design protection
Recently Published Documents


TOTAL DOCUMENTS

133
(FIVE YEARS 42)

H-INDEX

7
(FIVE YEARS 1)

2021 ◽  
Vol 9 (10) ◽  
pp. 1098
Author(s):  
Avoce Honga Abdoul Nasser ◽  
Petro Dickson Ndalila ◽  
Edem A. Mawugbe ◽  
Melaine Emmanuel Kouame ◽  
Mioumnde Arthur Paterne ◽  
...  

Risk assessment is one of the main tools that oil and gas industries use to assess the hazards and risks in their facilities worldwide. Qualitative and quantitative risk assessments are carried out at various phases of the process industry: conceptual stage, design stage, construction stage, operational stage, decommissioning stage, etc. The quantitative risk assessment is directed during the detailed design stage to decide the spacing and layout out of equipment for safe operation and maintenance of oil and gas industries. The equipment layout and spacing are based on the safe distances are to be carried out on various design safety studies. In this work, a study was carried out on upstream onshore natural gas gathering stations and associated equipment and pipeline networks. The fire, explosion assessment, and toxic gas dispersion are conducted to evaluate how it affects people, assets, and the environment. Whether the design protection systems are adequate to mitigate the consequences or any additional measures to reduce risk to an acceptable level is analyzed.


2021 ◽  
Vol 16 (8) ◽  
pp. 80-88
Author(s):  
A. G. Koroleva

Most legal orders establish several forms of design protection that are not mutually exclusive. At the same time, the intersection of legal regimes gives rise to a number of practical and doctrinal problems related to the determination of the scope of the author’s and rightholder’s rights, the unfair behavior of participants in civil transactions, and the erosion of the institutional purpose of intellectual property objects. The main task of the study is to draw a meaningful border between the two forms of protection of industrial design objects. The paper elucidates the basic concepts of understanding an industrial design, the functions and features of the activity under consideration, the relationship with the category of "art," examines the formation and development of legal thought about the relationship between copyright and patent forms of protection of the results of artistic design. It is concluded that it is necessary to make proposals and recommendations to eliminate unfair practices in the exercise of the right to protect the results of creative activity under consideration.


2021 ◽  
Vol 26 (3) ◽  
pp. 251-260
Author(s):  
Zsolt Bederna ◽  
Zoltan Rajnai ◽  
Tamas Szadeczky

Abstract In current socio-economic processes, info-communication services play a determining role, modifying the activities of certain actors. The growing dependence that has developed over the past two decades has imposed the need to give political will to security, which has led to an iterative evolution of the regulatory environment. Therefore, the regulatory framework requires certain entities to develop safeguards including controls that enhance both prevention and response in a manner commensurate with the business value of the information to be protected. However, due to the nature of cybersecurity, developing such countermeasures is not the task of a standalone organization but all entities in cyberspace in a wide range, from individuals to the public sector. Therefore, each entity involved must design protection capabilities in a manner commensurate with the risk, which requires strategic tools and methods and drives organizations to learn from their security incidents. Following our previous paper “Business strategy analysis of cybersecurity incidents” (Bederna et al.) on the topic, this paper reviews the essential formal security strategy formulation tools applied in the cases of Yahoo! and Estonia. Both are based on publicly available information. The analysis confirms the importance of managements’ or the government’s attitude and support for solving cybersecurity challenges.


Author(s):  
Florian Stolz ◽  
Nils Albartus ◽  
Julian Speith ◽  
Simon Klix ◽  
Clemens Nasenberg ◽  
...  

Over the last decade attacks have repetitively demonstrated that bitstream protection for SRAM-based FPGAs is a persistent problem without a satisfying solution in practice. Hence, real-world hardware designs are prone to intellectual property infringement and malicious manipulation as they are not adequately protected against reverse-engineering.In this work, we first review state-of-the-art solutions from industry and academia and demonstrate their ineffectiveness with respect to reverse-engineering and design manipulation. We then describe the design and implementation of novel hardware obfuscation primitives based on the intrinsic structure of FPGAs. Based on our primitives, we design and implement LifeLine, a hardware design protection mechanism for FPGAs using hardware/software co-obfuscated cryptography. We show that LifeLine offers effective protection for a real-world adversary model, requires minimal integration effort for hardware designers, and retrofits to already deployed (and so far vulnerable) systems.


Author(s):  
Yurii Kapitsa

Kapitsa Y. Unregistered industrial design: protection in the European Union and the problem of trolling in Ukraine. The article considers a new provisions concerning unregistered industrial design (hereinafter — UD), introduced by the Law of Ukraine № 815-IX of 21.07.2020.There is an incomplete reflection in the Association Agreement between the EU and Ukraine and in the adopted Law of the provisions of Council Regulation (EC) No 6/2002 on Community designs, in particular the lack of implementation of Art. 85 (2) of the Regulation concerning the conditions under which courts consider UD to be valid; and the rulings of the Court of Justice that the right holder must provide evidence that the UD was copied by a third party, Case C-345/13 etc.This may result in trolling in Ukraine with the use of UD to prohibit the use of known products or products created independently, bypassing trademarks.It is actual to:• provide amendments to the Law of Ukraine «On protection of rights to industrial designs» concerning the provisions of Art. 85 (2) of Regulation № 6/2002 and the case law of the Court of Justice;• extend the competence of the Appeals Chamber to cases concerning the recognition of UD as invalid;• amend the Law as well Art. 139, 140 of the Code of Civil Procedure of Ukraine and Art. 151, 153 of the Economic and Procedural Code of Ukraine regarding the provisions of Art. 50 TRIPS which stipulates that judicial authorities shall have the authority to require the applicant to provide any reasonably available evidence in order to satisfy themselves with a sufficient degree of certainty that the applicant is the right holder and that the applicant’s right is being infringed or that such infringement is imminent.There is a danger of partial approximation not to the whole EU acquis governing the protection of relevant IP rights which may result in the difficulty of applying implemented provisions of EU acts and developing national case law which could contradict EU case law.Key words: unregistered industrial design, protection of intellectual property rights, approximation of legislation, trolling


2021 ◽  
Vol 26 (2) ◽  
pp. 139-148
Author(s):  
Zsolt Bederna ◽  
Zoltan Rajnai ◽  
Tamas Szadeczky

Abstract In the current social and economic processes, information and communication services play a decisive role, changing several entities’ operations. The growing dependence that has developed over the last two decades made the security needs introduced political will, which has resulted in an iterative evolution of the regulatory environment. Hence, the legal framework requires that several entities develop protection that includes controls enhancing both preventive and reactive in a risk-proportionate manner under the business value to be protected. Nevertheless, due to the nature of cybersecurity, the development of such capabilities is not the task of a single organisation but all entities involved in cyberspace, including, e.g., individuals, non-profit and for-profit organisations, public sector actors. Therefore, each involved entity should design protection capabilities in a risk-proportionate manner, which requires strategic approaches and tools and requires organisations to learn from security incidents. This paper reviews the essential formal security strategy formulation tools, applying in the Facebook’s case based on publicly available information. The analysis aims to confirm the importance of management’s attitude and support for tackling cybersecurity’s challenges.


Sign in / Sign up

Export Citation Format

Share Document