ÀÚ·á°Ë»ö-Ç¥ÁØ

Ȩ > ÀڷḶ´ç > ÀÚ·á°Ë»ö > Ç¥ÁØ

ÀÚ·á °Ë»ö°á°ú

°Ë»öÆäÀÌÁö·Î
Ç¥ÁØÁ¾·ù Á¤º¸Åë½Å´ÜüǥÁØ(TTAS)
Ç¥ÁعøÈ£ [ÆóÁö] TTAK.KO-10.0791 ±¸ Ç¥ÁعøÈ£
Á¦°³Á¤ÀÏ 2014-12-17 ÃÑ ÆäÀÌÁö 42
ÇÑ±Û Ç¥ÁØ¸í ¼­¹ö °¡»óÈ­ ½Ã½ºÅÛ º¸¾È °ü¸® Ç׸ñ ¹× ¼¼ºÎ ±â´É
¿µ¹® Ç¥Áظí Security Elements and Its Function for Server Virtualization System
ÇÑ±Û ³»¿ë¿ä¾à ¼­¹ö °¡»óÈ­ ½Ã½ºÅÛ È¯°æ¿¡¼­ ±âÁ¸ÀÇ ÄÄÇ»ÅÍ ½Ã½ºÅÛ°ú ´Ù¸¥ »õ·Î¿î º¸¾È Ãë¾àÁ¡µéÀÌ ¹ß»ýÇϰí ÀÖ´Ù. ÀÌÀüÀÇ ÀϹÝÀûÀÎ º¸¾È ½Ã½ºÅÛÀ¸·Î´Â ÀûÀýÇÑ ´ëÀÀÀÌ ¾î·Á¿ì¹Ç·Î, ¾ÈÀüÇÑ ¼­¹ö °¡»óÈ­ ¼­ºñ½º¸¦ À§ÇÑ ±â¼úÀû ÇØ°á ¹æ¾ÈÀÌ ½Ã±ÞÇÏ´Ù.
µû¶ó¼­ º» Ç¥ÁØÀº ¼­¹ö °¡»óÈ­ ½Ã½ºÅÛÀÇ º¸¾È ¿ä¼ÒµéÀ» Á¶»ç ¹× ºÐ¼®Çϰí, ¼­¹ö °¡»óÈ­ ½Ã½ºÅÛ¿¡¼­ ¿ä±¸µÇ´Â º¸¾È °ü¸® Ç׸ñ ¹× ¼¼ºÎ ±â´ÉµéÀ» º¸¾È ¿ä±¸ »çÇ× Áß½ÉÀ¸·Î µµÃâÇÑ´Ù.
¿µ¹® ³»¿ë¿ä¾à New vulnerabilities have arisen in server virtualization system environments which have not been encountered in the existing computing system. Because the legacy security system does not interact with the server of the virtualization system properly, there must be a technical solving method for the server virtualization service.

In this standard, the essential security of server virtualization systems are investigated and analyzed; then, the security elements and their functions required for server virtualization systems are deduced based on the security requirements. In addition, the relationship between commercial solutions for server virtualization and the deduced security elements and their functions are presented.
°ü·Ã IPR È®¾à¼­ Á¢¼öµÈ IPR È®¾à¼­ ¾øÀ½
ÆóÁöÀÏ 2023-12-06
ÆóÁö»çÀ¯ ±âŸ(¹ÌȰ¿ë)
´ëü Ç¥ÁØÀÌ Á¸ÀçÇÔ
°ü·ÃÆÄÀÏ  TTAK.KO-10.0791_[1].pdf
Ç¥ÁØÀÌ·Â
Ç¥Áظí Ç¥ÁعøÈ£ Á¦°³Á¤ÀÏ ±¸ºÐ À¯È¿
¿©ºÎ
IPR
È®¾à¼­
ÆÄÀÏ
¼­¹ö °¡»óÈ­ ½Ã½ºÅÛ º¸¾È °ü¸® Ç׸ñ ¹× ¼¼ºÎ ±â´É TTAK.KO-10.0791 2014-12-17 Á¦Á¤ ÆóÁö ¾øÀ½
Ç¥ÁØÀ¯Áöº¸¼öÀÌ·Â
°ËÅäÀÏÀÚ °ËÅä°á°ú °ËÅä³»¿ë
2018-05-31 À¯Áö ¾÷ü µî¿¡¼­ Ç¥ÁØÀÇ È°¿ë¼ºÀÌ À¯ÁöµÇ°í ÀÖÀ½