2011 IEEE International Conference on RFID-Technologies and Applications 2011
DOI: 10.1109/rfid-ta.2011.6068668
|View full text |Cite
|
Sign up to set email alerts
|

Auto-ID enabled tracking and tracing data sharing over dynamic B2B and B2G relationships

Abstract: Growing complexity and uncertainty are still the key challenges enterprises are facing in managing and re-engineering their existing supply chains. To tackle these challenges, they are continuing innovating management practices and piloting emerging technologies for achieving supply chain visibility, agility, adaptability and security. Nowadays, subcontracting has already become a common practice in modern logistics industry through partnership establishment between the involved stakeholders for delivering con… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
6
0

Year Published

2012
2012
2024
2024

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(6 citation statements)
references
References 24 publications
0
6
0
Order By: Relevance
“…The paper [19] optimizes the logistics costs while protecting user privacy information by using artificial intelligence methods, formalizing the problem as a distributed constraint optimization problem (DCOP), and using various cryptographic encryption techniques to process data in the logistics system. F. Xu et al [20] proposed a unified privacy-preserving mechanism for participants to register and cancel strategic and business relationships; set and clear job information for cargo transportation under predefined partnerships; and update and clear tracking and tracing data associated with a given job or partnership. Q. Gao [21] proposed a secure logistics information scheme, LIP-PA, using attribute-based encryption and location-based key exchange that implemented a logistics information privacy protection scheme with location and attribute-based access control for mobile devices to provide privacy protection for personal and logistics information.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…The paper [19] optimizes the logistics costs while protecting user privacy information by using artificial intelligence methods, formalizing the problem as a distributed constraint optimization problem (DCOP), and using various cryptographic encryption techniques to process data in the logistics system. F. Xu et al [20] proposed a unified privacy-preserving mechanism for participants to register and cancel strategic and business relationships; set and clear job information for cargo transportation under predefined partnerships; and update and clear tracking and tracing data associated with a given job or partnership. Q. Gao [21] proposed a secure logistics information scheme, LIP-PA, using attribute-based encryption and location-based key exchange that implemented a logistics information privacy protection scheme with location and attribute-based access control for mobile devices to provide privacy protection for personal and logistics information.…”
Section: Related Workmentioning
confidence: 99%
“…Q. Gao [21] proposed a secure logistics information scheme, LIP-PA, using attribute-based encryption and location-based key exchange that implemented a logistics information privacy protection scheme with location and attribute-based access control for mobile devices to provide privacy protection for personal and logistics information. All these solutions start from logistics systems and use cloud computing technology [18], artificial intelligence technology [19], privacy protection mechanisms [20], and cryptography [19,21] to improve the privacy of logistics data and ensure the privacy of sensitive user data.…”
Section: Related Workmentioning
confidence: 99%
“…Once the information is leaked, it will result in serious threaten to the life and safety of users. Some privacy protection methods in LIS have been proposed, such as [17,32,41,29,45,47,49]. We compare our scheme with these systems in Table 1.…”
Section: Related Workmentioning
confidence: 99%
“…But the disadvantage of this scheme [32] is that the anonymization of users is not considered. In [49], Frank et al proposed a set of protocols for tracking logistics information, which is a light-weight privacy protection mechanism.…”
Section: Related Workmentioning
confidence: 99%
“…Governments can supply data to businesses but they can also request data from a company, ensuring a flow of data in both directions [25], which are usually referred as G2B and B2G. The data sharing between these instances can be beneficial to both parties [3], [32].…”
Section: Related Researchmentioning
confidence: 99%