Ȩ > Ç¥ÁØÈ °³¿ä > TTAÀÇ Ç¥ÁØÇöȲ
Ç¥ÁعøÈ£ | [ÆóÁö] TTAS.KO-12.0066 | ±¸Ç¥ÁعøÈ£ | |
---|---|---|---|
Á¦°³Á¤ÀÏ | 2007-12-26 | ÃÑÆäÀÌÁö | 28 |
ÇѱÛÇ¥Áظí | Ŭ·¯½ºÅͽýºÅÛÀÇ ¹«°á¼º Á¦°ø ÇÁ·¹ÀÓ¿öÅ© | ||
¿µ¹®Ç¥Áظí | The Framework for Providing the Integrity on Cluster System | ||
Çѱ۳»¿ë¿ä¾à | ÁÖ¿ä ³»¿ëÀ¸·Î´Â Ŭ·¯½ºÅͽýºÅÛ ¿î¿µ¿¡ ÀÖ¾î ¹«°á¼ºÀ» ħÇØÇÒ ¼ö ÀÖ´Â À§Çù ¿ä¼Ò¿¡
´ëÇØ ºÐ¼®ÇÏ°í, ÀÌ¿¡ ´ëÀÀÇϱâ À§ÇÑ º¸¾È ¿ä±¸»çÇ×À» µµÃâÇÑ´Ù. ¶ÇÇÑ Å¬·¯½ºÅͽýºÅÛÀÇ ¹«°á¼ºÀ» º¸ÀåÇÒ ¼ö ÀÖ´Â ±¸Á¶¸¦ Á¤ÀÇÇÏ°í, Á¤ÀÇÇÑ Å¬·¯½ºÅͽýºÅÛÀ» ±¸¼ºÇÏ´Â °¢ ³ëµå ¿î¿µ¿¡ ´ëÇÑ ¹«°á¼º Á¦°ø ÀýÂ÷¿Í Ŭ·¯½ºÅÍ ¿î¿ë¿¡ ÇÊ¿äÇÑ ¼ÒÇÁÆ®¿þ¾î ºÐ¹è °úÁ¤ÀÇ ¹«°á ¼º Á¦°ø ÀýÂ÷¸¦ ±¸ºÐÇÏ¿© ¼³¸íÇÑ´Ù. Ŭ·¯½ºÅͽýºÅÛÀ» ±¸¼ºÇÏ´Â °¢ ³ëµå ¿î¿µ¿¡ ´ëÇÑ ¹« °á¼ºÀº ³ëµåÀÇ ¿î¿µÃ¼Á¦, ³ëµå »ó¿¡ ¿î¿ëµÇ´Â ÇÁ·Î±×·¥, ±×¸®°í Áß¿ä µ¥ÀÌÅÍ¿¡ ´ëÇØ Á¦ °øµÇ¸ç, ÇÁ·Î±×·¥ ºÐ¹è °úÁ¤ÀÇ ¹«°á¼º Á¦°øÀº Ŭ·¯½ºÅÍ ³ëµå·Î ºÐ¹èµÇ´Â ÇÁ·Î±×·¥¿¡ ´ë ÇØ Á¦°øµÈ´Ù. |
||
¿µ¹®³»¿ë¿ä¾à | At first, the threats that can infect the cluster system are explained and then the
method of providing the integrity against each threat will be introduced. The methods of providing the integrity are explained with two parts. One is for the cluster node integrity and the other is for the provisioning of program within cluster system. And integrity for each cluster node consists of three parts: operating system including boot sequence, program running on the cluster system and data managed securely. Integrity for provisioning of program is applied to the program that is distributed to each cluster node. |
||
±¹Á¦Ç¥ÁØ | |||
°ü·ÃÆÄÀÏ | TTAS.KO-12.0066.pdf |