Ç¥ÁØÈ­ Âü¿©¾È³»

TTAÀÇ Ç¥ÁØÇöȲ

Ȩ > Ç¥ÁØÈ­ °³¿ä > TTAÀÇ Ç¥ÁØÇöȲ

Ç¥ÁعøÈ£ TTAK.KO-12.0311 ±¸Ç¥ÁعøÈ£
Á¦°³Á¤ÀÏ 2017-12-13 ÃÑÆäÀÌÁö 19
ÇѱÛÇ¥Áظí IoT ±â±â °£ Á¢±ÙÁ¦¾î ¸ÞÄ¿´ÏÁò ¹× È°¿ë ¿¹
¿µ¹®Ç¥Áظí IoT Device Access Control Mechanism and Use Case
Çѱ۳»¿ë¿ä¾à ÁÖ¿ä ³»¿ëÀ¸·Î´Â IoT ȯ°æ¿¡¼­ Á¢±ÙÁ¦¾î¸¦ ÇÏ°íÀÚ ÇÒ ¶§ ÇÊ¿ä·Î ÇÏ´Â Á¢±ÙÁ¦¾îÀÇ ÄÄÆ÷³ÍÆ®µéÀ» ±â¼úÇÏ°í, °¢ ÄÄÆ÷³ÍÆ®ÀÇ À§Ä¡¿¡ µû¸¥ Á¢±ÙÁ¦¾î °úÁ¤À» ±â¼úÇÑ´Ù. ¶ÇÇÑ Á¢±ÙÁ¦¾î °áÁ¤ °úÁ¤¿¡¼­ °í·ÁÇØ¾ß ÇÒ ¿ä¼Òµé°ú, Á¢±Ù ¿äû ¹æ¹ý, Á¢±Ù °áÁ¤ ¾Ë°í¸®Áò¿¡ ´ëÇØ ±â¼úÇÑ´Ù. ¸¶Áö¸·À¸·Î, ±â¼úÇÑ Á¢±ÙÁ¦¾î ¸ÞÄ¿´ÏÁòÀÌ È¨ IoT ȯ°æ¿¡ ¾î¶»°Ô Àû¿ëµÇ´ÂÁö ¿¹¸¦ µé¾î ¼³¸íÇÑ´Ù.
¿µ¹®³»¿ë¿ä¾à The main content of the standard is the component of access control and the process of the access control in home IoT environment. Furthermore, It is described with the factors to be considered in the access control decision process, access request method, access decision algorithm. Finally, it includes the application of access control in home IoT environment.
±¹Á¦Ç¥ÁØ
°ü·ÃÆÄÀÏ TTAK.KO-12.0311.pdf TTAK.KO-12.0311.pdf            

ÀÌÀü
»çÀ̹ö-¹°¸® ½Ã½ºÅÛÀÇ ¼­ºñ½º Ư¼º¿¡ µû¸¥ ÀÚ¿ø °ü¸® ÂüÁ¶ ¸ðµ¨
´ÙÀ½
SDN ±â¹ÝÀÇ ³×Æ®¿öÅ© º¸¾È ±â´ÉÀÇ ÀÎÅÍÆäÀ̽º(I2NSF) ÇÁ·¹ÀÓ¿öÅ© – Á¦10ºÎ:³×Æ®¿öÅ© º¸¾È °ü¸®¸¦ À§ÇÑ ºí·ÏüÀÎ ±¸Á¶ ¹× ÀýÂ÷