Implementation of cyber security for safety systems of nuclear facilities
Digital computers have been chosen as a safety system in newly constructed nuclear facilities. Owing to digitalization, cyber threats to nuclear facilities have increased and the integrity of the digital safety systems has been threatened. To cope with such threats, the nuclear regulatory agency has...
Ausführliche Beschreibung
Autor*in: |
Park, JaeKwan [verfasserIn] |
---|
Format: |
E-Artikel |
---|---|
Sprache: |
Englisch |
Erschienen: |
2016transfer abstract |
---|
Schlagwörter: |
---|
Umfang: |
7 |
---|
Übergeordnetes Werk: |
Enthalten in: Histone deacetylase 5 is a phosphorylation substrate of protein kinase D in osteoclasts - Meyers, Carina Mello Guimaraes ELSEVIER, 2022, the international review journal covering all aspects of nuclear energy, Amsterdam [u.a.] |
---|---|
Übergeordnetes Werk: |
volume:88 ; year:2016 ; pages:88-94 ; extent:7 |
Links: |
---|
DOI / URN: |
10.1016/j.pnucene.2015.12.009 |
---|
Katalog-ID: |
ELV035090294 |
---|
LEADER | 01000caa a22002652 4500 | ||
---|---|---|---|
001 | ELV035090294 | ||
003 | DE-627 | ||
005 | 20230625203010.0 | ||
007 | cr uuu---uuuuu | ||
008 | 180603s2016 xx |||||o 00| ||eng c | ||
024 | 7 | |a 10.1016/j.pnucene.2015.12.009 |2 doi | |
028 | 5 | 2 | |a GBVA2016004000014.pica |
035 | |a (DE-627)ELV035090294 | ||
035 | |a (ELSEVIER)S0149-1970(15)30127-X | ||
040 | |a DE-627 |b ger |c DE-627 |e rakwb | ||
041 | |a eng | ||
082 | 0 | |a 620 | |
082 | 0 | 4 | |a 620 |q DE-600 |
082 | 0 | 4 | |a 610 |q VZ |
084 | |a 44.83 |2 bkl | ||
100 | 1 | |a Park, JaeKwan |e verfasserin |4 aut | |
245 | 1 | 0 | |a Implementation of cyber security for safety systems of nuclear facilities |
264 | 1 | |c 2016transfer abstract | |
300 | |a 7 | ||
336 | |a nicht spezifiziert |b zzz |2 rdacontent | ||
337 | |a nicht spezifiziert |b z |2 rdamedia | ||
338 | |a nicht spezifiziert |b zu |2 rdacarrier | ||
520 | |a Digital computers have been chosen as a safety system in newly constructed nuclear facilities. Owing to digitalization, cyber threats to nuclear facilities have increased and the integrity of the digital safety systems has been threatened. To cope with such threats, the nuclear regulatory agency has published guidelines for digital safety systems. This paper suggests an implementation method of cyber security for the safety system in the development phase. It introduces specific security activities based on a practice in a nuclear facility construction project. It also explains experiences resolving security vulnerabilities of the system and gives lessons learned about considerations in a real construction. | ||
520 | |a Digital computers have been chosen as a safety system in newly constructed nuclear facilities. Owing to digitalization, cyber threats to nuclear facilities have increased and the integrity of the digital safety systems has been threatened. To cope with such threats, the nuclear regulatory agency has published guidelines for digital safety systems. This paper suggests an implementation method of cyber security for the safety system in the development phase. It introduces specific security activities based on a practice in a nuclear facility construction project. It also explains experiences resolving security vulnerabilities of the system and gives lessons learned about considerations in a real construction. | ||
650 | 7 | |a Cyber security implementation |2 Elsevier | |
650 | 7 | |a Software verification and validation |2 Elsevier | |
650 | 7 | |a Cyber security plan |2 Elsevier | |
650 | 7 | |a Cyber security |2 Elsevier | |
650 | 7 | |a Computer security |2 Elsevier | |
700 | 1 | |a Suh, YongSuk |4 oth | |
700 | 1 | |a Park, Cheol |4 oth | |
773 | 0 | 8 | |i Enthalten in |n Elsevier Science |a Meyers, Carina Mello Guimaraes ELSEVIER |t Histone deacetylase 5 is a phosphorylation substrate of protein kinase D in osteoclasts |d 2022 |d the international review journal covering all aspects of nuclear energy |g Amsterdam [u.a.] |w (DE-627)ELV007755775 |
773 | 1 | 8 | |g volume:88 |g year:2016 |g pages:88-94 |g extent:7 |
856 | 4 | 0 | |u https://doi.org/10.1016/j.pnucene.2015.12.009 |3 Volltext |
912 | |a GBV_USEFLAG_U | ||
912 | |a GBV_ELV | ||
912 | |a SYSFLAG_U | ||
912 | |a SSG-OLC-PHA | ||
936 | b | k | |a 44.83 |j Rheumatologie |j Orthopädie |q VZ |
951 | |a AR | ||
952 | |d 88 |j 2016 |h 88-94 |g 7 | ||
953 | |2 045F |a 620 |
author_variant |
j p jp |
---|---|
matchkey_str |
parkjaekwansuhyongsukparkcheol:2016----:mlmnainfyescrtfraeyytmon |
hierarchy_sort_str |
2016transfer abstract |
bklnumber |
44.83 |
publishDate |
2016 |
allfields |
10.1016/j.pnucene.2015.12.009 doi GBVA2016004000014.pica (DE-627)ELV035090294 (ELSEVIER)S0149-1970(15)30127-X DE-627 ger DE-627 rakwb eng 620 620 DE-600 610 VZ 44.83 bkl Park, JaeKwan verfasserin aut Implementation of cyber security for safety systems of nuclear facilities 2016transfer abstract 7 nicht spezifiziert zzz rdacontent nicht spezifiziert z rdamedia nicht spezifiziert zu rdacarrier Digital computers have been chosen as a safety system in newly constructed nuclear facilities. Owing to digitalization, cyber threats to nuclear facilities have increased and the integrity of the digital safety systems has been threatened. To cope with such threats, the nuclear regulatory agency has published guidelines for digital safety systems. This paper suggests an implementation method of cyber security for the safety system in the development phase. It introduces specific security activities based on a practice in a nuclear facility construction project. It also explains experiences resolving security vulnerabilities of the system and gives lessons learned about considerations in a real construction. Digital computers have been chosen as a safety system in newly constructed nuclear facilities. Owing to digitalization, cyber threats to nuclear facilities have increased and the integrity of the digital safety systems has been threatened. To cope with such threats, the nuclear regulatory agency has published guidelines for digital safety systems. This paper suggests an implementation method of cyber security for the safety system in the development phase. It introduces specific security activities based on a practice in a nuclear facility construction project. It also explains experiences resolving security vulnerabilities of the system and gives lessons learned about considerations in a real construction. Cyber security implementation Elsevier Software verification and validation Elsevier Cyber security plan Elsevier Cyber security Elsevier Computer security Elsevier Suh, YongSuk oth Park, Cheol oth Enthalten in Elsevier Science Meyers, Carina Mello Guimaraes ELSEVIER Histone deacetylase 5 is a phosphorylation substrate of protein kinase D in osteoclasts 2022 the international review journal covering all aspects of nuclear energy Amsterdam [u.a.] (DE-627)ELV007755775 volume:88 year:2016 pages:88-94 extent:7 https://doi.org/10.1016/j.pnucene.2015.12.009 Volltext GBV_USEFLAG_U GBV_ELV SYSFLAG_U SSG-OLC-PHA 44.83 Rheumatologie Orthopädie VZ AR 88 2016 88-94 7 045F 620 |
spelling |
10.1016/j.pnucene.2015.12.009 doi GBVA2016004000014.pica (DE-627)ELV035090294 (ELSEVIER)S0149-1970(15)30127-X DE-627 ger DE-627 rakwb eng 620 620 DE-600 610 VZ 44.83 bkl Park, JaeKwan verfasserin aut Implementation of cyber security for safety systems of nuclear facilities 2016transfer abstract 7 nicht spezifiziert zzz rdacontent nicht spezifiziert z rdamedia nicht spezifiziert zu rdacarrier Digital computers have been chosen as a safety system in newly constructed nuclear facilities. Owing to digitalization, cyber threats to nuclear facilities have increased and the integrity of the digital safety systems has been threatened. To cope with such threats, the nuclear regulatory agency has published guidelines for digital safety systems. This paper suggests an implementation method of cyber security for the safety system in the development phase. It introduces specific security activities based on a practice in a nuclear facility construction project. It also explains experiences resolving security vulnerabilities of the system and gives lessons learned about considerations in a real construction. Digital computers have been chosen as a safety system in newly constructed nuclear facilities. Owing to digitalization, cyber threats to nuclear facilities have increased and the integrity of the digital safety systems has been threatened. To cope with such threats, the nuclear regulatory agency has published guidelines for digital safety systems. This paper suggests an implementation method of cyber security for the safety system in the development phase. It introduces specific security activities based on a practice in a nuclear facility construction project. It also explains experiences resolving security vulnerabilities of the system and gives lessons learned about considerations in a real construction. Cyber security implementation Elsevier Software verification and validation Elsevier Cyber security plan Elsevier Cyber security Elsevier Computer security Elsevier Suh, YongSuk oth Park, Cheol oth Enthalten in Elsevier Science Meyers, Carina Mello Guimaraes ELSEVIER Histone deacetylase 5 is a phosphorylation substrate of protein kinase D in osteoclasts 2022 the international review journal covering all aspects of nuclear energy Amsterdam [u.a.] (DE-627)ELV007755775 volume:88 year:2016 pages:88-94 extent:7 https://doi.org/10.1016/j.pnucene.2015.12.009 Volltext GBV_USEFLAG_U GBV_ELV SYSFLAG_U SSG-OLC-PHA 44.83 Rheumatologie Orthopädie VZ AR 88 2016 88-94 7 045F 620 |
allfields_unstemmed |
10.1016/j.pnucene.2015.12.009 doi GBVA2016004000014.pica (DE-627)ELV035090294 (ELSEVIER)S0149-1970(15)30127-X DE-627 ger DE-627 rakwb eng 620 620 DE-600 610 VZ 44.83 bkl Park, JaeKwan verfasserin aut Implementation of cyber security for safety systems of nuclear facilities 2016transfer abstract 7 nicht spezifiziert zzz rdacontent nicht spezifiziert z rdamedia nicht spezifiziert zu rdacarrier Digital computers have been chosen as a safety system in newly constructed nuclear facilities. Owing to digitalization, cyber threats to nuclear facilities have increased and the integrity of the digital safety systems has been threatened. To cope with such threats, the nuclear regulatory agency has published guidelines for digital safety systems. This paper suggests an implementation method of cyber security for the safety system in the development phase. It introduces specific security activities based on a practice in a nuclear facility construction project. It also explains experiences resolving security vulnerabilities of the system and gives lessons learned about considerations in a real construction. Digital computers have been chosen as a safety system in newly constructed nuclear facilities. Owing to digitalization, cyber threats to nuclear facilities have increased and the integrity of the digital safety systems has been threatened. To cope with such threats, the nuclear regulatory agency has published guidelines for digital safety systems. This paper suggests an implementation method of cyber security for the safety system in the development phase. It introduces specific security activities based on a practice in a nuclear facility construction project. It also explains experiences resolving security vulnerabilities of the system and gives lessons learned about considerations in a real construction. Cyber security implementation Elsevier Software verification and validation Elsevier Cyber security plan Elsevier Cyber security Elsevier Computer security Elsevier Suh, YongSuk oth Park, Cheol oth Enthalten in Elsevier Science Meyers, Carina Mello Guimaraes ELSEVIER Histone deacetylase 5 is a phosphorylation substrate of protein kinase D in osteoclasts 2022 the international review journal covering all aspects of nuclear energy Amsterdam [u.a.] (DE-627)ELV007755775 volume:88 year:2016 pages:88-94 extent:7 https://doi.org/10.1016/j.pnucene.2015.12.009 Volltext GBV_USEFLAG_U GBV_ELV SYSFLAG_U SSG-OLC-PHA 44.83 Rheumatologie Orthopädie VZ AR 88 2016 88-94 7 045F 620 |
allfieldsGer |
10.1016/j.pnucene.2015.12.009 doi GBVA2016004000014.pica (DE-627)ELV035090294 (ELSEVIER)S0149-1970(15)30127-X DE-627 ger DE-627 rakwb eng 620 620 DE-600 610 VZ 44.83 bkl Park, JaeKwan verfasserin aut Implementation of cyber security for safety systems of nuclear facilities 2016transfer abstract 7 nicht spezifiziert zzz rdacontent nicht spezifiziert z rdamedia nicht spezifiziert zu rdacarrier Digital computers have been chosen as a safety system in newly constructed nuclear facilities. Owing to digitalization, cyber threats to nuclear facilities have increased and the integrity of the digital safety systems has been threatened. To cope with such threats, the nuclear regulatory agency has published guidelines for digital safety systems. This paper suggests an implementation method of cyber security for the safety system in the development phase. It introduces specific security activities based on a practice in a nuclear facility construction project. It also explains experiences resolving security vulnerabilities of the system and gives lessons learned about considerations in a real construction. Digital computers have been chosen as a safety system in newly constructed nuclear facilities. Owing to digitalization, cyber threats to nuclear facilities have increased and the integrity of the digital safety systems has been threatened. To cope with such threats, the nuclear regulatory agency has published guidelines for digital safety systems. This paper suggests an implementation method of cyber security for the safety system in the development phase. It introduces specific security activities based on a practice in a nuclear facility construction project. It also explains experiences resolving security vulnerabilities of the system and gives lessons learned about considerations in a real construction. Cyber security implementation Elsevier Software verification and validation Elsevier Cyber security plan Elsevier Cyber security Elsevier Computer security Elsevier Suh, YongSuk oth Park, Cheol oth Enthalten in Elsevier Science Meyers, Carina Mello Guimaraes ELSEVIER Histone deacetylase 5 is a phosphorylation substrate of protein kinase D in osteoclasts 2022 the international review journal covering all aspects of nuclear energy Amsterdam [u.a.] (DE-627)ELV007755775 volume:88 year:2016 pages:88-94 extent:7 https://doi.org/10.1016/j.pnucene.2015.12.009 Volltext GBV_USEFLAG_U GBV_ELV SYSFLAG_U SSG-OLC-PHA 44.83 Rheumatologie Orthopädie VZ AR 88 2016 88-94 7 045F 620 |
allfieldsSound |
10.1016/j.pnucene.2015.12.009 doi GBVA2016004000014.pica (DE-627)ELV035090294 (ELSEVIER)S0149-1970(15)30127-X DE-627 ger DE-627 rakwb eng 620 620 DE-600 610 VZ 44.83 bkl Park, JaeKwan verfasserin aut Implementation of cyber security for safety systems of nuclear facilities 2016transfer abstract 7 nicht spezifiziert zzz rdacontent nicht spezifiziert z rdamedia nicht spezifiziert zu rdacarrier Digital computers have been chosen as a safety system in newly constructed nuclear facilities. Owing to digitalization, cyber threats to nuclear facilities have increased and the integrity of the digital safety systems has been threatened. To cope with such threats, the nuclear regulatory agency has published guidelines for digital safety systems. This paper suggests an implementation method of cyber security for the safety system in the development phase. It introduces specific security activities based on a practice in a nuclear facility construction project. It also explains experiences resolving security vulnerabilities of the system and gives lessons learned about considerations in a real construction. Digital computers have been chosen as a safety system in newly constructed nuclear facilities. Owing to digitalization, cyber threats to nuclear facilities have increased and the integrity of the digital safety systems has been threatened. To cope with such threats, the nuclear regulatory agency has published guidelines for digital safety systems. This paper suggests an implementation method of cyber security for the safety system in the development phase. It introduces specific security activities based on a practice in a nuclear facility construction project. It also explains experiences resolving security vulnerabilities of the system and gives lessons learned about considerations in a real construction. Cyber security implementation Elsevier Software verification and validation Elsevier Cyber security plan Elsevier Cyber security Elsevier Computer security Elsevier Suh, YongSuk oth Park, Cheol oth Enthalten in Elsevier Science Meyers, Carina Mello Guimaraes ELSEVIER Histone deacetylase 5 is a phosphorylation substrate of protein kinase D in osteoclasts 2022 the international review journal covering all aspects of nuclear energy Amsterdam [u.a.] (DE-627)ELV007755775 volume:88 year:2016 pages:88-94 extent:7 https://doi.org/10.1016/j.pnucene.2015.12.009 Volltext GBV_USEFLAG_U GBV_ELV SYSFLAG_U SSG-OLC-PHA 44.83 Rheumatologie Orthopädie VZ AR 88 2016 88-94 7 045F 620 |
language |
English |
source |
Enthalten in Histone deacetylase 5 is a phosphorylation substrate of protein kinase D in osteoclasts Amsterdam [u.a.] volume:88 year:2016 pages:88-94 extent:7 |
sourceStr |
Enthalten in Histone deacetylase 5 is a phosphorylation substrate of protein kinase D in osteoclasts Amsterdam [u.a.] volume:88 year:2016 pages:88-94 extent:7 |
format_phy_str_mv |
Article |
bklname |
Rheumatologie Orthopädie |
institution |
findex.gbv.de |
topic_facet |
Cyber security implementation Software verification and validation Cyber security plan Cyber security Computer security |
dewey-raw |
620 |
isfreeaccess_bool |
false |
container_title |
Histone deacetylase 5 is a phosphorylation substrate of protein kinase D in osteoclasts |
authorswithroles_txt_mv |
Park, JaeKwan @@aut@@ Suh, YongSuk @@oth@@ Park, Cheol @@oth@@ |
publishDateDaySort_date |
2016-01-01T00:00:00Z |
hierarchy_top_id |
ELV007755775 |
dewey-sort |
3620 |
id |
ELV035090294 |
language_de |
englisch |
fullrecord |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01000caa a22002652 4500</leader><controlfield tag="001">ELV035090294</controlfield><controlfield tag="003">DE-627</controlfield><controlfield tag="005">20230625203010.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">180603s2016 xx |||||o 00| ||eng c</controlfield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1016/j.pnucene.2015.12.009</subfield><subfield code="2">doi</subfield></datafield><datafield tag="028" ind1="5" ind2="2"><subfield code="a">GBVA2016004000014.pica</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627)ELV035090294</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ELSEVIER)S0149-1970(15)30127-X</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">620</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">620</subfield><subfield code="q">DE-600</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">610</subfield><subfield code="q">VZ</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">44.83</subfield><subfield code="2">bkl</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Park, JaeKwan</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Implementation of cyber security for safety systems of nuclear facilities</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="c">2016transfer abstract</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">7</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">nicht spezifiziert</subfield><subfield code="b">zzz</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">nicht spezifiziert</subfield><subfield code="b">z</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">nicht spezifiziert</subfield><subfield code="b">zu</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Digital computers have been chosen as a safety system in newly constructed nuclear facilities. Owing to digitalization, cyber threats to nuclear facilities have increased and the integrity of the digital safety systems has been threatened. To cope with such threats, the nuclear regulatory agency has published guidelines for digital safety systems. This paper suggests an implementation method of cyber security for the safety system in the development phase. It introduces specific security activities based on a practice in a nuclear facility construction project. It also explains experiences resolving security vulnerabilities of the system and gives lessons learned about considerations in a real construction.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Digital computers have been chosen as a safety system in newly constructed nuclear facilities. Owing to digitalization, cyber threats to nuclear facilities have increased and the integrity of the digital safety systems has been threatened. To cope with such threats, the nuclear regulatory agency has published guidelines for digital safety systems. This paper suggests an implementation method of cyber security for the safety system in the development phase. It introduces specific security activities based on a practice in a nuclear facility construction project. It also explains experiences resolving security vulnerabilities of the system and gives lessons learned about considerations in a real construction.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Cyber security implementation</subfield><subfield code="2">Elsevier</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Software verification and validation</subfield><subfield code="2">Elsevier</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Cyber security plan</subfield><subfield code="2">Elsevier</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Cyber security</subfield><subfield code="2">Elsevier</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">Elsevier</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Suh, YongSuk</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Park, Cheol</subfield><subfield code="4">oth</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Enthalten in</subfield><subfield code="n">Elsevier Science</subfield><subfield code="a">Meyers, Carina Mello Guimaraes ELSEVIER</subfield><subfield code="t">Histone deacetylase 5 is a phosphorylation substrate of protein kinase D in osteoclasts</subfield><subfield code="d">2022</subfield><subfield code="d">the international review journal covering all aspects of nuclear energy</subfield><subfield code="g">Amsterdam [u.a.]</subfield><subfield code="w">(DE-627)ELV007755775</subfield></datafield><datafield tag="773" ind1="1" ind2="8"><subfield code="g">volume:88</subfield><subfield code="g">year:2016</subfield><subfield code="g">pages:88-94</subfield><subfield code="g">extent:7</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1016/j.pnucene.2015.12.009</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_USEFLAG_U</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ELV</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SYSFLAG_U</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SSG-OLC-PHA</subfield></datafield><datafield tag="936" ind1="b" ind2="k"><subfield code="a">44.83</subfield><subfield code="j">Rheumatologie</subfield><subfield code="j">Orthopädie</subfield><subfield code="q">VZ</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">AR</subfield></datafield><datafield tag="952" ind1=" " ind2=" "><subfield code="d">88</subfield><subfield code="j">2016</subfield><subfield code="h">88-94</subfield><subfield code="g">7</subfield></datafield><datafield tag="953" ind1=" " ind2=" "><subfield code="2">045F</subfield><subfield code="a">620</subfield></datafield></record></collection>
|
author |
Park, JaeKwan |
spellingShingle |
Park, JaeKwan ddc 620 ddc 610 bkl 44.83 Elsevier Cyber security implementation Elsevier Software verification and validation Elsevier Cyber security plan Elsevier Cyber security Elsevier Computer security Implementation of cyber security for safety systems of nuclear facilities |
authorStr |
Park, JaeKwan |
ppnlink_with_tag_str_mv |
@@773@@(DE-627)ELV007755775 |
format |
electronic Article |
dewey-ones |
620 - Engineering & allied operations 610 - Medicine & health |
delete_txt_mv |
keep |
author_role |
aut |
collection |
elsevier |
remote_str |
true |
illustrated |
Not Illustrated |
topic_title |
620 620 DE-600 610 VZ 44.83 bkl Implementation of cyber security for safety systems of nuclear facilities Cyber security implementation Elsevier Software verification and validation Elsevier Cyber security plan Elsevier Cyber security Elsevier Computer security Elsevier |
topic |
ddc 620 ddc 610 bkl 44.83 Elsevier Cyber security implementation Elsevier Software verification and validation Elsevier Cyber security plan Elsevier Cyber security Elsevier Computer security |
topic_unstemmed |
ddc 620 ddc 610 bkl 44.83 Elsevier Cyber security implementation Elsevier Software verification and validation Elsevier Cyber security plan Elsevier Cyber security Elsevier Computer security |
topic_browse |
ddc 620 ddc 610 bkl 44.83 Elsevier Cyber security implementation Elsevier Software verification and validation Elsevier Cyber security plan Elsevier Cyber security Elsevier Computer security |
format_facet |
Elektronische Aufsätze Aufsätze Elektronische Ressource |
format_main_str_mv |
Text Zeitschrift/Artikel |
carriertype_str_mv |
zu |
author2_variant |
y s ys c p cp |
hierarchy_parent_title |
Histone deacetylase 5 is a phosphorylation substrate of protein kinase D in osteoclasts |
hierarchy_parent_id |
ELV007755775 |
dewey-tens |
620 - Engineering 610 - Medicine & health |
hierarchy_top_title |
Histone deacetylase 5 is a phosphorylation substrate of protein kinase D in osteoclasts |
isfreeaccess_txt |
false |
familylinks_str_mv |
(DE-627)ELV007755775 |
title |
Implementation of cyber security for safety systems of nuclear facilities |
ctrlnum |
(DE-627)ELV035090294 (ELSEVIER)S0149-1970(15)30127-X |
title_full |
Implementation of cyber security for safety systems of nuclear facilities |
author_sort |
Park, JaeKwan |
journal |
Histone deacetylase 5 is a phosphorylation substrate of protein kinase D in osteoclasts |
journalStr |
Histone deacetylase 5 is a phosphorylation substrate of protein kinase D in osteoclasts |
lang_code |
eng |
isOA_bool |
false |
dewey-hundreds |
600 - Technology |
recordtype |
marc |
publishDateSort |
2016 |
contenttype_str_mv |
zzz |
container_start_page |
88 |
author_browse |
Park, JaeKwan |
container_volume |
88 |
physical |
7 |
class |
620 620 DE-600 610 VZ 44.83 bkl |
format_se |
Elektronische Aufsätze |
author-letter |
Park, JaeKwan |
doi_str_mv |
10.1016/j.pnucene.2015.12.009 |
dewey-full |
620 610 |
title_sort |
implementation of cyber security for safety systems of nuclear facilities |
title_auth |
Implementation of cyber security for safety systems of nuclear facilities |
abstract |
Digital computers have been chosen as a safety system in newly constructed nuclear facilities. Owing to digitalization, cyber threats to nuclear facilities have increased and the integrity of the digital safety systems has been threatened. To cope with such threats, the nuclear regulatory agency has published guidelines for digital safety systems. This paper suggests an implementation method of cyber security for the safety system in the development phase. It introduces specific security activities based on a practice in a nuclear facility construction project. It also explains experiences resolving security vulnerabilities of the system and gives lessons learned about considerations in a real construction. |
abstractGer |
Digital computers have been chosen as a safety system in newly constructed nuclear facilities. Owing to digitalization, cyber threats to nuclear facilities have increased and the integrity of the digital safety systems has been threatened. To cope with such threats, the nuclear regulatory agency has published guidelines for digital safety systems. This paper suggests an implementation method of cyber security for the safety system in the development phase. It introduces specific security activities based on a practice in a nuclear facility construction project. It also explains experiences resolving security vulnerabilities of the system and gives lessons learned about considerations in a real construction. |
abstract_unstemmed |
Digital computers have been chosen as a safety system in newly constructed nuclear facilities. Owing to digitalization, cyber threats to nuclear facilities have increased and the integrity of the digital safety systems has been threatened. To cope with such threats, the nuclear regulatory agency has published guidelines for digital safety systems. This paper suggests an implementation method of cyber security for the safety system in the development phase. It introduces specific security activities based on a practice in a nuclear facility construction project. It also explains experiences resolving security vulnerabilities of the system and gives lessons learned about considerations in a real construction. |
collection_details |
GBV_USEFLAG_U GBV_ELV SYSFLAG_U SSG-OLC-PHA |
title_short |
Implementation of cyber security for safety systems of nuclear facilities |
url |
https://doi.org/10.1016/j.pnucene.2015.12.009 |
remote_bool |
true |
author2 |
Suh, YongSuk Park, Cheol |
author2Str |
Suh, YongSuk Park, Cheol |
ppnlink |
ELV007755775 |
mediatype_str_mv |
z |
isOA_txt |
false |
hochschulschrift_bool |
false |
author2_role |
oth oth |
doi_str |
10.1016/j.pnucene.2015.12.009 |
up_date |
2024-07-06T16:39:06.838Z |
_version_ |
1803848459844845568 |
fullrecord_marcxml |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01000caa a22002652 4500</leader><controlfield tag="001">ELV035090294</controlfield><controlfield tag="003">DE-627</controlfield><controlfield tag="005">20230625203010.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">180603s2016 xx |||||o 00| ||eng c</controlfield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1016/j.pnucene.2015.12.009</subfield><subfield code="2">doi</subfield></datafield><datafield tag="028" ind1="5" ind2="2"><subfield code="a">GBVA2016004000014.pica</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627)ELV035090294</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ELSEVIER)S0149-1970(15)30127-X</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">620</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">620</subfield><subfield code="q">DE-600</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">610</subfield><subfield code="q">VZ</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">44.83</subfield><subfield code="2">bkl</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Park, JaeKwan</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Implementation of cyber security for safety systems of nuclear facilities</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="c">2016transfer abstract</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">7</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">nicht spezifiziert</subfield><subfield code="b">zzz</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">nicht spezifiziert</subfield><subfield code="b">z</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">nicht spezifiziert</subfield><subfield code="b">zu</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Digital computers have been chosen as a safety system in newly constructed nuclear facilities. Owing to digitalization, cyber threats to nuclear facilities have increased and the integrity of the digital safety systems has been threatened. To cope with such threats, the nuclear regulatory agency has published guidelines for digital safety systems. This paper suggests an implementation method of cyber security for the safety system in the development phase. It introduces specific security activities based on a practice in a nuclear facility construction project. It also explains experiences resolving security vulnerabilities of the system and gives lessons learned about considerations in a real construction.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Digital computers have been chosen as a safety system in newly constructed nuclear facilities. Owing to digitalization, cyber threats to nuclear facilities have increased and the integrity of the digital safety systems has been threatened. To cope with such threats, the nuclear regulatory agency has published guidelines for digital safety systems. This paper suggests an implementation method of cyber security for the safety system in the development phase. It introduces specific security activities based on a practice in a nuclear facility construction project. It also explains experiences resolving security vulnerabilities of the system and gives lessons learned about considerations in a real construction.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Cyber security implementation</subfield><subfield code="2">Elsevier</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Software verification and validation</subfield><subfield code="2">Elsevier</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Cyber security plan</subfield><subfield code="2">Elsevier</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Cyber security</subfield><subfield code="2">Elsevier</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">Elsevier</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Suh, YongSuk</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Park, Cheol</subfield><subfield code="4">oth</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Enthalten in</subfield><subfield code="n">Elsevier Science</subfield><subfield code="a">Meyers, Carina Mello Guimaraes ELSEVIER</subfield><subfield code="t">Histone deacetylase 5 is a phosphorylation substrate of protein kinase D in osteoclasts</subfield><subfield code="d">2022</subfield><subfield code="d">the international review journal covering all aspects of nuclear energy</subfield><subfield code="g">Amsterdam [u.a.]</subfield><subfield code="w">(DE-627)ELV007755775</subfield></datafield><datafield tag="773" ind1="1" ind2="8"><subfield code="g">volume:88</subfield><subfield code="g">year:2016</subfield><subfield code="g">pages:88-94</subfield><subfield code="g">extent:7</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1016/j.pnucene.2015.12.009</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_USEFLAG_U</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ELV</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SYSFLAG_U</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SSG-OLC-PHA</subfield></datafield><datafield tag="936" ind1="b" ind2="k"><subfield code="a">44.83</subfield><subfield code="j">Rheumatologie</subfield><subfield code="j">Orthopädie</subfield><subfield code="q">VZ</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">AR</subfield></datafield><datafield tag="952" ind1=" " ind2=" "><subfield code="d">88</subfield><subfield code="j">2016</subfield><subfield code="h">88-94</subfield><subfield code="g">7</subfield></datafield><datafield tag="953" ind1=" " ind2=" "><subfield code="2">045F</subfield><subfield code="a">620</subfield></datafield></record></collection>
|
score |
7.401078 |