Ȩ > ÀڷḶ´ç > ÀÚ·á°Ë»ö > Ç¥ÁØ
ÀÚ·á °Ë»ö°á°ú
Ç¥ÁØÁ¾·ù | Á¤º¸Åë½Å´ÜüǥÁØ(TTAS) | ||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Ç¥ÁعøÈ£ | [ÆóÁö] TTAK.KO-12.0289 | ±¸ Ç¥ÁعøÈ£ | |||||||||||||||
Á¦°³Á¤ÀÏ | 2015-12-16 | ÃÑ ÆäÀÌÁö | 11 | ||||||||||||||
ÇÑ±Û Ç¥Áظí | DB ¾ÏÈ£È Á¦Ç° º¸¾È¼º Æò°¡¸¦ À§ÇÑ º¸¾È ¿ä±¸ »çÇ× | ||||||||||||||||
¿µ¹® Ç¥Áظí | Security Requirements for the Security Evaluation of the DB Encryption Products | ||||||||||||||||
ÇÑ±Û ³»¿ë¿ä¾à | º» Ç¥ÁØÀº DB ¾ÏÈ£È Á¦Ç°¿¡¼ Á¦°øÇØ¾ß ÇÏ´Â ¾ÈÀüÇÑ Å° °ü¸®, DB µ¥ÀÌÅÍ ¾Ï¤ýº¹È£È, ½Äº° ¹× ÀÎÁõ, °¨»ç ±â·Ï »ý¼º µîÀÇ º¸¾È ¿ä±¸ »çÇ×À» ±â¼úÇÑ´Ù. | ||||||||||||||||
¿µ¹® ³»¿ë¿ä¾à | The standard describes security requirements provided by DB encryption products such as secure key management, DB data encryption and decryption, identification and authentication, and generation of audit data. | ||||||||||||||||
°ü·Ã IPR È®¾à¼ | Á¢¼öµÈ IPR È®¾à¼ ¾øÀ½ | ||||||||||||||||
ÆóÁöÀÏ | 2024-12-06 | ||||||||||||||||
ÆóÁö»çÀ¯ | ±âŸ - »ê¾÷ ÇöÀå¿¡¼ Ȱ¿ëµÇÁö ¾ÊÀ½ | ||||||||||||||||
°ü·ÃÆÄÀÏ | TTAK.KO-12.0289.pdf | ||||||||||||||||
Ç¥ÁØÀÌ·Â |
|
||||||||||||||||
Ç¥ÁØÀ¯Áöº¸¼öÀÌ·Â |
|