Skip to main content
Top

2013 | OriginalPaper | Chapter

Multi-level Access Control in the Data Pipeline of the International Supply Chain System

Authors : Potchara Pruksasri, Jan van den Berg, Wout Hofman, Semir Daskapan

Published in: Innovation in the High-Tech Economy

Publisher: Springer Berlin Heidelberg

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

The Seamless Integrated Data Pipeline system was proposed to the European Union in order to overcome the information quality shortcomings of the current international supply chain information exchange systems. Next to identification and authorization of stakeholders, secure access control needs to be considered at design time of the new data pipeline system. This challenge is taken up in this paper. First, based on an analysis of the proposed data pipeline concept, access control requirements are being defined. Second, a new multi-level access control model is being designed. The resulting model organizes access control at two levels, namely, at country and at service level, herewith enabling secure information exchange between global stakeholders.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
go back to reference Adams C, Lloyd S (2002) Understanding PKI: concepts, standards, and deployment considerations. Addison-Wesley Longman Publishing Co., Inc., Boston Adams C, Lloyd S (2002) Understanding PKI: concepts, standards, and deployment considerations. Addison-Wesley Longman Publishing Co., Inc., Boston
go back to reference Bell DE, La Padula LJ (1976) Secure computer system: unified exposition and multics interpretation: DTIC Document 1976 Bell DE, La Padula LJ (1976) Secure computer system: unified exposition and multics interpretation: DTIC Document 1976
go back to reference Daskapan S, Costa A, Vree W, Eldin A (2004) Virtual trust in distributed systems trust and privacy in digital business. In: Katsikas S, Lopez J, Pernul G (eds) Lecture notes in computer science. Springer, Berlin, pp 30–39 Daskapan S, Costa A, Vree W, Eldin A (2004) Virtual trust in distributed systems trust and privacy in digital business. In: Katsikas S, Lopez J, Pernul G (eds) Lecture notes in computer science. Springer, Berlin, pp 30–39
go back to reference Hesketh D (2009) Seamless electronic data and logistics pipelines shift focus from import declarations to start of commercial transaction. World Cust J 3(1):27–32 Hesketh D (2009) Seamless electronic data and logistics pipelines shift focus from import declarations to start of commercial transaction. World Cust J 3(1):27–32
go back to reference Hesketh D (2010) Weaknesses in the supply chain: who packed the box? World Cust J 4(2):17 Hesketh D (2010) Weaknesses in the supply chain: who packed the box? World Cust J 4(2):17
go back to reference Hofman W (2011) Supply chain visibility with linked open data for supply chain risk analysis. In: Overbeek S, Tan Y-H, Zomer G (eds) 1st workshop on IT innovations enabling seamless and secure supply chains, Delft, The Netherlands, pp 20–31 Hofman W (2011) Supply chain visibility with linked open data for supply chain risk analysis. In: Overbeek S, Tan Y-H, Zomer G (eds) 1st workshop on IT innovations enabling seamless and secure supply chains, Delft, The Netherlands, pp 20–31
go back to reference Hulstijn J, Overbeek S, Aldewereld H, Christiaanse R (2012) Integrity of supply chain visibility. In: Bajec M, Eder J (eds) Advanced information systems engineering workshops. Lecture notes in business information processing. Springer, Berlin, pp 351–365 Hulstijn J, Overbeek S, Aldewereld H, Christiaanse R (2012) Integrity of supply chain visibility. In: Bajec M, Eder J (eds) Advanced information systems engineering workshops. Lecture notes in business information processing. Springer, Berlin, pp 351–365
go back to reference Johnson BC (2010) Information security basics. Inf Syst Secur Associ (ISSA J) 8:28–34 Johnson BC (2010) Information security basics. Inf Syst Secur Associ (ISSA J) 8:28–34
go back to reference Pruksasri P, Berg Jvd, Hofman W(2012) Three protocols for securing the Data Pipeline of the international supply chain. In: IADIS multi conference on computer science and information systems, Lisbon, Portugal, July 17–23 2012, pp 27–34 Pruksasri P, Berg Jvd, Hofman W(2012) Three protocols for securing the Data Pipeline of the international supply chain. In: IADIS multi conference on computer science and information systems, Lisbon, Portugal, July 17–23 2012, pp 27–34
go back to reference Rukanova B, Baida Z, Liu J, Stijn E, Tan Y-H, Hofman W et al (2011) Beer living lab. In: Tan Y-H, Bjørn-Andersen N, Klein S, Rukanova B (eds) Accelerating global supply chains with IT-innovation. Springer, Berlin/Heidelberg, pp 37–54CrossRef Rukanova B, Baida Z, Liu J, Stijn E, Tan Y-H, Hofman W et al (2011) Beer living lab. In: Tan Y-H, Bjørn-Andersen N, Klein S, Rukanova B (eds) Accelerating global supply chains with IT-innovation. Springer, Berlin/Heidelberg, pp 37–54CrossRef
go back to reference Stallings W (2003) Network security essentials, application and standards. Prentice Hall, Upper Saddle River Stallings W (2003) Network security essentials, application and standards. Prentice Hall, Upper Saddle River
Metadata
Title
Multi-level Access Control in the Data Pipeline of the International Supply Chain System
Authors
Potchara Pruksasri
Jan van den Berg
Wout Hofman
Semir Daskapan
Copyright Year
2013
Publisher
Springer Berlin Heidelberg
DOI
https://doi.org/10.1007/978-3-642-41585-2_7