Protecting Sensitive Business Information while Sharing Serial-Level Data

被引:0
|
作者
Zanetti, Davide [1 ]
Capkun, Srdjan [2 ]
机构
[1] Swiss Fed Inst Technol, Zurich, Switzerland
[2] Swiss Fed Inst Technol, Dept Comp Sci, Zurich, Switzerland
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Within supply chains, the adoption of RFID technology promises to have a beneficial impact: by sharing serial-level data, supply chain partners can optimize and automate their operations. However several partners have expressed concerns on the possible misuses of shared serial-level data; this may act as strong deterrent on data sharing, resulting in a lost of all potential benefits. This paper analyzes the problem of leakage of sensitive business information in scenarios in which business partners share serial-level data, provides a framework for describing correlations between sensitive business information and serial-level data, and presents an architecture called Sensitive Information Leakage Monitor (SILM), that, based on defined correlations, detects and prevents leakages of sensitive business information while it enables sharing of serial-level data.
引用
收藏
页码:248 / +
页数:2
相关论文
共 35 条
  • [1] INFORMATION SHARING OF SENSITIVE BUSINESS DATA WITH EMPLOYEES
    KLEINER, MM
    BOUILLON, ML
    [J]. INDUSTRIAL RELATIONS, 1991, 30 (03): : 480 - 491
  • [2] Bayesian Supply Chain Tracking Using Serial-Level Information
    Kelepouris, Thomas
    Harrison, Mark
    McFarlane, Duncan
    [J]. IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART C-APPLICATIONS AND REVIEWS, 2011, 41 (05): : 733 - 742
  • [3] Differential privacy for public health data: An innovative tool to optimize information sharing while protecting data confidentiality
    Dyda, Amalie
    Purcell, Michael
    Curtis, Stephanie
    Field, Emma
    Pillai, Priyanka
    Ricardo, Kieran
    Weng, Haotian
    Moore, Jessica C.
    Hewett, Michael
    Williams, Graham
    Lau, Colleen L.
    [J]. PATTERNS, 2021, 2 (12):
  • [4] InfoClean: Protecting Sensitive Information in Data Cleaning
    Chiang, Fei
    Gairola, Dhruv
    [J]. ACM JOURNAL OF DATA AND INFORMATION QUALITY, 2018, 9 (04):
  • [5] Navigating Clinical and Business Ethics While Sharing Patient Data
    Michelson, Kelly N.
    Adams, James G.
    Faber, Joshua M. M.
    [J]. JAMA-JOURNAL OF THE AMERICAN MEDICAL ASSOCIATION, 2022, 327 (11): : 1025 - 1026
  • [6] Protecting Privacy while Sharing Medical Data Between Regional Healthcare Entities
    Grandison, Tyrone
    Ganta, Srivatsava Ranjit
    Braun, Uri
    Kaufman, James
    [J]. MEDINFO 2007: PROCEEDINGS OF THE 12TH WORLD CONGRESS ON HEALTH (MEDICAL) INFORMATICS, PTS 1 AND 2: BUILDING SUSTAINABLE HEALTH SYSTEMS, 2007, 129 : 483 - +
  • [7] Self Protecting Data for De-perimeterised Information Sharing
    Burnap, Pete
    Hilton, Jeremy
    [J]. THIRD INTERNATIONAL CONFERENCE ON DIGITAL SOCIETY: ICDS 2009, PROCEEDINGS, 2009, : 65 - 70
  • [8] Protecting business intelligence and customer privacy while outsourcing data mining tasks
    Ling Qiu
    Yingjiu Li
    Xintao Wu
    [J]. Knowledge and Information Systems, 2008, 17 : 99 - 120
  • [9] Protecting business intelligence and customer privacy while outsourcing data mining tasks
    Qiu, Ling
    Li, Yingjiu
    Wu, Xintao
    [J]. KNOWLEDGE AND INFORMATION SYSTEMS, 2008, 17 (01) : 99 - 120
  • [10] The Key Theory: Authenticating Decrypted Information in Litigation While Protecting Sensitive Sources and Methods
    Patterson, Nicholas J.
    [J]. TEXAS LAW REVIEW, 2010, 88 (07) : 1767 - 1794