Àüü
ÀüÀÚ/Àü±â
Åë½Å
ÄÄÇ»ÅÍ
·Î±×ÀÎ
ȸ¿ø°¡ÀÔ
About Us
ÀÌ¿ë¾È³»
¿¬±¸¹®Çå
±¹³» ³í¹®Áö
¿µ¹® ³í¹®Áö
±¹³» ÇÐȸÁö
Çмú´ëȸ ÇÁ·Î½Ãµù
±¹³» ÇÐÀ§ ³í¹®
³í¹®Á¤º¸
¹é¼
±³À°Á¤º¸
¿¬±¸ ù°ÉÀ½
ÇаúÁ¤º¸
°ÀÇÁ¤º¸
µ¿¿µ»óÁ¤º¸
E-Learning
¿Â¶óÀÎ Àú³Î
½ÉÈÁ¤º¸
¿¬±¸ ¹× ±â¼úµ¿Çâ
Áֿ俬±¸ÅäÇÈ
ÁÖ¿ä°úÁ¦ ¹× ±â°ü
Çؿܱâ°ü °ü·ÃÀÚ·á
¹ÙÀÌ¿À Á¤º¸±â¼ú
ÁÖ¿ä Archive Site
Æ÷Ä¿½ºiN
¿¬±¸ÀÚ Á¤º¸
¶óÀÌ¡½ºÅ¸
ÆÄ¿öiNÅͺä
¼¼ÁßÇÑ
¿¬±¸ÀÚ·á
¹®ÀÚ DB
¿ë¾î»çÀü
¾Ë¸²¸¶´ç
ºÎ½Ç ÇмúÈ°µ¿ ¿¹¹æ
³í¹®¸ðÁý
´ëȸ¾È³»
What's New
¿¬±¸ºñÁ¤º¸
±¸ÀÎÁ¤º¸
°øÁö»çÇ×
CSERIC ±¤Àå
Post-Conference
¿¬±¸ÀÚ Ä«Æä
ÀÚÀ¯°Ô½ÃÆÇ
Q&A
´Ý±â
»çÀÌÆ®¸Ê
¿¬±¸¹®Çå
±¹³» ³í¹®Áö
¿µ¹® ³í¹®Áö
±¹³» ÇÐȸÁö
Çмú´ëȸ ÇÁ·Î½Ãµù
±¹³» ÇÐÀ§ ³í¹®
³í¹®Á¤º¸
¹é¼
±³À°Á¤º¸
¿¬±¸ ù°ÉÀ½
ÇаúÁ¤º¸
°ÀÇÁ¤º¸
µ¿¿µ»óÁ¤º¸
E-Learning
¿Â¶óÀÎ Àú³Î
½ÉÈÁ¤º¸
¿¬±¸ ¹× ±â¼úµ¿Çâ
Áֿ俬±¸ÅäÇÈ
ÁÖ¿ä°úÁ¦ ¹× ±â°ü
Çؿܱâ°ü °ü·ÃÀÚ·á
¹ÙÀÌ¿À Á¤º¸±â¼ú
ÁÖ¿ä Archive Site
ÄÄÇ»ÅÍiN
¿¬±¸ÀÚ Á¤º¸
¿¬±¸ÀÚ·á
¹®ÀÚ DB
Ȧ·Î±×·¥ DB
¿ë¾î»çÀü
¾Ë¸²¸¶´ç
ºÎ½Ç ÇмúÈ°µ¿ ¿¹¹æ
³í¹®¸ðÁý
´ëȸ¾È³»
What's New
¿¬±¸ºñ Á¤º¸
±¸ÀÎÁ¤º¸
°øÁö»çÇ×
IT Daily
CSERIC ±¤Àå
Post-Conference
¿¬±¸ÀÚ Ä«Æä
ÀÚÀ¯°Ô½ÃÆÇ
Q&A
¼ºñ½º ¹Ù·Î°¡±â
¼³¹®Á¶»ç
¿¬±¸À±¸®
°ü·Ã±â°ü
Please wait....
¿¬±¸¹®Çå
±¹³» ³í¹®Áö
¿µ¹® ³í¹®Áö
±¹³» ÇÐȸÁö
Çмú´ëȸ ÇÁ·Î½Ãµù
±¹³» ÇÐÀ§ ³í¹®
³í¹®Á¤º¸
¹é¼
±¹³» ³í¹®Áö
Ȩ > ¿¬±¸¹®Çå > ±¹³» ³í¹®Áö >
Çѱ¹Á¤º¸°úÇÐȸ ³í¹®Áö
>
Á¤º¸°úÇÐȸ ÄÄÇ»ÆÃÀÇ ½ÇÁ¦ ³í¹®Áö (KIISE Transactions on Computing Practices)
Á¤º¸°úÇÐȸ ÄÄÇ»ÆÃÀÇ ½ÇÁ¦ ³í¹®Áö (KIISE Transactions on Computing Practices)
Current Result Document :
1
/ 2
´ÙÀ½°Ç
ÇѱÛÁ¦¸ñ(Korean Title)
SW ºÐÇÒ ½ÇÇàÀ» ÀÌ¿ëÇÑ µ¥½ºÅ©Å¾ °¡»óÈ È¯°æ¿¡¼ µ¥ÀÌÅÍ º¸¾È ±â¼ú
¿µ¹®Á¦¸ñ(English Title)
Data Security Technology for the Desktop Virtualization Environment using the Graphic Offloading
ÀúÀÚ(Author)
Á¤¹®¿µ
ÃÖ¿øÇõ
Àå¼ö¹Î
¾ç°æ¾Æ
±è¿ø¿µ
ÃÖÁöÈÆ
Moonyoung Chung
Won-Hyuk Choi
Su-Min Jang
Kyung-Ah Yang
Won-Young Kim
Jihoon Choi
¿ø¹®¼ö·Ïó(Citation)
VOL 20 NO. 10 PP. 0555 ~ 0560 (2014. 10)
Çѱ۳»¿ë
(Korean Abstract)
º» ³í¹®¿¡¼´Â SW ºÐÇÒ ½ÇÇàÀ» ÀÌ¿ëÇÑ µ¥½ºÅ©Å¾ °¡»óÈ È¯°æ¿¡¼ µ¥ÀÌÅÍ º¸¾È ¹æ¹ýÀ» Á¦¾ÈÇÑ´Ù. »ç¿ëÀÚ¿¡°Ô ºÐ¸®µÈ °¡»ó¸Ó½ÅÀ» ÇÒ´çÇÏ´Â °¡»óÈ È¯°æ¿¡¼´Â ÇϳªÀÇ °¡»ó¸Ó½Å¿¡¼ ½ÇÇàµÇ´Â ¾îÇø®ÄÉÀ̼ÇÀÌ ´Ù¸¥ °¡»ó¸Ó½Å¿¡¼ ½ÇÇàµÇ´Â ¾îÇø®ÄÉÀ̼ǰú °í¸³µÈ´Ù´Â ÀåÁ¡ÀÌ ÀÖÁö¸¸, ¾îÇø®ÄÉÀÌ¼Ç °¡»óÈ ¼ºñ½º¸¦ À§ÇÑ ºÐÇÒ ½ÇÇà ±â¼ú¿¡¼´Â ¼¹ö¿¡¼ ½ÇÇàµÇ´Â ¾îÇø®ÄÉÀ̼ǵéÀÌ ¼¹öÀÇ ·çÆ® ±ÇÇÑÀ¸·Î ½ÇÇàµÇ¹Ç·Î »ç¿ëÀÚ »çÀÌÀÇ °í¸³À» Áö¿øÇÏÁö ¾Ê¾Æ µ¥ÀÌÅÍ º¸¾È¿¡ ¹®Á¦°¡ ¹ß»ýÇÑ´Ù. º» ³í¹®¿¡¼´Â ÀÌ ¹®Á¦¸¦ ÇØ°áÇϱâ À§Çؼ ¼¹ö ½ºÅ丮Áö ÇÊÅÍ, ºä¾î ÇÊÅÍ ¹× ÆÄÀÏ ¸ÅÇÎ Å×À̺íÀ» ÀÌ¿ëÇÑ µ¥ÀÌÅÍ º¸¾È ¹æ¹ýÀ» Á¦¾ÈÇÑ´Ù.
¿µ¹®³»¿ë
(English Abstract)
This paper proposes the data security technology for the desktop virtualization environment using the separated software execution method. In the virtual environment where allocates separate VMs to the users, there is a benefit that the programs in one guest machine are isolated from the programs running in another guest machine, whereas in the separated execution environment that supports application virtualization, the isolation is not offered and it causes the data security problem because the applications are executed by the one root privilege in the server. To solve this problem, we provides the data security method using the server storage filter, the viewer filter, and the file mapping table in this paper.
Å°¿öµå(Keyword)
SW ºÐÇÒ ½ÇÇà
½ºÅ丮Áö °¡»óÈ
±×·¡ÇÈ °¡»óÈ
Á¢±Ù Á¦¾î
graphic offloading
storage virtualization
graphic virtualization
access control
ÆÄÀÏ÷ºÎ
PDF ´Ù¿î·Îµå
¸ñ·Ï
Copyright(c)
Computer Science Engineering Research Information Center
. All rights reserved.