Ȩ > ÀڷḶ´ç > ÀÚ·á°Ë»ö > Ç¥ÁØ
ÀÚ·á °Ë»ö°á°ú
Ç¥ÁØÁ¾·ù | Á¤º¸Åë½Å´ÜüǥÁØ(TTAS) | ||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Ç¥ÁعøÈ£ | TTAE.IT-X.1402 | ±¸ Ç¥ÁعøÈ£ | |||||||||||||||
Á¦°³Á¤ÀÏ | 2020-12-10 | ÃÑ ÆäÀÌÁö | 26 | ||||||||||||||
ÇÑ±Û Ç¥Áظí | ºÐ»ê¿øÀå±â¼ú º¸¾È ÇÁ·¹ÀÓ¿öÅ© | ||||||||||||||||
¿µ¹® Ç¥Áظí | Security framework for distributed | ||||||||||||||||
ÇÑ±Û ³»¿ë¿ä¾à | ÀÌ Ç¥ÁØÀº ºÐ»ê¿øÀå±â¼ú(DLT)ÀÇ º¸¾È À§Çù¿¡ ´ëÇÑ º¸¾È ¿ä±¸»çÇ×À» ºÐ¼®ÇÏ°í º¸¾È À§ÇùÀ» ¿ÏÈÇϱâ À§ÇÑ º¸¾È ´É·ÂÀ» Á¦½ÃÇÑ´Ù. ¶ÇÇÑ ÀÌ·¯ÇÑ º¸¾È ´É·ÂÀ» Ȱ¿ëÇÏ´Â ¹æ¹ý¿¡ ´ëÇÑ ÁöħÀ¸·Î½á º¸¾È ÇÁ·¹ÀÓ¿öÅ© ¹æ¹ý·ÐÀ» Á¦½ÃÇÑ´Ù. | ||||||||||||||||
¿µ¹® ³»¿ë¿ä¾à | This Recommendation analyzes security requirements to the security threats to DLT and provides security capabilities to mitigate those threats. A security framework methodology is also provided as a guidance on how to use security capabilities. | ||||||||||||||||
°ü·Ã IPR È®¾à¼ | Á¢¼öµÈ IPR È®¾à¼ ¾øÀ½ | ||||||||||||||||
°ü·ÃÆÄÀÏ |
![]() |
||||||||||||||||
Ç¥ÁØÀÌ·Â |
|