2022
DOI: 10.48550/arxiv.2201.06335
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

End to End Secure Data Exchange in Value Chains with Dynamic Policy Updates

Abstract: Data exchange among value chain partners provides them with a competitive advantage, but the risk of exposing sensitive data is ever-increasing. Information must be protected in storage and transmission to reduce this risk, so only the data producer and the final consumer can access or modify it. End-to-end (E2E) security mechanisms address this challenge, protecting companies from data breaches resulting from value chain attacks. Moreover, value chain particularities must also be considered. Multiple entities… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 24 publications
0
1
0
Order By: Relevance
“…The closest overlap with computer science concerns the processing of data. Most prominently, related work puts great emphasis on tracking and tracing in supply chains [33], [78], protecting against counterfeiting [79], [80], or recording ownership transfers [32], [81]- [83], with only a few approaches proposing end-to-end-secured information flows [84]. Such approaches have in common that they focus on the secure processing of information or identifiers: To date, barely any work considers the tamperproof and authentic sensing of data (G1 & G2) [17].…”
Section: A: Supply Chainsmentioning
confidence: 99%
“…The closest overlap with computer science concerns the processing of data. Most prominently, related work puts great emphasis on tracking and tracing in supply chains [33], [78], protecting against counterfeiting [79], [80], or recording ownership transfers [32], [81]- [83], with only a few approaches proposing end-to-end-secured information flows [84]. Such approaches have in common that they focus on the secure processing of information or identifiers: To date, barely any work considers the tamperproof and authentic sensing of data (G1 & G2) [17].…”
Section: A: Supply Chainsmentioning
confidence: 99%