• Àüü
  • ÀüÀÚ/Àü±â
  • Åë½Å
  • ÄÄÇ»ÅÍ
´Ý±â

»çÀÌÆ®¸Ê

Loading..

Please wait....

Çмú´ëȸ ÇÁ·Î½Ãµù

Ȩ Ȩ > ¿¬±¸¹®Çå > Çмú´ëȸ ÇÁ·Î½Ãµù > Çѱ¹ÀÎÅͳÝÁ¤º¸ÇÐȸ Çмú¹ßÇ¥´ëȸ > 2007³âµµ ÀÎÅͳÝÁ¤º¸ÇÐȸ Ãá°èÇмú¹ßÇ¥´ëȸ

2007³âµµ ÀÎÅͳÝÁ¤º¸ÇÐȸ Ãá°èÇмú¹ßÇ¥´ëȸ

Current Result Document : 5 / 5

ÇѱÛÁ¦¸ñ(Korean Title) UCC ȯ°æ ³» Á¤º¸º¸È£ ¸ÞÄ¿´ÏÁò Àû¿ë¹æ¾È
¿µ¹®Á¦¸ñ(English Title) Applied to Information Security Mechanism in UCC Environment
ÀúÀÚ(Author) È«½ÂÇÊ   ±è°æÁø   ±èÇý¶ó   Sengphil Hong   Kyongjin Kim   Hyeri Kim  
¿ø¹®¼ö·Ïó(Citation) VOL 08 NO. 01 PP. 0085 ~ 0089 (2007. 06)
Çѱ۳»¿ë
(Korean Abstract)
2006³â ÀÎÅͳݠ¾÷°èÀÇ ÃÖ°íÀÇ È­µÎ´Â UCC¿Í µ¿¿µ»óÀ̶ó Çصµ °ú¾ðÀÌ ¾Æ´Ò °ÍÀÌ´Ù. Á¤º¸Åë½Å ±â±â¿Í À¥ 2.0ÀÇ ¹ß´Þ·Î Àü¹®°¡ Áý´ÜÀÌ ¾Æ´Ñ ÀϹÝÀε鵵 ¼Õ½±°Ô µ¥ÀÌÅ͸¦ »ý»êÇس»°í È®»ê½Ãų ¼ö ÀÖ°Ô µÇ¾ú±â ¶§¹®ÀÌ´Ù. ÇÏÁö¸¸ Á¤º¸ÀÇ ¿ª°øÇРÃø¸é¿¡¼­ º¸¸é À¯ÇØ UCC µ¿¿µ»óµµ ½±°Ô À¯ÅëµÉ ¼ö ÀÖ°í, ¶ÇÇÑ UCC µ¿¿µ»óÀº ¾Æ¹«·± Á¦Àç¾øÀÌ ºÒ¹ýÀûÀ¸·Î º¹»ç µÉ ¼ö ÀÖ¾î ÀúÀ۱ǠħÇØÀÇ ¹®Á¦µµ µÇ°í ÀÖ´Ù.
 º» ³í¹®¿¡¼­´Â ¾Õ¼­ Á¦½ÃÇÑ ¹®Á¦Á¡ÀÇ ÇØ°á¹æ¾ÈÀ¸·Î »õ·Î¿î UCC º¸¾È ¸ðµ¨À» ¼¼ °¡Áö ÁÖ¿ä ¸ÞÄ¿´ÏÁò (»ç¿ëÀÚ ÀÎÁõ ¸ÞÄ¿´ÏÁò, µ¿¿µ»ó °ËÁõ ¸ÞÄ¿´ÏÁò, ÀúÀ۱Ǡº¸È£ ¸ÞÄ¿´ÏÁò)À¸·Î ±¸¼ºÇÏ¿´°í °ü·Ã ¿¹Á¦¸¦ ÅëÇÏ¿© È°¿ë¹æ¾ÈÀ» Á¦½ÃÇÏ¿´´Ù.
¿µ¹®³»¿ë
(English Abstract)
Å°¿öµå(Keyword)
ÆÄÀÏ÷ºÎ PDF ´Ù¿î·Îµå