• Àüü
  • ÀüÀÚ/Àü±â
  • Åë½Å
  • ÄÄÇ»ÅÍ
´Ý±â

»çÀÌÆ®¸Ê

Loading..

Please wait....

Çмú´ëȸ ÇÁ·Î½Ãµù

Ȩ Ȩ > ¿¬±¸¹®Çå > Çмú´ëȸ ÇÁ·Î½Ãµù > Çѱ¹Á¤º¸Åë½ÅÇÐȸ Çмú´ëȸ > 2014³â Ãß°èÇмú´ëȸ

2014³â Ãß°èÇмú´ëȸ

Current Result Document :

ÇѱÛÁ¦¸ñ(Korean Title) S/W °³¹ß ºÐ¼® ´Ü°è¿¡¼­ ½Äº° ¹× ÀÎÁõ
¿µ¹®Á¦¸ñ(English Title) Legal System and Regulation Analysis by S/W Development Security
ÀúÀÚ(Author) ½Å¼ºÀ±   Áøµ¿¼ö   ½Å±¤¼º   ÀÌÇöâ   À̾ç¿ø   Seong-Yoon Shin   Dong-Soo Jin   Kwong-Seong Shin   Hyun-Chang Lee   Yang-Won Lee  
¿ø¹®¼ö·Ïó(Citation) VOL 18 NO. 02 PP. 0211 ~ 0212 (2014. 10)
Çѱ۳»¿ë
(Korean Abstract)
º» ³í¹®¿¡¼­´Â ºÐ¼® ´Ü°èÀÇ ÀÌ·¯ÇÑ ½Äº° ¹× ÀÎÁõÀÇ º¸¾È¿ä°ÇÀ» Á¦½ÃÇÑ´Ù. ù°, °¢ÀÚ °¡Áö°í ÀÖ´Â °³º° ID´Â À¯ÀÏÇÏ°Ô ½Äº°µÇ¾î¾ß ÇÑ´Ù´Â °ÍÀÌ´Ù. µÑ°, Æнº¿öµå´Â ±æÀÌÁ¦ÇÑ ¹× Ç¥ÁØ Á¶ÇÕÀ» Àû¿ëÇØ¾ß Çϸç, ÁÖ±âÀûÀ¸·Î º¯°æÇØ Áà¾ß ÇÑ´Ù´Â °ÍÀÌ´Ù. ¼Â°, ID/PW ÀÌ¿ÜÀÇ º¸´Ù °­È­µÈ ÀÎÁõ ¹æ½ÄÀ» Á¦°øÇØ¾ß Çϸç, ÀÎÁõ ÇÁ·Î¼¼½º´Â Á¤ÀÇµÈ º¸¾È ¿ä°ÇÀ» ¸¸Á·ÇØ¾ß ÇÑ´Ù.
¿µ¹®³»¿ë
(English Abstract)
This paper is to suggest the security requirements for identification and authentication in analysis step. Firstly, individual ID should be uniquely identified. The second element is to apply the length limitations, combination and periodic changes of passwords. The third should require the more reinforced authentication methods besides ID and passwords and satisfy the defined security elements on authentication process.
Å°¿öµå(Keyword) °¨»ç·Î±×(Audit Log)   Á¢¼Ó ·Î±×(Access Log)   Áß¿ä Á¤º¸(Major Information)  
ÆÄÀÏ÷ºÎ PDF ´Ù¿î·Îµå