• Àüü
  • ÀüÀÚ/Àü±â
  • Åë½Å
  • ÄÄÇ»ÅÍ
´Ý±â

»çÀÌÆ®¸Ê

Loading..

Please wait....

¿µ¹® ³í¹®Áö

Ȩ Ȩ > ¿¬±¸¹®Çå > ¿µ¹® ³í¹®Áö > JICCE (Çѱ¹Á¤º¸Åë½ÅÇÐȸ)

JICCE (Çѱ¹Á¤º¸Åë½ÅÇÐȸ)

Current Result Document :

ÇѱÛÁ¦¸ñ(Korean Title) A Study on the Intrustion Tolerance System Applied To the Security System
¿µ¹®Á¦¸ñ(English Title) A Study on the Intrustion Tolerance System Applied To the Security System
ÀúÀÚ(Author) Seung-jung Shin   Jung-tae Kim   Dae-hyun Ryu   Jong-Whoa Na  
¿ø¹®¼ö·Ïó(Citation) VOL 03 NO. 01 PP. 0038 ~ 0042 (2005. 03)
Çѱ۳»¿ë
(Korean Abstract)
¿µ¹®³»¿ë
(English Abstract)
The cyber attacks on the computer system in nowadays are focused on works that do not operate specific application. The main key point that we protect information security system has an access control to keep an application. Most of system has a main function to protect an infrastructure such as hardware, network and operating system. In this paper, we have presented an intrusion tolerance system that can service an application in spite of cyber attacks. The proposed system is based on the middle ware integrating security mechanism and separate function of application and intrusion tolerance. The main factor we use security system in nowadays is service to keep a persistency. The proposed intrusion tolerance system is applicable to such as medical, national defense and banking system.
Å°¿öµå(Keyword) Intrusion Tolerance   Oriented Security   Security  
ÆÄÀÏ÷ºÎ PDF ´Ù¿î·Îµå