1,667 research outputs found

    Piracy prevention methods in software business

    Get PDF
    Abstract. There are various forms of piracy in software business, and many prevention techniques have been developed against them. Forms of software piracy are, for example, cracks and serials, softlifting and hard disk loading, internet piracy and software counterfeiting, mischanneling, reverse engineering, and tampering. There are various prevention methods that target these types of piracy, although all of these methods have been broken. The piracy prevention measures can be divided into ethical, legal, and technical measures. Technical measures include measures like obfuscation and tamper-proofing, for example. However, relying on a single method does not provide complete protection from attacks against intellectual property, so companies wishing to protect their product should consider combining multiple methods of piracy prevention

    A Property Rights Enforcement and Pricing Model for IIoT Data Marketplaces

    Get PDF
    ํ•™์œ„๋…ผ๋ฌธ(์„์‚ฌ)--์„œ์šธ๋Œ€ํ•™๊ต ๋Œ€ํ•™์› :๊ณต๊ณผ๋Œ€ํ•™ ํ˜‘๋™๊ณผ์ • ๊ธฐ์ˆ ๊ฒฝ์˜ยท๊ฒฝ์ œยท์ •์ฑ…์ „๊ณต,2019. 8. Jรถrn Altmann.The Industrial Internet of Things (IIoT) has become a valuable data source for products and services based on advanced data analytics. However, evidence suggests that industries are suffering a significant loss of value creation from insufficient IIoT data sharing. We argue that the limited utilization of the Sensing as a Service business model is caused by the economic and technological characteristics of sensor data, and the corresponding absence of applicable digital rights management models. Therefore, we propose a combined property rights enforcement and pricing model to solve the IIoT data sharing incentive problem.์‚ฐ์—…์šฉ ์‚ฌ๋ฌผ ์ธํ„ฐ๋„ท (IIoT) ๋ฐ์ดํ„ฐ๊ฐ€ ์ œํ’ˆ๊ณผ ์„œ๋น„์Šค๋ฅผ ์œ„ํ•œ ์ค‘์š”ํ•œ ๊ณ ๊ธ‰ ๋ฐ์ดํ„ฐ ์†Œ์Šค๋กœ ์—ฌ๊ฒจ์ง€๊ณ  ์žˆ์ง€๋งŒ, ์—ฌ์ „ํžˆ ์ˆ˜ ๋งŽ์€ ๊ธฐ์—…๋“ค์€ ๋ถˆ์ถฉ๋ถ„ํ•œ ์‚ฐ์—…์šฉ ์‚ฌ๋ฌผ ์ธํ„ฐ๋„ท ๋ฐ์ดํ„ฐ ๊ณต์œ  ์‹œ์Šคํ…œ์œผ๋กœ ์ธํ•˜์—ฌ ๊ณ ์ถฉ์„ ๊ฒช๊ณ  ์žˆ๋‹ค. ๋ฐฉ๋Œ€ํ•œ ๋ถ„๋Ÿ‰์˜ ์‚ฐ์—…์šฉ ๋ฐ์ดํ„ฐ๊ฐ€ ์ œ๋Œ€๋กœ ๊ฑฐ๋ž˜๋˜์ง€ ๋ชปํ•˜๊ณ  ์žˆ์œผ๋ฉฐ, ์ด๋Š” ๋ฐ์ดํ„ฐ์˜ ์ปค๋‹ค๋ž€ ๊ฐ€์น˜ ์†์‹ค๋กœ ์ด์–ด์ง€๊ณ  ์žˆ๋‹ค. ๋ณธ ์—ฐ๊ตฌ์—์„œ๋Š” ์„œ๋น„์Šค๋กœ์„œ์˜ ์„ผ์‹ฑ (Sensing as a Service) ๋น„์ง€๋‹ˆ์Šค ๋ชจ๋ธ์ด ํ•œ์ •์ ์œผ๋กœ ์ ์šฉ๋˜๊ณ  ์žˆ๋Š” ์›์ธ์ด ํ•ด๋‹น ์ •๋ณด์˜ ๊ฒฝ์ œ์ , ๊ธฐ์ˆ ์  ํŠน์ง•๋“ค์„ ๋ฐ˜์˜ํ•˜๋Š” ๋””์ง€ํ„ธ ๊ถŒ๋ฆฌ ์‹œ์Šคํ…œ์˜ ๋ถ€์žฌ์— ๊ธฐ์ธํ•œ๋‹ค๊ณ  ๋ณด๊ณ  ์žˆ๋‹ค. ๋”ฐ๋ผ์„œ ๋ณธ ์—ฐ๊ตฌ์—์„œ๋Š” ์‚ฐ์—…์šฉ ์‚ฌ๋ฌผ ์ธํ„ฐ๋„ท ๋ฐ์ดํ„ฐ์— ๋Œ€ํ•œ ์ง€์ ์žฌ์‚ฐ๊ถŒ ์ง‘ํ–‰ ์‹œ์Šคํ…œ๊ณผ ๋ฐ์ดํ„ฐ ๊ฐ€๊ฒฉ์‚ฐ์ • ๋ชจ๋ธ์„ ์ œ์•ˆํ•˜์—ฌ ์‚ฐ์—…์šฉ ์‚ฌ๋ฌผ ์ธํ„ฐ๋„ท ๋ฐ์ดํ„ฐ ๊ณต์œ  ์ธ์„ผํ‹ฐ๋ธŒ ๋ฌธ์ œ๋ฅผ ํ•ด๊ฒฐํ•˜๊ณ ์ž ํ•œ๋‹ค.1 Introduction 1 1.1 Background 1 1.2 Problem Description 6 1.3 Research Objective and Question 8 1.4 Methodology 8 1.5 Contributions 9 1.6 Structure 10 2 Literature Review 11 2.1 Sensing as a Service 11 2.2 Economic Characteristics of IIoT Data 14 2.2.1 Property Rights of Data 18 2.2.2 Licensing of IIoT Data 23 2.3 IIoT Data Marketplaces 25 2.3.1 Use-cases and Value Propositions 30 2.3.2 Market Structures and Pricing Models 34 2.4 Digital Rights Management for IIoT 36 3 Model 44 3.1 Assumptions 45 3.2 Watermarking Technique 47 3.2.1 Function 48 3.2.2 Example 50 3.2.3 Robustness 51 3.3 Economic Reasoning 54 3.3.1 The Quality Gap 55 3.3.2 Cost of Watermarking (CoW) 57 3.3.3 Cost of Attacking (CoA) 58 4 Analytical Analysis 60 4.1 Equilibrium Between CoW and CoA 60 4.2 Determining the Optimal Quality Gap 62 4.3 Applicability of the Quality Gap Function 64 5 Conclusion 66 5.1 Summary 66 5.2 Discussion 66 6 Limitations and Future Research 68 References 70 Abstract (Korean) 79Maste

    A Survey of hardware protection of design data for integrated circuits and intellectual properties

    No full text
    International audienceThis paper reviews the current situation regarding design protection in the microelectronics industry. Over the past ten years, the designers of integrated circuits and intellectual properties have faced increasing threats including counterfeiting, reverse-engineering and theft. This is now a critical issue for the microelectronics industry, mainly for fabless designers and intellectual properties designers. Coupled with increasing pressure to decrease the cost and increase the performance of integrated circuits, the design of a secure, efficient, lightweight protection scheme for design data is a serious challenge for the hardware security community. However, several published works propose different ways to protect design data including functional locking, hardware obfuscation, and IC/IP identification. This paper presents a survey of academic research on the protection of design data. It concludes with the need to design an efficient protection scheme based on several properties

    Foreword and editorial - July issue

    Full text link
    • โ€ฆ
    corecore