• 제목/요약/키워드: core protection

검색결과 405건 처리시간 0.028초

4차산업혁명 핵심기술 도입 및 정보보호조직에 관한 탐색적 연구: 성과측면에서의 비교분석 (An Exploratory Study on the Core Technology of the Fourth Industrial Revolution and Information Security Organization: Focusing on Firm Performance)

  • 김기현;조혜진;임소희
    • 지식경영연구
    • /
    • 제21권1호
    • /
    • pp.41-59
    • /
    • 2020
  • This explorative study examines the difference in firm performance according to the adoption of the core technology of the Fourth industrial revolution, including artificial intelligence(AI), internet of things (IoT), cloud computing, and big data technology. Additionally, we investigate the importance of internal organizational structure exclusively responsible for information security. We analyze unique microdata offered by the Korea Information Society Development Institute to examine the impact of the adoption of the new technologies and the existence of organizational structure for information protection on firm performance, i.e., firm sales. By considering the core information technology as powerful knowledge assets, we argue that the adoption of such technology leads firms to have comparative advantage comparing to the competitors. Also, we emphasize the need to consider the organizational structure suitable for information security, which can become a structural asset of a firm.

Development of an Intellectual Property Core for Floating Point Calculation for Safety Critical MMIS

  • Mwilongo, Nelson Josephat;Jung, Jae Cheon
    • 시스템엔지니어링학술지
    • /
    • 제17권2호
    • /
    • pp.37-48
    • /
    • 2021
  • Improving the plant protection system against unforeseen changes/transients during operation is essential to maintain plant safety. Under this condition, it requires rapid and accurate signal processing. The use of an Intellectual Property (IP) core for floating point calculations for Safety Critical MMIS can make numerical computations easier and more precise, improving system accuracy. It can represent and manipulate rational numbers as well as a much broader range of values with dynamic range in nuclear power plant. Systems engineering approach (SE) is used through the development process, it helps to reduce complexity and avoid omissions and invalid assumptions as delivers a better understanding of the stakeholders needs. For the implementation on the FPGA target board, the 32-bit floating-point arithmetic with IEEE-754 standards has designed using Simulink model in Matlab for all operations of addition, subtraction, multiplication and division and VHDL code generated.

A Study on the Reactor Protection System Composed of ASICs

  • Kim, Sung;Kim, Seog-Nam;Han, Sang-Joon
    • 한국원자력학회:학술대회논문집
    • /
    • 한국원자력학회 1996년도 추계학술발표회논문집(1)
    • /
    • pp.191-196
    • /
    • 1996
  • The potential value of the Application Specific Integrated Circuits(ASIC's) in safety systems of Nuclear Power Plants(NPP's) is being increasingly recognized because they are essentially hardwired circuitry on a chip, the reliability of the system can be proved more easily than that of software based systems which is difficult in point of software V&V(Verification and Validation). There are two types of ASIC, one is a full customized type, the other is a half customized type. PLD(Programmable Logic Device) used in this paper is a half customized ASIC which is a device consisting of blocks of logic connected with programmable interconnections that are customized in the package by end users. This paper describes the RPS(Reactor Protection System) composed of ASICs which provides emergency shutdown of the reactor to protect the core and the pressure boundary of RCS(Reactor Coolant System) in NPP's. The RPS is largely composed of five logic blocks, each of them was implemented in one PLD, as the followings. A). Bistable Logic B). Matrix Logic C).Initiation Logic D). MMI(Man Machine Interface) Logic E). Test Logic.

  • PDF

통상환경 변화에 따른 기술무역 활성화 방안 - 지식재산권을 중심으로 - (A Study on the Activation of the Technology Trade to Changing Trade Environment - Focusing on the Intellectual Property Rights -)

  • 서갑성;김종성
    • 통상정보연구
    • /
    • 제10권2호
    • /
    • pp.165-188
    • /
    • 2008
  • Some developed countries have already long been adapted to these changes in the international economic environment would improve productivity rather than traditional technology based on more high value-added business and increased investment. IPR protection is not just a national interest in the creation and growth of dimensions beyond the country's national competitiveness and a driving force to decide whether to challenge the core of the matter. Therefore, the importance of IPR in the country to raise awareness of IPR protection, and for systematic and comprehensive policy that will continue to be prepared.

  • PDF

Keywords Analysis on the Personal Information Protection Act: Focusing on South Korea, the European Union and the United States

  • Park, Sung-Uk;Park, Moon-Soo;Park, Soo-Hyun;Yun, Young-Mi
    • Asian Journal of Innovation and Policy
    • /
    • 제9권3호
    • /
    • pp.339-359
    • /
    • 2020
  • The policy change in the Data 3 Act is one of the issues that should be noted at a time when non-face-to-face business strategies become important after COVID-19. The Data 3 Act was implemented in South Korea on August 5, 2020, calling 'Big Data 3 Act' and 'Data Economy 3 Act,' and so personal information that was not able to identify a particular individual could be utilized without the consent of the individual. With the implementation of the Data 3 Act, it is possible to establish a fair economic ecosystem by ensuring fair access to data and various uses. In this paper, the law on the protection of personal information, which is the core of the Data 3 Act, was compared around Korea, the European Union and the United States, and the implications were derived through network analysis of keywords.

An Efficient Technique to Protect AES Secret Key from Scan Test Channel Attacks

  • Song, Jae-Hoon;Jung, Tae-Jin;Jung, Ji-Hun;Park, Sung-Ju
    • JSTS:Journal of Semiconductor Technology and Science
    • /
    • 제12권3호
    • /
    • pp.286-292
    • /
    • 2012
  • Scan techniques are almost mandatorily adopted in designing current System-on-a-Chip (SoC) to enhance testability, but inadvertently secret keys can be stolen through the scan test channels of crypto SoCs. An efficient scan design technique is proposed in this paper to protect the secret key of an Advanced Encryption Standard (AES) core embedded in an SoC. A new instruction is added to IEEE 1149.1 boundary scan to use a fake key instead of user key, in which the fake key is chosen with meticulous care to improve the testability as well. Our approach can be implemented as user defined logic with conventional boundary scan design, hence no modification is necessary to any crypto IP core. Conformance to the IEEE 1149.1 standards is completely preserved while yielding better performance of area, power, and fault coverage with highly robust protection of the secret user key.

SHIELDING DESIGN ANALYSES FOR SMART CORE WITH 49-CEDM

  • Kim, Kyo-Youn;Kim, Ha-Yong;Cho, Byung-Oh;Zee, Sung-Quun;Chang, Moon-Hee
    • Journal of Radiation Protection and Research
    • /
    • 제26권3호
    • /
    • pp.225-229
    • /
    • 2001
  • In Korea, an advanced reactor system of 330MWt power called SMART (System integrated Modular Advanced ReacTor) is being developed by KAERI to supply energy for seawater desalination as well as electricity generation. A shielding design of the SMART core with 49 CEDM is established by a two-dimensional discrete ordinates radiation transport analyses. The DORT two-dimensional discrete ordinates transport code is used to evaluate the SMART shielding designs. Three axial regions represent the SMART reactor assembly, each of which is modeled in the R-Z geometry. The BUGLE-96 library is used in the analyses, which consists of 47 neutron and 20 gamma energy groups. The results indicate that the maximum neutron fluence at the bottom of reactor vessel is $5.89 {\times} 10^{17}\;n/cm^2$ and that on the radial surface of reactor vessel is $4.49 {\times} 10^[16}\;n/cm^2$. These results meet the requirement, $1.0 {\times} 10^{20}\;n/cm^2$, in 10 CFR 50.61 and the integrity of SMART reactor vessel during the lifetime of the reactor is confirmed.

  • PDF