Ȩ > ÀڷḶ´ç > ÀÚ·á°Ë»ö > Ç¥ÁØ
ÀÚ·á °Ë»ö°á°ú
Ç¥ÁØÁ¾·ù | Á¤º¸Åë½Å´ÜüǥÁØ(TTAS) | ||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Ç¥ÁعøÈ£ | TTAK.KO-12.0335 | ±¸ Ç¥ÁعøÈ£ | |||||||||||||||
Á¦°³Á¤ÀÏ | 2018-12-19 | ÃÑ ÆäÀÌÁö | 22 | ||||||||||||||
ÇÑ±Û Ç¥Áظí | ºÐ»ê¿øÀå±â¼úÀ» È°¿ëÇÑ ¿Â¶óÀÎÅõÇ¥ ¸ðµ¨ ¹× º¸¾È À§Çù ´ëÀÀ | ||||||||||||||||
¿µ¹® Ç¥Áظí | Security threats to online voting using distributed ledger technology | ||||||||||||||||
ÇÑ±Û ³»¿ë¿ä¾à | ÀÌ Ç¥ÁØÀº ºÐ»ê¿øÀå±â¼úÀ» È°¿ëÇÑ ¿Â¶óÀÎ ÅõÇ¥ ½Ã½ºÅÛÀÇ ¸ðµ¨À» Á¦½ÃÇÏ°í ÇØ´ç ¸ðµ¨¿¡ ±Ù°ÅÇÑ ÅõÇ¥ ÀýÂ÷ »óÀÇ ÀáÀçÀûÀÎ º¸¾È À§ÇùÀ» Å©°Ô 5°¡Áö ¹üÁÖ(µ¥ÀÌÅÍ ±â¹Ð¼º, µ¥ÀÌÅÍ ¹«°á¼º, ¼ºñ½º °¡¿ë¼º, ºñÀΰ¡µÈ Á¢±Ù, ¾ÇÀÇÀûÀÎ Çൿ)·Î ºÐ·ùÇÏ¿© ºÐ¼®ÇÏ°í ±×¿¡ µû¶ó º¸¾È À§ÇùÀ» ÃÖ¼ÒÈ ÇÒ ¼ö ÀÖ´Â ´ëÀÀ ¹æ¾ÈÀ» Æ÷ÇÔÇÑ´Ù. | ||||||||||||||||
¿µ¹® ³»¿ë¿ä¾à | The standard proposes a model of an online voting system using the distributed ledger technology, analyzes potential security threats to the voting process based on that model in 5 categories (data confidentiality, data integrity, service availability, unauthorized access, malicious behavior), and includes countermeasures which mitigate security threats. | ||||||||||||||||
°ü·Ã IPR È®¾à¼ | Á¢¼öµÈ IPR È®¾à¼ ¾øÀ½ | ||||||||||||||||
°ü·ÃÆÄÀÏ | TTAK.KO-12.0335.pdf | ||||||||||||||||
Ç¥ÁØÀÌ·Â |
|