Ç¥ÁØÈ­ Âü¿©¾È³»

TTAÀÇ Ç¥ÁØÇöȲ

Ȩ > Ç¥ÁØÈ­ °³¿ä > TTAÀÇ Ç¥ÁØÇöȲ

Ç¥ÁعøÈ£ TTAK.KO-12.0185 ±¸Ç¥ÁعøÈ£
Á¦°³Á¤ÀÏ 2011-12-21 ÃÑÆäÀÌÁö 21
ÇѱÛÇ¥ÁØ¸í ºñµ¿±â ´ëÈ­Çü À¥ ¼­ºñ½º Á¤º¸º¸È£ ¿ä±¸»çÇ×
¿µ¹®Ç¥Áظí Security Requirement of AJAX Web Service
Çѱ۳»¿ë¿ä¾à ¾ÈÀüÇÑ À¥2.0¼­ºñ½º Á¦°øÀ» À§ÇÑ ºñµ¿±â ´ëÈ­Çü À¥ ÀÀ¿ë ÇÁ·Î±×·¥À̳ª ¸®Ä¡ ÀÎÅÍ³Ý ¾ÖÇø®ÄÉÀ̼ÇÀÌ Àû¿ëµÇ´Â ±â¼úÀº ±âÁ¸ ÆäÀÌÁöÀÇ Ç¥½Ã¿Í ÇൿÀ» ¹æÇØÇÏÁö ¾Ê°í ¹é±×¶ó¿îµå¿¡¼­ ºñµ¿±âÀûÀ¸·Î ¼­¹ö¿¡¼­ µ¥ÀÌÅ͸¦ °Ë»öÇÒ ¼ö ÀÖ´Â »ó¿ëÈ­ ±â¼úÀÌ´Ù. º» Ç¥ÁØÀº AJAX ±â¼ú·Î ÀÎÇÏ¿© ¹ß»ýµÇ´Â À¥ ¼­ºñ½º Á¤º¸ º¸È£ À§ÇùºÐ¼® ¹× ÀÌ¿¡ µû¸¥ Á¤º¸ º¸È£ ¿ä±¸ »çÇ×À» Á¦½ÃÇÏ¿© ÀÌÁ¾ À¥ ºê¶ó¿ìÀú °£ÀÇ Á¤º¸ º¸È£ »óÈ£¿¬µ¿À» À§ÇÑ º¸¾È¿ä±¸ »çÇ×À» Á¤ÀÇÇÑ´Ù.
¿µ¹®³»¿ë¿ä¾à AJAX and RIA are the commercial technologies in order to provide the secure Web 2.0 services on the background no to disturb the traditional web services. This document analyzes the threats presents security requirements for interoperability between hetero-web applications.
±¹Á¦Ç¥ÁØ
°ü·ÃÆÄÀÏ TTAK_[1].KO-12.0185.zip TTAK_[1].KO-12.0185.zip            

ÀÌÀü
ÀüÀÚÃ¥EPUB ¹Ìµð¾î ¿À¹ö·¹ÀÌ 3.0
´ÙÀ½
ÀüÀÚÃ¥EPUB °ø°³ ÄÁÅ×ÀÌ³Ê Æ÷¸Ë 3.0