Ç¥ÁØÈ­ Âü¿©¾È³»

TTAÀÇ Ç¥ÁØÇöȲ

Ȩ > Ç¥ÁØÈ­ °³¿ä > TTAÀÇ Ç¥ÁØÇöȲ

Ç¥ÁعøÈ£ TTAK.KO-12.0311 ±¸Ç¥ÁعøÈ£
Á¦°³Á¤ÀÏ 2017-12-13 ÃÑÆäÀÌÁö 19
ÇѱÛÇ¥Áظí IoT ±â±â °£ Á¢±ÙÁ¦¾î ¸ÞÄ¿´ÏÁò ¹× È°¿ë ¿¹
¿µ¹®Ç¥Áظí IoT Device Access Control Mechanism and Use Case
Çѱ۳»¿ë¿ä¾à ÁÖ¿ä ³»¿ëÀ¸·Î´Â IoT ȯ°æ¿¡¼­ Á¢±ÙÁ¦¾î¸¦ ÇÏ°íÀÚ ÇÒ ¶§ ÇÊ¿ä·Î ÇÏ´Â Á¢±ÙÁ¦¾îÀÇ ÄÄÆ÷³ÍÆ®µéÀ» ±â¼úÇÏ°í, °¢ ÄÄÆ÷³ÍÆ®ÀÇ À§Ä¡¿¡ µû¸¥ Á¢±ÙÁ¦¾î °úÁ¤À» ±â¼úÇÑ´Ù. ¶ÇÇÑ Á¢±ÙÁ¦¾î °áÁ¤ °úÁ¤¿¡¼­ °í·ÁÇØ¾ß ÇÒ ¿ä¼Òµé°ú, Á¢±Ù ¿äû ¹æ¹ý, Á¢±Ù °áÁ¤ ¾Ë°í¸®Áò¿¡ ´ëÇØ ±â¼úÇÑ´Ù. ¸¶Áö¸·À¸·Î, ±â¼úÇÑ Á¢±ÙÁ¦¾î ¸ÞÄ¿´ÏÁòÀÌ È¨ IoT ȯ°æ¿¡ ¾î¶»°Ô Àû¿ëµÇ´ÂÁö ¿¹¸¦ µé¾î ¼³¸íÇÑ´Ù.
¿µ¹®³»¿ë¿ä¾à The main content of the standard is the component of access control and the process of the access control in home IoT environment. Furthermore, It is described with the factors to be considered in the access control decision process, access request method, access decision algorithm. Finally, it includes the application of access control in home IoT environment.
±¹Á¦Ç¥ÁØ
°ü·ÃÆÄÀÏ TTAK.KO-12.0311.pdf TTAK.KO-12.0311.pdf            

ÀÌÀü
oneM2M - Management Enablement (BBF) v2.2.1
´ÙÀ½
oneM2M - CoAP Protocol Binding v2.6.1