2016
DOI: 10.1115/1.4034131
|View full text |Cite
|
Sign up to set email alerts
|

Embedding X.509 Digital Certificates in Three-Dimensional Models for Authentication, Authorization, and Traceability of Product Data

Abstract: Exchange and reuse of three-dimensional (3D)-product models are hampered by the absence of trust in product-lifecycle-data quality. The root cause of the missing trust is years of “silo” functions (e.g., engineering, manufacturing, quality assurance) using independent and disconnected processes. Those disconnected processes result in data exchanges that do not contain all of the required information for each downstream lifecycle process, which inhibits the reuse of product data and results in duplicate data. T… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
23
0
1

Year Published

2016
2016
2023
2023

Publication Types

Select...
5
3
1

Relationship

1
8

Authors

Journals

citations
Cited by 20 publications
(25 citation statements)
references
References 22 publications
1
23
0
1
Order By: Relevance
“…This digitization generates a significant amount of data that is exchanged between the different actors and systems involved in the product lifecycle. Trustworthiness is key and only authentic and valid data should be consumed [10]. We presented a blockchain-based solution to secure and authenticate product data.…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…This digitization generates a significant amount of data that is exchanged between the different actors and systems involved in the product lifecycle. Trustworthiness is key and only authentic and valid data should be consumed [10]. We presented a blockchain-based solution to secure and authenticate product data.…”
Section: Resultsmentioning
confidence: 99%
“…Hedberg, Krima, and Camelio [10] presents a methodology to generate digital signatures of product data using X.509 digital certificates. The generated signature contains a digital fingerprint of the asset that is signed and information about the identity of the signer such as his name and organization.…”
Section: Reducing the Digital Threatmentioning
confidence: 99%
“…Of these techniques, the attributes of the 3D model such as features, multi-resolution, and the file containing the 3D model itself, are some of the popular ways of introducing access control into the design process. Different authentication techniques including encryption and digital certificates are used in access control [19,20,21]. All these approaches allow designers to preserve confidentiality while data is at rest or during transit, and are mainly focused on overcoming unauthorized edits and protecting access to sensitive information.…”
Section: Literature Reviewmentioning
confidence: 99%
“…In addition, authentication, authorization, and traceability cannot be ignored. Hedberg et al [38] proposed using X.509 Public Key Infrastructure (X.509-PKI) [39] for embedding trace-ability metadata into artifacts. The embedded metadata would assist functions of the lifecycle in determining what data is, how the data can be used, and who did what to the data.…”
Section: Cyber-infrastructure Integrationmentioning
confidence: 99%