• Àüü
  • ÀüÀÚ/Àü±â
  • Åë½Å
  • ÄÄÇ»ÅÍ
´Ý±â

»çÀÌÆ®¸Ê

Loading..

Please wait....

±¹³» ³í¹®Áö

Ȩ Ȩ > ¿¬±¸¹®Çå > ±¹³» ³í¹®Áö > Çѱ¹Á¤º¸Åë½ÅÇÐȸ ³í¹®Áö (Journal of the Korea Institute of Information and Communication Engineering)

Çѱ¹Á¤º¸Åë½ÅÇÐȸ ³í¹®Áö (Journal of the Korea Institute of Information and Communication Engineering)

Current Result Document : 5 / 19 ÀÌÀü°Ç ÀÌÀü°Ç   ´ÙÀ½°Ç ´ÙÀ½°Ç

ÇѱÛÁ¦¸ñ(Korean Title) Ȩ ³×Æ®¿öÅ© º¸¾ÈÀ» À§ÇÑ ¹Ìµé¿þ¾î ¿ä±¸ ºÐ¼®
¿µ¹®Á¦¸ñ(English Title) Analyses of Middleware Requirement for Home Network Security
ÀúÀÚ(Author) ±èÁ¤Å   Jung-Tae Kim  
¿ø¹®¼ö·Ïó(Citation) VOL 08 NO. 04 PP. 0861 ~ 0865 (2004. 07)
Çѱ۳»¿ë
(Korean Abstract)
º» ³í¹®¿¡¼­´Â ÇâÈÄ, 2007³â °æ¿¡ IPv6¸¦ ±â¹ÝÀ¸·Î ÇÏ´Â À¯ºñ±ÅÅͽº ȯ°æ ÇÏ¿¡¼­ÀÇ °¢ °¡Á¤ÀÇ È¨ ³×Æ®¿öÅ©¸¦ ±¸¼ºÇÒ ¶§ ÇÊ¿äÇÑ º¸¾ÈÀûÀÎ Ãø¸éÀÇ ¹æ¹ý¿¡ ´ëÇؼ­ Á¦½ÃÇÏ°íÀÚ ÇÑ´Ù. ÀÌ·¯ÇÑ ´Ù¾çÈ­µÈ µðÁöÅÐ ¸Åü°¡ µðÁöÅÐ °¡Àü, Á¤º¸Åë½Å ½Ã½ºÅÛ°ú Á¢¼ÓÇÏ¿© »õ·Î¿î ¸ÞÄ«´ÏÁòÀÇ º¸¾È ¼³°è ´ë»óÀÌ ÇÊ¿äÇÏ°Ô µÊ¿¡ µû¶ó¼­, »õ·Î¿î Á¤º¸º¸È£ÀÇ Á¢±ÙÀÌ ÇʼöÀûÀÌ´Ù. º» ³í¹®¿¡¼­ Á¦½ÃÇÏ°íÀÚ ÇÏ´Â ³»¿ëÀº ¾ÏÈ£ÇÐÀûÀ¸·Î ¾ÈÀüÇÑ Èì ³×Æ®¿öÅ©ÀÇ ±¸¼º¿Í À̸¦ ½ÇÇöÇϱâ À§Çؼ­ ¿ä±¸µÇ¾îÁö´Â ´Ù¾çÇÑ °í·Á»çÇ× µîÀ» ºÐ¼®ÇÏ¿© Â÷¼¼´ëÀÇ ¸ÖƼ ÄÄÇ»Æà ȯ°æ ÇÏ¿¡¼­ÀÇ È¨ ³×Æ®¿öÅ© ½Ã½ºÅÛ ±¸Ãà¿¡ ´ëÇÑ ¾Ë°í¸®Áò ¹× ¹Ìµé¿þ¾î °³¹ß¿¡ µµ¿òÀÌ µÇ°íÀÚ ÇÑ´Ù.
¿µ¹®³»¿ë
(English Abstract)
Home computers that are connected to the Internet are under attack and need to be secured. That process is relatively well understood, even though we do not have perfect solutions today and probably never will. Meanwhile, however, the home computing environment is evolving into a home network of multiple devices, which will also need to be secured. We have little experience with these new home networks and much research needs to be done in this area. This paper gives a view of the requirements and some of the techniques available for securing home network.
Å°¿öµå(Keyword) Ȩ ³×Æ®¿öÅ©   Á¤º¸º¸¾È   Security   Middleware  
ÆÄÀÏ÷ºÎ PDF ´Ù¿î·Îµå