user behaviour, purchase, payment, location and consuming of various internet contents. It can provide new insights not previously discovered and predicts future states. However, some un-authorized data can be used maliciously in the analysis process.
This Recommendation describes a reference monitor for big data analytics and operations to detect an un-authorized data use. The Recommendation analyses security threats and challenges in the big data analytics, and describes security considerations that could mitigate these threats and address security challenges with access control mechanisms. A reference monitor methodology based on access control is provided for determining which of these security capabilities are required for mitigating security threats and addressing security challenges for big data analytics.
±¹Á¦Ç¥ÁØ
°ü·ÃÆÄÀÏ TTAE.IT-X.1471.pdf TTAE.IT-X.1471.pdf            

ÀÌÀü
µðÁöÅÐ ±ÝÀ¶ ¼­ºñ½º¸¦ À§ÇÑ º¸¾È º¸Áõ ÇÁ·¹ÀÓ¿öÅ©
´ÙÀ½
¾çÀÚ ÀâÀ½ ³­¼ö »ý¼º±â ±¸Á¶