ÀÚ·á°Ë»ö-Ç¥ÁØ

Ȩ > ÀڷḶ´ç > ÀÚ·á°Ë»ö > Ç¥ÁØ

ÀÚ·á °Ë»ö°á°ú

°Ë»öÆäÀÌÁö·Î
Ç¥ÁØÁ¾·ù Á¤º¸Åë½Å´ÜüǥÁØ(TTAS)
Ç¥ÁعøÈ£ [ÆóÁö] TTAS.KO-12.0066 ±¸ Ç¥ÁعøÈ£
Á¦°³Á¤ÀÏ 2007-12-26 ÃÑ ÆäÀÌÁö 28
ÇÑ±Û Ç¥Áظí Ŭ·¯½ºÅͽýºÅÛÀÇ ¹«°á¼º Á¦°ø ÇÁ·¹ÀÓ¿öÅ©
¿µ¹® Ç¥Áظí The Framework for Providing the Integrity on Cluster System
ÇÑ±Û ³»¿ë¿ä¾à ÁÖ¿ä ³»¿ëÀ¸·Î´Â Ŭ·¯½ºÅͽýºÅÛ ¿î¿µ¿¡ ÀÖ¾î ¹«°á¼ºÀ» Ä§ÇØÇÒ ¼ö ÀÖ´Â À§Çù ¿ä¼Ò¿¡
´ëÇØ ºÐ¼®Çϰí, ÀÌ¿¡ ´ëÀÀÇϱâ À§ÇÑ º¸¾È ¿ä±¸»çÇ×À» µµÃâÇÑ´Ù. ¶ÇÇÑ Å¬·¯½ºÅͽýºÅÛÀÇ
¹«°á¼ºÀ» º¸ÀåÇÒ ¼ö ÀÖ´Â ±¸Á¶¸¦ Á¤ÀÇÇϰí, Á¤ÀÇÇÑ Å¬·¯½ºÅͽýºÅÛÀ» ±¸¼ºÇÏ´Â °¢ ³ëµå
¿î¿µ¿¡ ´ëÇÑ ¹«°á¼º Á¦°ø ÀýÂ÷¿Í Ŭ·¯½ºÅÍ ¿î¿ë¿¡ ÇÊ¿äÇÑ ¼ÒÇÁÆ®¿þ¾î ºÐ¹è °úÁ¤ÀÇ ¹«°á
¼º Á¦°ø ÀýÂ÷¸¦ ±¸ºÐÇÏ¿© ¼³¸íÇÑ´Ù. Ŭ·¯½ºÅͽýºÅÛÀ» ±¸¼ºÇÏ´Â °¢ ³ëµå ¿î¿µ¿¡ ´ëÇÑ ¹«
°á¼ºÀº ³ëµåÀÇ ¿î¿µÃ¼Á¦, ³ëµå »ó¿¡ ¿î¿ëµÇ´Â ÇÁ·Î±×·¥, ±×¸®°í Áß¿ä µ¥ÀÌÅÍ¿¡ ´ëÇØ Á¦
°øµÇ¸ç, ÇÁ·Î±×·¥ ºÐ¹è °úÁ¤ÀÇ ¹«°á¼º Á¦°øÀº Ŭ·¯½ºÅÍ ³ëµå·Î ºÐ¹èµÇ´Â ÇÁ·Î±×·¥¿¡ ´ë
ÇØ Á¦°øµÈ´Ù.
¿µ¹® ³»¿ë¿ä¾à At first, the threats that can infect the cluster system are explained and then the
method of providing the integrity against each threat will be introduced. The methods
of providing the integrity are explained with two parts. One is for the cluster node
integrity and the other is for the provisioning of program within cluster system. And
integrity for each cluster node consists of three parts: operating system including boot
sequence, program running on the cluster system and data managed securely.
Integrity for provisioning of program is applied to the program that is distributed to
each cluster node.
°ü·Ã IPR È®¾à¼­ Á¢¼öµÈ IPR È®¾à¼­ ¾øÀ½
ÆóÁöÀÏ 2021-12-08
ÆóÁö»çÀ¯ »ê¾÷ ÇöÀå¿¡¼­ Ȱ¿ëµÇÁö ¾Ê¾Æ¼­ ÆóÁö
°ü·ÃÆÄÀÏ  TTAS.KO-12.0066.pdf
Ç¥ÁØÀÌ·Â
Ç¥Áظí Ç¥ÁعøÈ£ Á¦°³Á¤ÀÏ ±¸ºÐ À¯È¿
¿©ºÎ
IPR
È®¾à¼­
ÆÄÀÏ
Ŭ·¯½ºÅͽýºÅÛÀÇ ¹«°á¼º Á¦°ø ÇÁ·¹ÀÓ¿öÅ© TTAS.KO-12.0066 2007-12-26 Á¦Á¤ ÆóÁö ¾øÀ½