Ȩ > ÀڷḶ´ç > ÀÚ·á°Ë»ö > Ç¥ÁØ
ÀÚ·á °Ë»ö°á°ú
Ç¥ÁØÁ¾·ù | Á¤º¸Åë½Å´ÜüǥÁØ(TTAS) | ||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Ç¥ÁعøÈ£ | TTAE.IF-RFC3694 | ±¸ Ç¥ÁعøÈ£ | |||||||||||||||
Á¦°³Á¤ÀÏ | 2007-12-26 | ÃÑ ÆäÀÌÁö | 23 | ||||||||||||||
ÇÑ±Û Ç¥Áظí | À§Ä¡Á¤º¸ ÇÁ¶óÀ̹ö½Ã (Geopriv) ÇÁ·ÎÅäÄÝÀÇ À§ÇùºÐ¼® | ||||||||||||||||
¿µ¹® Ç¥Áظí | Threat Analysis of the Geopriv Protocol | ||||||||||||||||
ÇÑ±Û ³»¿ë¿ä¾à | À§Ä¡Á¤º¸¸¦ Ȱ¿ëÇÏ´Â ´Ù¾çÇÑ ÀÀ¿ë¿¡¼ À§Ä¡Á¤º¸¿Í °ü·ÃµÈ º¸¾È À§ÇùµéÀ» ºÐ¼®ÇÑ´Ù. º»
¹®¼¿¡¼ ºÐ¼®ÇÑ ÀϺΠÀ§Çù¿¡ ´ëÇÑ º¸¾È ¿ä±¸»çÇ×µéÀº Geopriv requirement(RFC 3693) ¿¡ ±â¼úµÈ´Ù. |
||||||||||||||||
¿µ¹® ³»¿ë¿ä¾à |
This document analyzes threats against geopriv protocol and architecture for geopriv
protocol for location-based and location-dependent services. Some security properties about theses threats are enumerated as a reference for Geopriv requirements. |
||||||||||||||||
°ü·Ã IPR È®¾à¼ | Á¢¼öµÈ IPR È®¾à¼ ¾øÀ½ | ||||||||||||||||
°ü·ÃÆÄÀÏ |
![]() |
||||||||||||||||
Ç¥ÁØÀÌ·Â |
|
||||||||||||||||
Ç¥ÁØÀ¯Áöº¸¼öÀÌ·Â |
|