Institute of Multimedia Technology 2008
°øÁö»çÇ×
»õ¼Ò½Ä
Á¤º¸ ¹× ÀÚ·á
 
  Ȩ¿¬±¸¼Òµ¿Á¤°øÁö»çÇ×
°øÁö»çÇ×  


¸ÖƼ¹Ìµð¾î±â¼ú¿¬±¸¼Ò DLS¼¼¹Ì³ª(2007/06/29) Information Security and Trusted Computing in Distributed Environments  

¾È³çÇϽʴϱî
¸ÖƼ¹Ìµð¾î±â¼ú¿¬±¸¼Ò¿¡¼­ ÁÖ°üÇÏ´Â DLS¼¼¹Ì³ª ¾È³»ÀÔ´Ï´Ù.

- Çà»ç¸í   Information Security and Trusted Computing in Distributed Environments
- ¿¬ÀÚ¸í   ¹ÚÁؼö
- ¼Ò ¼Ó   ½Ã¶óÅ¥½´´ëÇÐ
- °³ÃÖÀÏ   2007/06/29
- Àå ¼Ò  °æÈñ´ë ÀüÀÚÁ¤º¸°ü 205È£
- ÁÖÃÖ ¹× ÁÖ°ü  °æÈñ´ë ¸ÖƼ¹Ìµð¾î±â¼ú¿¬±¸¼Ò / ÈÄ¿ø: ÄÄÇ»ÅͰøÇÐ Àü°ø

¸¹Àº°ü½É°ú Âü¿© ºÎʵ右´Ï´Ù.
¹®ÀÇ : ¸ÖƼ¹Ìµð¾î±â¼ú¿¬±¸¼Ò 031-201-2987, mmtr@khu.ac.kr

Abstracts

As information systems became ever more complex and the interdependence of these systems increased, the security management in those systems became complicated. This becomes more serious when systems are integrated with Commercial Off-the-Shelf (COTS) products and services, which usually have both known and unknown flaws that may cause unexpected problems and that can be exploited by attackers to disrupt their target systems and services. Furthermore, the Intelligence Community (IC) has faced increasing challenges of insider threats. It is generally accepted that the cost of insider threats exceeds that of outsider threats. Although the currently available approaches have a great potential for preventing the problems and threats, there are still critical obstacles to be solved, especially in large-scale distributed computing environments. In this talk, I would like to share our research outcomes towards trusted computing in distributed environments as well as basic concepts in information security.





  ¼öÁ¤ÇÏ±â   »èÁ¦ÇÏ±â   ÃßõÇÏ±â   ¸ñ·Ïº¸±â