Ç¥ÁØÈ­ Âü¿©¾È³»

TTAÀÇ Ç¥ÁØÇöȲ

Ȩ > Ç¥ÁØÈ­ °³¿ä > TTAÀÇ Ç¥ÁØÇöȲ

Ç¥ÁعøÈ£ [ÆóÁö] TTAK.KO-12.0121 ±¸Ç¥ÁعøÈ£
Á¦°³Á¤ÀÏ 2009-12-22 ÃÑÆäÀÌÁö 14
ÇѱÛÇ¥ÁØ¸í ¸ð¹ÙÀÏ ´Ü¸» Áß¿äÁ¤º¸ º¯ÇüÀ¯Ãâ¹æÁö ½Ã½ºÅÛ ±¸Á¶
¿µ¹®Ç¥Áظí The System Architecture for Preventing the Leakage of Modified Sensitive-Information in Mobile Device
Çѱ۳»¿ë¿ä¾à Áß¿äÁ¤º¸ À¯Ãâ¹æÁö ½Ã½ºÅÛÀº ¸ð¹ÙÀÏ ´Ü¸» »ç¿ëÀÚ°¡ ¿ÜºÎ·Î À¯ÃâµÇÁö ¸»¾Æ¾ß ÇÒ Áß¿äÁ¤º¸°¡ Æ÷ÇÔµÈ ÆÄÀÏÀ» ÁöÁ¤Çϸé ÁöÁ¤µÈ ÆÄÀÏ¿¡ ´ëÇØ Å½Áö¸¦ À§ÇÑ ½Ã±×´ÏÃĸ¦ ÃßÃâÇÏ°í, ÁöÁ¤µÈ ÆÄÀÏÀÇ ¿ÜºÎ À¯Ã⠽õµ ½Ã ÃßÃâµÈ ½Ã±×´ÏÃĸ¦ ÀÌ¿ëÇÏ¿© ŽÁö ¹× Â÷´ÜÇÏ´Â ½Ã½ºÅÛ ÀÌ´Ù. ±×·¯³ª, Áß¿äÁ¤º¸°¡ Æ÷ÇÔµÈ ÆÄÀÏÀÌ ¾Ïȣȭ, ¾ÐÃà ¹× ºÎºÐº¹»ç¸¦ ÅëÇØ º¯ÇüµÇ¸é ±âÁ¸¿¡ ÃßÃâµÈ ½Ã±×´ÏÃĸ¦ ÅëÇØ Å½Áö ¹× Â÷´ÜÇÒ ¼ö ¾ø´Â Á¦¾à»çÇ×ÀÌ Á¸ÀçÇÑ´Ù. µû¶ó¼­ º» Ç¥ÁØ¿¡¼­´Â ±âÁ¸ Áß¿äÁ¤º¸ À¯Ãâ¹æÁö ½Ã½ºÅÛÀ» º¸¿ÏÇÏ¿©, Áß¿äÁ¤º¸°¡ Æ÷ÇÔµÈ ÆÄÀÏÀÇ º¯Çü¿¡ ´ëÇؼ­µµ À¯Ã⠽à ŽÁö ¹× Â÷´ÜÇÒ ¼ö ÀÖ´Â ½Ã½ºÅÛ ±¸Á¶¸¦ Á¦½ÃÇÑ´Ù.
¿µ¹®³»¿ë¿ä¾à A mobile device user can send a file or an email with an attachment to another user connected to the network. In many instances, this data transfer occurs over the wireless Internet. Often, this content may contain sensitive information (i.e., business plans, financial data, product drawings, trade secrets, etc.) that should not be sent to the wrong recipient. The owners of the data have an interest in preventing the leakage of sensitive data over wireless Internet. In recent years, numerous studies have attempted to prevent leakage of file itself including sensitive data. Therefore, this standard specifies the leakage prevention of modified file including sensitive data.
±¹Á¦Ç¥ÁØ
°ü·ÃÆÄÀÏ TTAK.KO-12.0121_ed15.pdf

ÀÌÀü
oneM2M - Management Enablement (BBF) v2.2.1
´ÙÀ½
oneM2M - CoAP Protocol Binding v2.6.1