Ç¥ÁØÈ­ Âü¿©¾È³»

TTAÀÇ Ç¥ÁØÇöȲ

Ȩ > Ç¥ÁØÈ­ °³¿ä > TTAÀÇ Ç¥ÁØÇöȲ

Ç¥ÁعøÈ£ [ÆóÁö] TTAS.KO-12.0066 ±¸Ç¥ÁعøÈ£
Á¦°³Á¤ÀÏ 2007-12-26 ÃÑÆäÀÌÁö 28
ÇѱÛÇ¥Áظí Ŭ·¯½ºÅͽýºÅÛÀÇ ¹«°á¼º Á¦°ø ÇÁ·¹ÀÓ¿öÅ©
¿µ¹®Ç¥Áظí The Framework for Providing the Integrity on Cluster System
Çѱ۳»¿ë¿ä¾à ÁÖ¿ä ³»¿ëÀ¸·Î´Â Ŭ·¯½ºÅͽýºÅÛ ¿î¿µ¿¡ ÀÖ¾î ¹«°á¼ºÀ» ħÇØÇÒ ¼ö ÀÖ´Â À§Çù ¿ä¼Ò¿¡
´ëÇØ ºÐ¼®ÇÏ°í, ÀÌ¿¡ ´ëÀÀÇϱâ À§ÇÑ º¸¾È ¿ä±¸»çÇ×À» µµÃâÇÑ´Ù. ¶ÇÇÑ Å¬·¯½ºÅͽýºÅÛÀÇ
¹«°á¼ºÀ» º¸ÀåÇÒ ¼ö ÀÖ´Â ±¸Á¶¸¦ Á¤ÀÇÇÏ°í, Á¤ÀÇÇÑ Å¬·¯½ºÅͽýºÅÛÀ» ±¸¼ºÇÏ´Â °¢ ³ëµå
¿î¿µ¿¡ ´ëÇÑ ¹«°á¼º Á¦°ø ÀýÂ÷¿Í Ŭ·¯½ºÅÍ ¿î¿ë¿¡ ÇÊ¿äÇÑ ¼ÒÇÁÆ®¿þ¾î ºÐ¹è °úÁ¤ÀÇ ¹«°á
¼º Á¦°ø ÀýÂ÷¸¦ ±¸ºÐÇÏ¿© ¼³¸íÇÑ´Ù. Ŭ·¯½ºÅͽýºÅÛÀ» ±¸¼ºÇÏ´Â °¢ ³ëµå ¿î¿µ¿¡ ´ëÇÑ ¹«
°á¼ºÀº ³ëµåÀÇ ¿î¿µÃ¼Á¦, ³ëµå »ó¿¡ ¿î¿ëµÇ´Â ÇÁ·Î±×·¥, ±×¸®°í Áß¿ä µ¥ÀÌÅÍ¿¡ ´ëÇØ Á¦
°øµÇ¸ç, ÇÁ·Î±×·¥ ºÐ¹è °úÁ¤ÀÇ ¹«°á¼º Á¦°øÀº Ŭ·¯½ºÅÍ ³ëµå·Î ºÐ¹èµÇ´Â ÇÁ·Î±×·¥¿¡ ´ë
ÇØ Á¦°øµÈ´Ù.
¿µ¹®³»¿ë¿ä¾à At first, the threats that can infect the cluster system are explained and then the
method of providing the integrity against each threat will be introduced. The methods
of providing the integrity are explained with two parts. One is for the cluster node
integrity and the other is for the provisioning of program within cluster system. And
integrity for each cluster node consists of three parts: operating system including boot
sequence, program running on the cluster system and data managed securely.
Integrity for provisioning of program is applied to the program that is distributed to
each cluster node.
±¹Á¦Ç¥ÁØ
°ü·ÃÆÄÀÏ TTAS.KO-12.0066.pdf

ÀÌÀü
°øµ¿ÁÖÅÃÀÇ ÃÊ°í¼ÓÁ¤º¸Åë½Å¼³ºñ ¼³Ä¡°ø°£ ±â¼úÇ¥ÁØ
´ÙÀ½
À̵¿ÀüÈ­¿ë ¹«¼±¼³ºñÀÇ RF Ç¥ÁØÃøÁ¤¹ý