ÀÚ·á°Ë»ö-Ç¥ÁØ

Ȩ > ÀڷḶ´ç > ÀÚ·á°Ë»ö > Ç¥ÁØ

ÀÚ·á °Ë»ö°á°ú

°Ë»öÆäÀÌÁö·Î
Ç¥ÁØÁ¾·ù Á¤º¸Åë½Å´ÜüǥÁØ(TTAS)
Ç¥ÁعøÈ£ TTAK.KO-12.0335 ±¸ Ç¥ÁعøÈ£
Á¦°³Á¤ÀÏ 2018-12-19 ÃÑ ÆäÀÌÁö 22
ÇÑ±Û Ç¥ÁØ¸í ºÐ»ê¿øÀå±â¼úÀ» È°¿ëÇÑ ¿Â¶óÀÎÅõÇ¥ ¸ðµ¨ ¹× º¸¾È À§Çù ´ëÀÀ
¿µ¹® Ç¥Áظí Security threats to online voting using distributed ledger technology
ÇÑ±Û ³»¿ë¿ä¾à ÀÌ Ç¥ÁØÀº ºÐ»ê¿øÀå±â¼úÀ» È°¿ëÇÑ ¿Â¶óÀÎ ÅõÇ¥ ½Ã½ºÅÛÀÇ ¸ðµ¨À» Á¦½ÃÇÏ°í ÇØ´ç ¸ðµ¨¿¡ ±Ù°ÅÇÑ ÅõÇ¥ ÀýÂ÷ »óÀÇ ÀáÀçÀûÀÎ º¸¾È À§ÇùÀ» Å©°Ô 5°¡Áö ¹üÁÖ(µ¥ÀÌÅÍ ±â¹Ð¼º, µ¥ÀÌÅÍ ¹«°á¼º, ¼­ºñ½º °¡¿ë¼º, ºñÀΰ¡µÈ Á¢±Ù, ¾ÇÀÇÀûÀÎ Çൿ)·Î ºÐ·ùÇÏ¿© ºÐ¼®ÇÏ°í ±×¿¡ µû¶ó º¸¾È À§ÇùÀ» ÃÖ¼ÒÈ­ ÇÒ ¼ö ÀÖ´Â ´ëÀÀ ¹æ¾ÈÀ» Æ÷ÇÔÇÑ´Ù.
¿µ¹® ³»¿ë¿ä¾à The standard proposes a model of an online voting system using the distributed ledger technology, analyzes potential security threats to the voting process based on that model in 5 categories (data confidentiality, data integrity, service availability, unauthorized access, malicious behavior), and includes countermeasures which mitigate security threats.
°ü·Ã IPR È®¾à¼­ Á¢¼öµÈ IPR È®¾à¼­ ¾øÀ½
°ü·ÃÆÄÀÏ    TTAK.KO-12.0335.pdf TTAK.KO-12.0335.pdf
Ç¥ÁØÀÌ·Â
Ç¥Áظí Ç¥ÁعøÈ£ Á¦°³Á¤ÀÏ ±¸ºÐ À¯È¿
¿©ºÎ
IPR
È®¾à¼­
ÆÄÀÏ
ºÐ»ê¿øÀå±â¼úÀ» È°¿ëÇÑ ¿Â¶óÀÎÅõÇ¥ ¸ðµ¨ ¹× º¸¾È À§Çù ´ëÀÀ TTAK.KO-12.0335 2018-12-19 Á¦Á¤ À¯È¿ ¾øÀ½ TTAK.KO-12.0335.pdf