JOURNAL BROWSE
Search
Advanced SearchSearch Tips
Method for network divided subscriber`s facilities
facebook(new window)  Pirnt(new window) E-mail(new window) Excel Download
 Title & Authors
Method for network divided subscriber`s facilities
Yoon, Tae-Ho;
  PDF(new window)
 Abstract
In this paper, to provide a method for providing a network separation subscriber`s facilities. How to provide this subscriber`s facilities include phase generating authorization key in server, saving activation file in portable data medium included server`s authorization key, executing saved activation file in client`s portable storage and providing virtual machine by result client`s execute file. In case of moving work, the virtual subscriver`s facility can provide for a business traveler.
 Keywords
Virtual Machine;Network Separation;Computing Resource;Computing as a Service;
 Language
Korean
 Cited by
 References
1.
W. Seo and M. Jeon, "A Direction of Convergence and Security of Smart Grid and Information Communication Network," J. of the Korea Institute of Electronic Communication Sciences, vol. 5, no. 5, Oct. 2010, pp. 477-486.

2.
S. Lim, G. Kim, and T. Kang, "Application Program Virtualization based on Desktop Virtualization," J. of the Korea Institute of Electronic Communication Sciences, vol. 5, no. 6, Dec. 2010, pp. 595-601.

3.
W. Seo and M. Jeon, "A Study on the Realization of Diskless and Stateless Security Policy Based High-speed Synchronous Network Infrastructure," J. of the Korea Institute of Electronic Communication Sciences, vol. 6, no. 5, Oct. 2011, pp. 673-681.

4.
W. Seo, M. Jeon, and D. Park, "A Study on a 4-Stage Phased Defense Method to Defend Cloud Computing Service Intrusion," J. of the Korea Institute of Electronic Communication Sciences, vol. 7, no. 5, Oct. 2012, pp. 1041-1051.

5.
S. Lee and H. Yoon, "The Study on Development of Technology for Electronic Government of S. Korea with Cloud Computing analysed by the Application of Scenario Planning," J. of the Korea Institute of Electronic Communication Sciences, vol. 7, no. 6, Dec. 2012, pp. 1245-1258.

6.
C. Jeong and T. Kang, "Performance Comparison of Vitualization Domain in User Level Virtualization," J. of the Korea Institute of Electronic Communication Sciences, vol. 8, no. 11, Nov. 2013, pp. 1741-1747. crossref(new window)

7.
D. Kang, M. Jeon, and C. Kim, "Zero-day Attack, Virtual Honeynet, High-Interaction Hoenypot, Client Honeypot, Attack Visualization," J. of the Korea Institute of Electronic Communication Sciences, vol. 8, no. 6, June 2013, pp. 863-872.

8.
G. Jeong and K Choi, "Study on the Implementation of a Virtual Switch using Intel DPDK," J. of the Korea Institute of Electronic Communication Sciences, vol. 10, no. 2, Feb. 2015, pp. 211-218. crossref(new window)

9.
T. Yoon, "Method and system for providing virtual computer environment for the network division," J. of the Korea Institute of Electronic Communication Sciences, vol. 10, no. 10, Oct. 2015, pp. 963-974.