ÀÚ·á°Ë»ö-Ç¥ÁØ

Ȩ > ÀڷḶ´ç > ÀÚ·á°Ë»ö > Ç¥ÁØ

ÀÚ·á °Ë»ö°á°ú

°Ë»öÆäÀÌÁö·Î
Ç¥ÁØÁ¾·ù Á¤º¸Åë½Å´ÜüǥÁØ(TTAS)
Ç¥ÁعøÈ£ TTAK.KO-12.0185 ±¸ Ç¥ÁعøÈ£
Á¦°³Á¤ÀÏ 2011-12-21 ÃÑ ÆäÀÌÁö 21
ÇÑ±Û Ç¥ÁØ¸í ºñµ¿±â ´ëÈ­Çü À¥ ¼­ºñ½º Á¤º¸º¸È£ ¿ä±¸»çÇ×
¿µ¹® Ç¥Áظí Security Requirement of AJAX Web Service
ÇÑ±Û ³»¿ë¿ä¾à ¾ÈÀüÇÑ À¥2.0¼­ºñ½º Á¦°øÀ» À§ÇÑ ºñµ¿±â ´ëÈ­Çü À¥ ÀÀ¿ë ÇÁ·Î±×·¥À̳ª ¸®Ä¡ ÀÎÅÍ³Ý ¾ÖÇø®ÄÉÀ̼ÇÀÌ Àû¿ëµÇ´Â ±â¼úÀº ±âÁ¸ ÆäÀÌÁöÀÇ Ç¥½Ã¿Í ÇൿÀ» ¹æÇØÇÏÁö ¾Ê°í ¹é±×¶ó¿îµå¿¡¼­ ºñµ¿±âÀûÀ¸·Î ¼­¹ö¿¡¼­ µ¥ÀÌÅ͸¦ °Ë»öÇÒ ¼ö ÀÖ´Â »ó¿ëÈ­ ±â¼úÀÌ´Ù. º» Ç¥ÁØÀº AJAX ±â¼ú·Î ÀÎÇÏ¿© ¹ß»ýµÇ´Â À¥ ¼­ºñ½º Á¤º¸ º¸È£ À§ÇùºÐ¼® ¹× ÀÌ¿¡ µû¸¥ Á¤º¸ º¸È£ ¿ä±¸ »çÇ×À» Á¦½ÃÇÏ¿© ÀÌÁ¾ À¥ ºê¶ó¿ìÀú °£ÀÇ Á¤º¸ º¸È£ »óÈ£¿¬µ¿À» À§ÇÑ º¸¾È¿ä±¸ »çÇ×À» Á¤ÀÇÇÑ´Ù.
¿µ¹® ³»¿ë¿ä¾à AJAX and RIA are the commercial technologies in order to provide the secure Web 2.0 services on the background no to disturb the traditional web services. This document analyzes the threats presents security requirements for interoperability between hetero-web applications.
°ü·Ã IPR È®¾à¼­ Á¢¼öµÈ IPR È®¾à¼­ ¾øÀ½
°ü·ÃÆÄÀÏ    TTAK_[1].KO-12.0185.zip TTAK_[1].KO-12.0185.zip
Ç¥ÁØÀÌ·Â
Ç¥Áظí Ç¥ÁعøÈ£ Á¦°³Á¤ÀÏ ±¸ºÐ À¯È¿
¿©ºÎ
IPR
È®¾à¼­
ÆÄÀÏ
ºñµ¿±â ´ëÈ­Çü À¥ ¼­ºñ½º Á¤º¸º¸È£ ¿ä±¸»çÇ× TTAK.KO-12.0185 2011-12-21 Á¦Á¤ À¯È¿ ¾øÀ½ TTAK_[1].KO-12.0185.zip
Ç¥ÁØÀ¯Áöº¸¼öÀÌ·Â
°ËÅäÀÏÀÚ °ËÅä°á°ú °ËÅä³»¿ë
2015-06-03 À¯Áö -