Ç¥ÁØÈ­ Âü¿©¾È³»

TTAÀÇ Ç¥ÁØÇöȲ

Ȩ > Ç¥ÁØÈ­ °³¿ä > TTAÀÇ Ç¥ÁØÇöȲ

Ç¥ÁعøÈ£ TTAE.IT-Y.2720-Sup.12 ±¸Ç¥ÁعøÈ£
Á¦°³Á¤ÀÏ 2013-12-18 ÃÑÆäÀÌÁö 49
ÇѱÛÇ¥Áظí NGN ¾ÆÀ̵§Æ¼Æ¼ °ü¸® ¸ÞÄ¿´ÏÁò ºÎ¼Ó¼­
¿µ¹®Ç¥Áظí Supplement on NGN Identity Management Mechanisms
Çѱ۳»¿ë¿ä¾à º» Ç¥ÁØÀº ¶óÀÌÇÁ »çÀÌŬ °ü¸®, ÀÎÁõ ¹× ÀÎÁõº¸Àå, ¾ÆÀ̵§Æ¼Æ¼ °ü¸® Åë½Å°ú Á¤º¸±³È¯, ¾ÆÀ̵§Æ¼Æ¼ Á¤º¸ Á¢¼ÓÁ¦¾î ±×¸®°í ÅëÇÕÀÎÁõ µîÀÇ ¾ÆÀ̵§Æ¼Æ¼ °ü¸® ¸ÞÄ¿´ÏÁòÀ» ±â¼úÇÑ´Ù.
¿µ¹®³»¿ë¿ä¾à This supplement provides a description of some example mechanisms that can be used to meet certain identity management(IdM) requirements and deployment needs of NGN. This supplement describes mechanisms and procedures that support IdM functions.
±¹Á¦Ç¥ÁØ
°ü·ÃÆÄÀÏ TTAE.IT-Y.2720-Sup.12.pdf TTAE.IT-Y.2720-Sup.12.pdf            

ÀÌÀü
IEEE 802.3 ÀÌ´õ³Ý Ç¥ÁØ-°³Á¤1:È®ÀåµÈ ÀÌ´õ³Ý ¼öµ¿ ±¤°¡ÀÔÀÚ¸ÁÀ» À§ÇÑ ¹°¸®°èÃþ ¹× °ü¸® ÆĶó¹ÌÅÍ (IEEE Std 802.3bk-2013)
´ÙÀ½
°æ·Î°è»ê¿ä¼Ò ÇÁ·ÎÅäÄÝÀÇ ¿ä±¸»çÇ×