최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기정보과학회논문지 = Journal of KIISE, v.45 no.1, 2018년, pp.76 - 85
봉진숙 (숭실대학교 컴퓨터학과) , 박상진 (숭실대학교 컴퓨터학과) , 신용태 (숭실대학교 컴퓨터학부)
Governments and public agencies try to use the cloud to carry out their work and provide public services. However, a public cloud is vulnerable to security side because it has a structure to support services using public networks (i.e, the internet). Thus, this paper finds the general security vulne...
Ministry of Science and ICT, K-ICT cloud computing activation plan, Ministry of Science and ICT, Nov. 2015. (In Korean)
H. G. Kim, Consulting methodology for public sector cloud adoption, Public Cloud Support Center, Dec. 2016.
KISA, Notification announcement of cloud information security and implementation of security encryption, Cloud Service Brokerage forum, Apr. 2016. (In Korean)
S. H. Kang, Trends in cloud security regulations in major countries, SPRi, Jul. 2016.
Habib, S., Qadir, J., Ali, A., Habib, D., Li, M., & Sathiaseelan, A., "The past, present, and future of transport-layer multipath," Journal of Network and Computer Applications, 75, pp. 236-258, Jan. 2016.
A. Ford, C. Raiciu, M. Handley, O. Bonaventure, "TCP Extensions for Multipath Operation with Multiple Addresses," RFC 6824, Jan. 2013.
S. J. Koh, H. Y. Jung, J. H. Min, K. S. Park, "Analysis and Prospect of Stream Control Transmission Protocol," Electronics and Telecommunications Trends, Vol. 18, No. 3, Jun. 2003.
Ministry of the Interior, Guidelines for public agencies to use the private cloud, Jul. 2016. (In Korean)
M. Bagnulo, M. Bagnulo, F. Gont, O. Bonaventure, C. Raiciu, "Analysis of Residual Threats and Possible Fixes for Multipath TCP (MPTCP)," RFC 7430, Jul. 2015.
M. Bagnulo, "Threat Analysis for TCP Extensions for Multipath Operation with Multiple Addresses," RFC 6181, Mar. 2011.
*원문 PDF 파일 및 링크정보가 존재하지 않을 경우 KISTI DDS 시스템에서 제공하는 원문복사서비스를 사용할 수 있습니다.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.