STOC '87 Proceedings of the nineteenth annual ACM symposium on Theory of computing
Security-control methods for statistical databases: a comparative study
ACM Computing Surveys (CSUR)
Role-Based Access Control Models
Computer
Information distortion in a supply chain: the bullwhip effect
Management Science - Special issue on frontier research in manufacturing and logistics
A security model for distributed product data management system
Computers in Industry - Advanced web technologies for industrial applications
Achieving k-anonymity privacy protection using generalization and suppression
International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems
Information Sharing in a Supply Chain with Horizontal Competition
Management Science
The Value of Information Sharing in a Two-Level Supply Chain
Management Science
A review of internet-based product information sharing and visualization
Computers in Industry
RBAC Standard Rationale: Comments on "A Critique of the ANSI Standard on Role-Based Access Control"
IEEE Security and Privacy
How to generate and exchange secrets
SFCS '86 Proceedings of the 27th Annual Symposium on Foundations of Computer Science
Strategic Information Management Under Leakage in a Supply Chain
Management Science
Multi-Level modeling and access control for data sharing in collaborative design
Advanced Engineering Informatics
Privacy-preserving data publishing: A survey of recent developments
ACM Computing Surveys (CSUR)
Information Sharing as a Coordination Mechanism for Reducing the Bullwhip Effect in a Supply Chain
IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews
Securing design checking service for the regulation-based product design
Computers in Industry
A model based transformation paradigm for cross-language collaborations
Advanced Engineering Informatics
ICT-EurAsia'13 Proceedings of the 2013 international conference on Information and Communication Technology
Formalization of design chain management using environment-based design (EBD) theory
Journal of Intelligent Manufacturing
Association rule hiding in risk management for retail supply chain collaboration
Computers in Industry
Hi-index | 0.00 |
While information sharing can benefit supply chains significantly, it may also have an adverse effect, namely, information leakage. A limitation common to many existing solutions for preventing information leakage in supply chains is that they rely, either implicitly or explicitly, upon two unrealistic assumptions. First, what information is confidential is well known. Second, confidential information will not be revealed, if only it is not shared, regardless of how much other information is being shared. As we shall show in this paper, those assumptions are not always true due to potential information leakage caused by inferences. Specifically, we propose a conceptual model of such information leakage. The model will enable companies in a supply chain to better understand how their confidential information may be leaked through inferences. On the basis of the proposed conceptual model, we then devise a quantitative approach to evaluating the risk of information leakage caused by inferences when a given amount of information is shared. The quantitative approach will allow companies in a supply chain to measure and consequently mitigate the risk of information leakage. Finally, we discuss a case study to illustrate how the proposed approaches work in practice.