Á¤º¸Ã³¸®ÇÐȸ ³í¹®Áö C
Current Result Document : 5 / 5
ÇѱÛÁ¦¸ñ(Korean Title) |
¸ð¹ÙÀÏ µð¹ÙÀ̽ºÀÇ ·Î¹ÖÀ» À§ÇÑ »ç¿ëÀÚ ÀÎÁõ¿¡ °üÇÑ ¿¬±¸ |
¿µ¹®Á¦¸ñ(English Title) |
A Study on User Authentication for Roaming in Mobile Device |
ÀúÀÚ(Author) |
°¼ÀÏ
¹ÚÃá½Ä
ÀÌÀÓ¿µ
Seo-il kang
Choon-sik Park
Im-yeong Lee
|
¿ø¹®¼ö·Ïó(Citation) |
VOL 15-C NO. 05 PP. 0343 ~ 0350 (2008. 10) |
Çѱ۳»¿ë (Korean Abstract) |
À¯ºñÄõÅͽº ȯ°æ¿¡¼ »ç¿ëÀÚ´Â ´Ù¾çÇÑ µð¹ÙÀ̽º¸¦ ÀÌ¿ëÇÏ¿© ¼ºñ½º ¹× À̵¿¼ºÀ» Á¦°ø ¹Þ´Â´Ù. »ç¿ëÀÚ°¡ ÀÌ¿ëÇÏ´Â ³×Æ®¿öÅ©´Â Ȩ ³×Æ®¿öÅ©(»ç¿ëÀÚ°¡ ÀÎÁõ ¼¹ö¸¦ ÅëÇØ ¼ÓÇØ ÀÖ´Â ³×Æ®¿öÅ©)¿Í ¿ÜºÎ ³×Æ®¿öÅ©(»ç¿ëÀÚ°¡ À̵¿ ȤÀº ¿ÜºÎ ÀÎÁõ ¼¹ö°¡ Á¸ÀçÇÏ´Â ³×Æ®¿öÅ©)·Î ³ª´ ¼ö ÀÖÀ¸¸ç, »ç¿ëÀÚ´Â ¸ð¹ÙÀÏ µð¹ÙÀ̽º ¹× ¿ÜºÎ ³×Æ®¿öÅ©ÀÇ µð¹ÙÀ̽º¸¦ ÀÌ¿ëÇÒ ¼ö ÀÖ´Ù. º» ³í¹®Àº »ç¿ëÀÚ°¡ ¸ð¹ÙÀÏ µð¹ÙÀ̽º¸¦ °¡Áö°í ¿ÜºÎ ³×Æ®¿öÅ©¿¡¼ ¼ºñ½º¿¡ Á¢±Ù ÇÏ¿´À» ¶§ ¾ÈÀüÇÏ°Ô °³ÀÎ Á¤º¸(¾ÏÈ£È Å° µî)¸¦ ·Î¹ÖÇÏ¿© ¼ºñ½º¸¦ Á¦°øÇÏ´Â ¹æ¾È°ú ¿ÜºÎ ³×Æ®¿öÅ©ÀÇ µð¹ÙÀ̽º¸¦ ÀÌ¿ëÇÏ¿© Ȩ ³×Æ®¿öÅ©¿¡ Á¢±ÙÇÏ´Â ¹æ¾ÈÀ» Á¦½ÃÇÑ´Ù. º» Á¦¾È ¹æ½ÄÀ» È°¿ë ÇÑ´Ù¸é ¿ÜºÎ ³×Æ®¿öÅ©¿¡¼µµ ¾ÈÀüÇÏ°Ô ¼ºñ½º¸¦ Á¦°ø ¹ÞÀ» ¼ö ÀÖ°Ô ·Î¹ÖÀ» Á¦°øÇÒ ¼ö ÀÖ´Ù.
|
¿µ¹®³»¿ë (English Abstract) |
In ubiquitous environment, a user has been provided with service and mobility using various devices. The users¡¯ network can be divided into a home network (a user belongs to the network through an authentication server) and an external network (when a user moves or external authentication server is). Users can use a mobile device or a device at an external network. In this paper, when a user has access to a service in an external network with a mobile device, there is a skim that a service is securely provided by roaming private information (encryption key etc¡¦) and a skim which gives access to a home network using a device in an external network. If you use these skims, roaming is provided in order that you can use a secure service in an external network.
|
Å°¿öµå(Keyword) |
·Î¹Ö
ÀÎÁõ
¸ð¹ÙÀÏ µð¹ÙÀ̽º
º¸¾È ÇÁ·ÎÅäÄÝ
Roaming
Authentication
Mobile Device
Security protocol
|
ÆÄÀÏ÷ºÎ |
PDF ´Ù¿î·Îµå
|