Ȩ > ÀڷḶ´ç > ÀÚ·á°Ë»ö > Ç¥ÁØ
ÀÚ·á °Ë»ö°á°ú
| Ç¥ÁØÁ¾·ù | Á¤º¸Åë½Å´ÜüǥÁØ(TTAS) | ||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Ç¥ÁعøÈ£ | TTAE.IT-X.1402 | ±¸ Ç¥ÁعøÈ£ | |||||||||||||||
| Á¦°³Á¤ÀÏ | 2020-12-10 | ÃÑ ÆäÀÌÁö | 26 | ||||||||||||||
| ÇÑ±Û Ç¥Áظí | ºÐ»ê¿øÀå±â¼ú º¸¾È ÇÁ·¹ÀÓ¿öÅ© | ||||||||||||||||
| ¿µ¹® Ç¥Áظí | Security framework for distributed | ||||||||||||||||
| ÇÑ±Û ³»¿ë¿ä¾à | ÀÌ Ç¥ÁØÀº ºÐ»ê¿øÀå±â¼ú(DLT)ÀÇ º¸¾È À§Çù¿¡ ´ëÇÑ º¸¾È ¿ä±¸»çÇ×À» ºÐ¼®ÇÏ°í º¸¾È À§ÇùÀ» ¿ÏÈÇϱâ À§ÇÑ º¸¾È ´É·ÂÀ» Á¦½ÃÇÑ´Ù. ¶ÇÇÑ ÀÌ·¯ÇÑ º¸¾È ´É·ÂÀ» Ȱ¿ëÇÏ´Â ¹æ¹ý¿¡ ´ëÇÑ ÁöħÀ¸·Î½á º¸¾È ÇÁ·¹ÀÓ¿öÅ© ¹æ¹ý·ÐÀ» Á¦½ÃÇÑ´Ù. | ||||||||||||||||
| ¿µ¹® ³»¿ë¿ä¾à | This Recommendation analyzes security requirements to the security threats to DLT and provides security capabilities to mitigate those threats. A security framework methodology is also provided as a guidance on how to use security capabilities. | ||||||||||||||||
| °ü·Ã IPR È®¾à¼ | Á¢¼öµÈ IPR È®¾à¼ ¾øÀ½ | ||||||||||||||||
| °ü·ÃÆÄÀÏ |
|
||||||||||||||||
| Ç¥ÁØÀÌ·Â |
|
||||||||||||||||

