최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기정보처리학회논문지. KIPS transactions on computer and communication systems 컴퓨터 및 통신 시스템, v.11 no.4, 2022년, pp.119 - 126
안건희 (고려대학교 사이버국방학과) , 안상혁 (고려대학교 사이버국방학과) , 임동균 (고려대학교 사이버국방학과) , 정수환 (고려대학교 사이버국방학과) , 김재우 (한화시스템) , 신영주 (고려대학교 정보보호대학원)
In this paper, we present important factors and methodologies that we have to follow for secure and efficient package management systems in a closed network. By analyzing previous works, we present several security considerations for the existing package management systems. Based on the consideratio...
Format of the RPM File - RPM File Format [Internet], http://ftp.rpm.org/max-rpm/s1-rpm-file-format-rpm-file-format.html.
RPM Package File Structure [Internet], https://docs.fedoraproject.org/ro/Fedora_Draft_Documentation/0.1/html/RPM_Guide/ch-package-structure.html.
RPM Package Manager [Internet], http://www.rpm.org/.
A. Athalye, R. Hristov, T. Nguyen, and Q. Nguyen, "Package Manager Security," Tech. Rep. [Internet], https://pdfs.semanticscholar.org/d398/d240e916079e418b77ebb4b3730d7e959b15.pdf. 2020.
Securing RPM Signing Keys [Internet], https://access.redhat.com/blogs/766093/posts/3373211.
Man dpkg-sig [Internet], http://pwet.fr/man/linux/commandes/dpkg_sig.
J. Cappos, J. Samuel, S. Baker, and J. H. Hartman, "A look in the mirror: Attacks on package managers," Proceedings of the 15th ACM conference on Computer and communications security, Oct. 2008.
J. Cappos, J. Samuel, S. Baker, and J. H. Hartman, "Package management security," University of Arizona Technical Report, 2008.
Y. H. Jo and E. K. Lee, "Design of information security management for industrial control system," Proceedings of the Korean Society of Computer Information Conference, Korean Society of Computer Information, Jan. 2016.
J. Cappos et al., "Stork: Package management for distributed VM environments," Proceedings of the 21st Large Installation System Administration Conference (LISA '07), Nov. 2007.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.