• Àüü
  • ÀüÀÚ/Àü±â
  • Åë½Å
  • ÄÄÇ»ÅÍ
´Ý±â

»çÀÌÆ®¸Ê

Loading..

Please wait....

Çмú´ëȸ ÇÁ·Î½Ãµù

Ȩ Ȩ > ¿¬±¸¹®Çå > Çмú´ëȸ ÇÁ·Î½Ãµù > Çѱ¹Á¤º¸Åë½ÅÇÐȸ Çмú´ëȸ > ¿©¼º ICTÀ§¿øȸ Çмú´ëȸ

¿©¼º ICTÀ§¿øȸ Çмú´ëȸ

Current Result Document :

ÇѱÛÁ¦¸ñ(Korean Title) Ŭ¶ó¿ìµå ÄÄÇ»Æà ¼­ºñ½º º¸¾È»ç°í ºÐ¼®À» ÅëÇÑ ÇÑ°èÁ¡ µµÃâ
¿µ¹®Á¦¸ñ(English Title) Identifying limitations through Cloud Computing Service Security Incident Analysis
ÀúÀÚ(Author) ÀÌ¿µÀº   À±À¯»ó   Á¶¿µº¹   Yeong-Eun Lee   Yoon-Yoo Sang   Young-Bok Cho  
¿ø¹®¼ö·Ïó(Citation) VOL 2019 NO. 01 PP. 0019 ~ 0022 (2019. 10)
Çѱ۳»¿ë
(Korean Abstract)
ÃÖ±Ù¿¡´Â ³×Æ®¿öÅ©ÀÇ °íµµÇÐ¿Í °¡»óÇÐ °°Àº ¼ÒÇÁÆ®¿þ¾î ±â¼úÀÌ ¹ßÀüµÇ¸é¼­ ±âÁ¸¿¡ Á¸ÀçÇß´ø ¿©·¯°¡ÁöÀÇ ±â¼ú À¶ÇÕÀ¸·Î ½ÃÀÛµÈ Å¬¶ó¿ìµå ÄÄÇ»Æà ¼­ºñ½º´Â ÀüÅëÀûÀÎ IT ÀÎÇÁ¶ó¸¦ ´ëüÇϸ鼭 »ç¿ëÀÚ°¡ Á÷Á¢ÀûÀ¸·Î »ç¿ëÇÏ´Â ¼­ºñ½º±îÁö »ó¿ëÇеǾî Æø³Ð°Ô ¼­ºñ½ºµÇ°í ÀÖ´Ù. ¶ÇÇÑ º¸¾ÈÀ̽´¿¡ ´ëÇÑ ¹®Á¦ ¿ª½Ã °è¼ÓµÇ°í ÀÖÀ¸¸ç ºü¸£°Ô º¯ÇÐÇÏ´Â IT±â¼ú¿¡ ´ëÇÑ º¸¾È°ú ƯÈ÷ ÇÏÀÌÆÛ ¹ÙÀÌÀú¸¦ ÀÌ¿ëÇÑ Å¬¶ó¿ìµå ¼­ºñ½ºÀÇ °æ¿ì º¸¾È¿¡ ¿©·¯°¡Áö ¾î·Á¿òÀ» ÁÖ°í ÀÖ´Ù. µû¶ó¼­ º» ³í¹®¿¡¼­´Â Ŭ¶ó¿ìµå ÄÄÇ»Æà ¼­ºñ½ºÀÇ º¸¾È»ç°íÀÇ ¼­ºñ½ºÁ¾·ù ¹× È°¿ë¿¡ ´ëÇØ ºÐ¼® ÇÏ°í º¸¾È»ó ÇÑ°è Á¡À» µµÃâÇÏ°íÀÚ ÇÑ´Ù.
¿µ¹®³»¿ë
(English Abstract)
Computing services, initiated by the convergence of many existing technologies, have been widely available, replacing the existing IT infrastructure with services that users use directly. But security issues also continue and pose security challenges for rapidly changing IT technologies, especially cloud services using hypervisors. Thus, in this paper, the type and utilization of security thinking services in cloud computing services are analyzed and the security threshold is derived.
Å°¿öµå(Keyword) Ŭ¶ó¿ìµå ÄÄÇ»Æà ¼­ºñ½º£¬º¸¾È£¬ÇÏÀÌÆÛ¹ÙÀÌÀú£¬°¡»óÈ­  
ÆÄÀÏ÷ºÎ PDF ´Ù¿î·Îµå