Ȩ > Ç¥ÁØÈ °³¿ä > TTAÀÇ Ç¥ÁØÇöȲ
Ç¥ÁعøÈ£ | [ÆóÁö] TTAK.KO-10.0791 | ±¸Ç¥ÁعøÈ£ | |
---|---|---|---|
Á¦°³Á¤ÀÏ | 2014-12-17 | ÃÑÆäÀÌÁö | 42 |
ÇѱÛÇ¥Áظí | ¼¹ö °¡»óÈ ½Ã½ºÅÛ º¸¾È °ü¸® Ç׸ñ ¹× ¼¼ºÎ ±â´É | ||
¿µ¹®Ç¥Áظí | Security Elements and Its Function for Server Virtualization System | ||
Çѱ۳»¿ë¿ä¾à | ¼¹ö °¡»óÈ ½Ã½ºÅÛ È¯°æ¿¡¼ ±âÁ¸ÀÇ ÄÄÇ»ÅÍ ½Ã½ºÅÛ°ú ´Ù¸¥ »õ·Î¿î º¸¾È Ãë¾àÁ¡µéÀÌ ¹ß»ýÇÏ°í ÀÖ´Ù. ÀÌÀüÀÇ ÀϹÝÀûÀÎ º¸¾È ½Ã½ºÅÛÀ¸·Î´Â ÀûÀýÇÑ ´ëÀÀÀÌ ¾î·Á¿ì¹Ç·Î, ¾ÈÀüÇÑ ¼¹ö °¡»óÈ ¼ºñ½º¸¦ À§ÇÑ ±â¼úÀû ÇØ°á ¹æ¾ÈÀÌ ½Ã±ÞÇÏ´Ù.
µû¶ó¼ º» Ç¥ÁØÀº ¼¹ö °¡»óÈ ½Ã½ºÅÛÀÇ º¸¾È ¿ä¼ÒµéÀ» Á¶»ç ¹× ºÐ¼®ÇÏ°í, ¼¹ö °¡»óÈ ½Ã½ºÅÛ¿¡¼ ¿ä±¸µÇ´Â º¸¾È °ü¸® Ç׸ñ ¹× ¼¼ºÎ ±â´ÉµéÀ» º¸¾È ¿ä±¸ »çÇ× Áß½ÉÀ¸·Î µµÃâÇÑ´Ù. |
||
¿µ¹®³»¿ë¿ä¾à | New vulnerabilities have arisen in server virtualization system environments which have not been encountered in the existing computing system. Because the legacy security system does not interact with the server of the virtualization system properly, there must be a technical solving method for the server virtualization service.
In this standard, the essential security of server virtualization systems are investigated and analyzed; then, the security elements and their functions required for server virtualization systems are deduced based on the security requirements. In addition, the relationship between commercial solutions for server virtualization and the deduced security elements and their functions are presented. |
||
±¹Á¦Ç¥ÁØ | |||
°ü·ÃÆÄÀÏ | TTAK.KO-10.0791_[1].pdf |