Ç¥ÁØÈ­ Âü¿©¾È³»

TTAÀÇ Ç¥ÁØÇöȲ

Ȩ > Ç¥ÁØÈ­ °³¿ä > TTAÀÇ Ç¥ÁØÇöȲ

Ç¥ÁعøÈ£ TTAK.KO-12.0343 ±¸Ç¥ÁعøÈ£
Á¦°³Á¤ÀÏ 2018-12-19 ÃÑÆäÀÌÁö 21
ÇѱÛÇ¥ÁØ¸í ºñ½Äº° 󸮸¦ À§ÇÑ ¼ÒÇÁÆ®¿þ¾î ÇÁ·¹ÀÓ¿öÅ©
¿µ¹®Ç¥Áظí Software Framework for De-identification
Çѱ۳»¿ë¿ä¾à ÀÌ Ç¥ÁØÀÇ ¸ñÀûÀº ºñ½Äº° ó¸® ¼ÒÇÁÆ®¿þ¾îÀÇ ±â´ÉÀ» Á¤ÀÇÇÏ°í, ºòµ¥ÀÌÅÍ È°¿ë ½Ã °³ÀÎÁ¤º¸¸¦ º¸È£Çϱâ À§ÇØ ºñ½Äº° ó¸® Àü¿ë ¼ÒÇÁÆ®¿þ¾î¸¦ µµÀÔÇÒ °æ¿ì ÀûÇÕÇÑ ±â´ÉÀ» °¡Áø ¼ÒÇÁÆ®¿þ¾î¸¦ ½Äº°ÇÏ´Â µ¥ À̸¦ ÂüÁ¶ÇÒ ¼ö ÀÖµµ·Ï ÇÏ´Â °ÍÀÌ´Ù. ÀÌ Ç¥ÁØÀº ºòµ¥ÀÌÅÍ ºÐ¼®¡¤È°¿ë ½Ã, ºòµ¥ÀÌÅÍ ³»ÀÇ °³ÀÎÁ¤º¸¸¦ º¸È£Çϱâ À§ÇÑ ºñ½Äº° ó¸® ¼ÒÇÁÆ®¿þ¾îÀÇ ±¸Á¶¿Í °èÃþº° ¿ä±¸»çÇ× ¹× ±â´ÉÀ» Á¤ÀÇÇÑ´Ù.
¿µ¹®³»¿ë¿ä¾à The standard can be referred to adopt de-identification software for personal data protection when using big data. The standard defines architecture, requirements and functions of de-identification software by layer.
±¹Á¦Ç¥ÁØ
°ü·ÃÆÄÀÏ TTAK.KO-12.0343.pdf TTAK.KO-12.0343.pdf            

ÀÌÀü
È¿°úÀûÀÎ Á¤º¸º¸È£ °Å¹ö³Í½º¸¦ À§ÇÑ ±ÝÀ¶º¸¾È Á¶Á÷ü°è Áöħ
´ÙÀ½
oneM2M - Security (±â¼úº¸°í¼­) v2.0.1