Ȩ > ÀڷḶ´ç > ÀÚ·á°Ë»ö > Ç¥ÁØ
ÀÚ·á °Ë»ö°á°ú
Ç¥ÁØÁ¾·ù | Á¤º¸Åë½Å±â¼úº¸°í¼(TTAR) | ||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Ç¥ÁعøÈ£ | TTAR-12.0026 | ±¸ Ç¥ÁعøÈ£ | |||||||||||||||
Á¦°³Á¤ÀÏ | 2017-11-09 | ÃÑ ÆäÀÌÁö | 19 | ||||||||||||||
ÇÑ±Û Ç¥Áظí | ½º¸¶Æ®ÀÇ·á ¼ºñ½º º¸¾È À§Çù(±â¼úº¸°í¼) | ||||||||||||||||
¿µ¹® Ç¥Áظí | Security Threats for Smart Healthcare Service(Technical Report) | ||||||||||||||||
ÇÑ±Û ³»¿ë¿ä¾à | ÀÌ ±â¼úº¸°í¼´Â ½º¸¶Æ®ÀÇ·á ¼ºñ½º ¸ðµ¨¿¡ Á¤º¸º¸È£¸¦ ºÎ°¡ÇÑ ¸ðµ¨À» Á¦½ÃÇϱâ À§ÇÏ¿©, ÇÊ¿äÇÑ ¿ë¾î¿Í ¼³¸í, ½º¸¶Æ®ÀÇ·á ¼ºñ½º ±¸¼º ¿ä¼Ò ¹× ±¸¼º ¿ä¼Ò°£ ¿¬°èµÇ´Â ºÎºÐ¿¡ ´ëÇÑ º¸¾ÈÃë¾àÁ¡À» ºÐ¼®ÇÏ¿© ÀÌ¿¡ ´ëÇÑ º¸¾È À§ÇùÀ» Á¦½ÃÇÑ´Ù. | ||||||||||||||||
¿µ¹® ³»¿ë¿ä¾à | In order to present a reference model that adds security to the smart healthcare services model, the technical report analyzes the required terms and description and the security vulnerability of between the components and the associated components of the smart healthcare service model, and presents threats for it. | ||||||||||||||||
°ü·Ã IPR È®¾à¼ | Á¢¼öµÈ IPR È®¾à¼ ¾øÀ½ | ||||||||||||||||
°ü·ÃÆÄÀÏ |
![]() |
||||||||||||||||
Ç¥ÁØÀÌ·Â |
|