¿©¼º ICTÀ§¿øȸ Çмú´ëȸ
Current Result Document :
ÇѱÛÁ¦¸ñ(Korean Title) |
Ŭ¶ó¿ìµå ÄÄÇ»Æà ¼ºñ½º º¸¾È»ç°í ºÐ¼®À» ÅëÇÑ ÇÑ°èÁ¡ µµÃâ |
¿µ¹®Á¦¸ñ(English Title) |
Identifying limitations through Cloud Computing Service Security Incident Analysis |
ÀúÀÚ(Author) |
ÀÌ¿µÀº
À±À¯»ó
Á¶¿µº¹
Yeong-Eun Lee
Yoon-Yoo Sang
Young-Bok Cho
|
¿ø¹®¼ö·Ïó(Citation) |
VOL 2019 NO. 01 PP. 0019 ~ 0022 (2019. 10) |
Çѱ۳»¿ë (Korean Abstract) |
ÃÖ±Ù¿¡´Â ³×Æ®¿öÅ©ÀÇ °íµµÇÐ¿Í °¡»óÇÐ °°Àº ¼ÒÇÁÆ®¿þ¾î ±â¼úÀÌ ¹ßÀüµÇ¸é¼ ±âÁ¸¿¡ Á¸ÀçÇß´ø ¿©·¯°¡ÁöÀÇ ±â¼ú À¶ÇÕÀ¸·Î ½ÃÀÛµÈ Å¬¶ó¿ìµå ÄÄÇ»Æà ¼ºñ½º´Â ÀüÅëÀûÀÎ IT ÀÎÇÁ¶ó¸¦ ´ëüÇÏ¸é¼ »ç¿ëÀÚ°¡ Á÷Á¢ÀûÀ¸·Î »ç¿ëÇÏ´Â ¼ºñ½º±îÁö »ó¿ëÇеǾî Æø³Ð°Ô ¼ºñ½ºµÇ°í ÀÖ´Ù. ¶ÇÇÑ º¸¾ÈÀ̽´¿¡ ´ëÇÑ ¹®Á¦ ¿ª½Ã °è¼ÓµÇ°í ÀÖÀ¸¸ç ºü¸£°Ô º¯ÇÐÇÏ´Â IT±â¼ú¿¡ ´ëÇÑ º¸¾È°ú ƯÈ÷ ÇÏÀÌÆÛ ¹ÙÀÌÀú¸¦ ÀÌ¿ëÇÑ Å¬¶ó¿ìµå ¼ºñ½ºÀÇ °æ¿ì º¸¾È¿¡ ¿©·¯°¡Áö ¾î·Á¿òÀ» ÁÖ°í ÀÖ´Ù. µû¶ó¼ º» ³í¹®¿¡¼´Â Ŭ¶ó¿ìµå ÄÄÇ»Æà ¼ºñ½ºÀÇ º¸¾È»ç°íÀÇ ¼ºñ½ºÁ¾·ù ¹× È°¿ë¿¡ ´ëÇØ ºÐ¼® ÇÏ°í º¸¾È»ó ÇÑ°è Á¡À» µµÃâÇÏ°íÀÚ ÇÑ´Ù. |
¿µ¹®³»¿ë (English Abstract) |
Computing services, initiated by the convergence of many existing technologies, have been widely available, replacing the existing IT infrastructure with services that users use directly. But security issues also continue and pose security challenges for rapidly changing IT technologies, especially cloud services using hypervisors. Thus, in this paper, the type and utilization of security thinking services in cloud computing services are analyzed and the security threshold is derived. |
Å°¿öµå(Keyword) |
Ŭ¶ó¿ìµå ÄÄÇ»Æà ¼ºñ½º£¬º¸¾È£¬ÇÏÀÌÆÛ¹ÙÀÌÀú£¬°¡»óÈ
|
ÆÄÀÏ÷ºÎ |
PDF ´Ù¿î·Îµå
|