{"title":"在共享串行级数据的同时保护敏感业务信息","authors":"Davide Zanetti, Srdjan Capkun","doi":"10.1109/EDOCW.2008.49","DOIUrl":null,"url":null,"abstract":"Within supply chains, the adoption of RFID technology promises to have a beneficial impact: by sharing serial-level data, supply chain partners can optimize and automate their operations. However, several partners have expressed concerns on the possible misuses of shared serial-level data; this may act as strong deterrent on data sharing, resulting in a lost of all potential benefits. This paper analyzes the problem of leakage of sensitive business information in scenarios in which business partners share serial-level data, provides a framework for describing correlations between sensitive business information and serial-level data, and presents an architecture called Sensitive Information Leakage Monitor (SILM), that, based on defined correlations, detects and prevents leakages of sensitive business information while it enables sharing of serial- level data.","PeriodicalId":205960,"journal":{"name":"2008 12th Enterprise Distributed Object Computing Conference Workshops","volume":"108 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2008-09-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"6","resultStr":"{\"title\":\"Protecting Sensitive Business Information While Sharing Serial-Level Data\",\"authors\":\"Davide Zanetti, Srdjan Capkun\",\"doi\":\"10.1109/EDOCW.2008.49\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Within supply chains, the adoption of RFID technology promises to have a beneficial impact: by sharing serial-level data, supply chain partners can optimize and automate their operations. However, several partners have expressed concerns on the possible misuses of shared serial-level data; this may act as strong deterrent on data sharing, resulting in a lost of all potential benefits. This paper analyzes the problem of leakage of sensitive business information in scenarios in which business partners share serial-level data, provides a framework for describing correlations between sensitive business information and serial-level data, and presents an architecture called Sensitive Information Leakage Monitor (SILM), that, based on defined correlations, detects and prevents leakages of sensitive business information while it enables sharing of serial- level data.\",\"PeriodicalId\":205960,\"journal\":{\"name\":\"2008 12th Enterprise Distributed Object Computing Conference Workshops\",\"volume\":\"108 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2008-09-16\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"6\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2008 12th Enterprise Distributed Object Computing Conference Workshops\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/EDOCW.2008.49\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2008 12th Enterprise Distributed Object Computing Conference Workshops","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/EDOCW.2008.49","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Protecting Sensitive Business Information While Sharing Serial-Level Data
Within supply chains, the adoption of RFID technology promises to have a beneficial impact: by sharing serial-level data, supply chain partners can optimize and automate their operations. However, several partners have expressed concerns on the possible misuses of shared serial-level data; this may act as strong deterrent on data sharing, resulting in a lost of all potential benefits. This paper analyzes the problem of leakage of sensitive business information in scenarios in which business partners share serial-level data, provides a framework for describing correlations between sensitive business information and serial-level data, and presents an architecture called Sensitive Information Leakage Monitor (SILM), that, based on defined correlations, detects and prevents leakages of sensitive business information while it enables sharing of serial- level data.