Ç¥ÁØÈ­ Âü¿©¾È³»

TTAÀÇ Ç¥ÁØÇöȲ

Ȩ > Ç¥ÁØÈ­ °³¿ä > TTAÀÇ Ç¥ÁØÇöȲ

Ç¥ÁعøÈ£ [ÆóÁö] TTAK.KO-10.0791 ±¸Ç¥ÁعøÈ£
Á¦°³Á¤ÀÏ 2014-12-17 ÃÑÆäÀÌÁö 42
ÇѱÛÇ¥ÁØ¸í ¼­¹ö °¡»óÈ­ ½Ã½ºÅÛ º¸¾È °ü¸® Ç׸ñ ¹× ¼¼ºÎ ±â´É
¿µ¹®Ç¥Áظí Security Elements and Its Function for Server Virtualization System
Çѱ۳»¿ë¿ä¾à ¼­¹ö °¡»óÈ­ ½Ã½ºÅÛ È¯°æ¿¡¼­ ±âÁ¸ÀÇ ÄÄÇ»ÅÍ ½Ã½ºÅÛ°ú ´Ù¸¥ »õ·Î¿î º¸¾È Ãë¾àÁ¡µéÀÌ ¹ß»ýÇÏ°í ÀÖ´Ù. ÀÌÀüÀÇ ÀϹÝÀûÀÎ º¸¾È ½Ã½ºÅÛÀ¸·Î´Â ÀûÀýÇÑ ´ëÀÀÀÌ ¾î·Á¿ì¹Ç·Î, ¾ÈÀüÇÑ ¼­¹ö °¡»óÈ­ ¼­ºñ½º¸¦ À§ÇÑ ±â¼úÀû ÇØ°á ¹æ¾ÈÀÌ ½Ã±ÞÇÏ´Ù.
µû¶ó¼­ º» Ç¥ÁØÀº ¼­¹ö °¡»óÈ­ ½Ã½ºÅÛÀÇ º¸¾È ¿ä¼ÒµéÀ» Á¶»ç ¹× ºÐ¼®ÇÏ°í, ¼­¹ö °¡»óÈ­ ½Ã½ºÅÛ¿¡¼­ ¿ä±¸µÇ´Â º¸¾È °ü¸® Ç׸ñ ¹× ¼¼ºÎ ±â´ÉµéÀ» º¸¾È ¿ä±¸ »çÇ× Áß½ÉÀ¸·Î µµÃâÇÑ´Ù.
¿µ¹®³»¿ë¿ä¾à New vulnerabilities have arisen in server virtualization system environments which have not been encountered in the existing computing system. Because the legacy security system does not interact with the server of the virtualization system properly, there must be a technical solving method for the server virtualization service.

In this standard, the essential security of server virtualization systems are investigated and analyzed; then, the security elements and their functions required for server virtualization systems are deduced based on the security requirements. In addition, the relationship between commercial solutions for server virtualization and the deduced security elements and their functions are presented.
±¹Á¦Ç¥ÁØ
°ü·ÃÆÄÀÏ TTAK.KO-10.0791_[1].pdf

ÀÌÀü
ÁÖÇà»óȲ ÀÎÁö ¼ÒÇÁÆ®¿þ¾î Æò°¡¸¦ À§ÇÑ ¿ä±¸»çÇ× ¹× ½ÃÇè ÀýÂ÷
´ÙÀ½
»ç¿ëÀÚ À§Ä¡ ±â¹Ý ´ì³» ¿¡³ÊÁö °ü¸® ¼­ºñ½º