Ȩ > ÀڷḶ´ç > ÀÚ·á°Ë»ö > Ç¥ÁØ
ÀÚ·á °Ë»ö°á°ú
| Ç¥ÁØÁ¾·ù | Á¤º¸Åë½Å´ÜüǥÁØ(TTAS) | ||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Ç¥ÁعøÈ£ | TTAE.IF-RFC3694 | ±¸ Ç¥ÁعøÈ£ | |||||||||||||||
| Á¦°³Á¤ÀÏ | 2007-12-26 | ÃÑ ÆäÀÌÁö | 23 | ||||||||||||||
| ÇÑ±Û Ç¥Áظí | À§Ä¡Á¤º¸ ÇÁ¶óÀ̹ö½Ã (Geopriv) ÇÁ·ÎÅäÄÝÀÇ À§ÇùºÐ¼® | ||||||||||||||||
| ¿µ¹® Ç¥Áظí | Threat Analysis of the Geopriv Protocol | ||||||||||||||||
| ÇÑ±Û ³»¿ë¿ä¾à | À§Ä¡Á¤º¸¸¦ Ȱ¿ëÇÏ´Â ´Ù¾çÇÑ ÀÀ¿ë¿¡¼ À§Ä¡Á¤º¸¿Í °ü·ÃµÈ º¸¾È À§ÇùµéÀ» ºÐ¼®ÇÑ´Ù. º»
¹®¼¿¡¼ ºÐ¼®ÇÑ ÀϺΠÀ§Çù¿¡ ´ëÇÑ º¸¾È ¿ä±¸»çÇ×µéÀº Geopriv requirement(RFC 3693) ¿¡ ±â¼úµÈ´Ù. |
||||||||||||||||
| ¿µ¹® ³»¿ë¿ä¾à |
This document analyzes threats against geopriv protocol and architecture for geopriv
protocol for location-based and location-dependent services. Some security properties about theses threats are enumerated as a reference for Geopriv requirements. |
||||||||||||||||
| °ü·Ã IPR È®¾à¼ | Á¢¼öµÈ IPR È®¾à¼ ¾øÀ½ | ||||||||||||||||
| °ü·ÃÆÄÀÏ |
|
||||||||||||||||
| Ç¥ÁØÀÌ·Â |
|
||||||||||||||||
| Ç¥ÁØÀ¯Áöº¸¼öÀÌ·Â |
|
||||||||||||||||

