Filters








4,113 Hits in 4.7 sec

A Novel Cyber-Security Framework Leveraging Programmable Capabilities in Digital Services

Matteo Repetto, Alessandro Carrega, Armend Duzha
2020 Zenodo  
We also describe a novel framework for managing such functions and implement multiple security services for complex business chains.  ...  In this paper, we briefly review the main characteristics of emerging digital services, point out open cyber-security challenges, and discuss the need to include cyber-security programmable capabilities  ...  Figure 5 : 5 Reference architecture for next-generation cyber-security frameworks for digital value chains.  ... 
doi:10.5281/zenodo.4267986 fatcat:hwxoa2q475gbxadttu5tz3l3ru

Towards Autonomous Security Assurance in 5G Infrastructures

Stefan Covaci, Matteo Repetto, Fulvio Risso
2018 IEICE transactions on communications  
In this paper, we outline a new paradigm towards autonomous security assurance in 5G infrastructures, leveraging service orchestration for semi-autonomous management and reaction, yet decoupling security  ...  Our work is expected to improve the design and deployment of complex business chains, as well as the application of artificial intelligence and machine learning techniques over large and intertwined security  ...  A Use Case for 5G: Trusted Food Supply Chain Food supply is a typical example of business chain where suppliers, shippers, dealers, and even consumers need to share information for both commercial and  ... 
doi:10.1587/transcom.2018nvi0001 fatcat:y35kz5po4raz3afb2uwyk3c2ky

APPROACH TO HANDLING CYBER SECURITY RISKS IN SUPPLY CHAIN

J Angel Reuben, Nilesh Ware
2019 Industrial Engineering Journal  
The primary objective of this paper is to understand the various sources of supply chain poisoning, and then provides some mitigation strategies, finally, a framework with recommendations for mitigation  ...  to cyber security risks in supply chain in defence has been worked out based on the research carried out.  ...  Proposed Framework for Supply Chain Cyber Risk Mitigation: Based on the study carried out the Cyber Security Risks to Supply Chain is an ongoing or continuously evolving field.  ... 
doi:10.26488/iej.12.7.1178 fatcat:jvq6kifl4rbajk2zzs2ddbujaq

SESCF: A Secure and Efficient Supply Chain Framework via Blockchain-Based Smart Contracts

Menghui Lou, Xiaolei Dong, Zhenfu Cao, Jiachen Shen, Debiao He
2021 Security and Communication Networks  
Therefore, this paper proposes a blockchain-based supply chain framework (SESCF), which solves the supply chain problems securely and efficiently.  ...  The demands for the fairness, security, and efficiency of the supply chain have grown significantly due to the rise of globalization.  ...  Conclusion We proposed SESCF, a secure and efficient supply chain framework.  ... 
doi:10.1155/2021/8884478 fatcat:7wrdsdtkn5esnlr2eyrrz76zta

Governance on the Drug Supply Chain via Gcoin Blockchain

Jen-Hung Tseng, Yen-Chih Liao, Bin Chong, Shih-wei Liao
2018 International Journal of Environmental Research and Public Health  
Additionally, the regulation model of the drug supply chain could be altered from the inspection and examination only model to the surveillance net model, and every unit that is involved in the drug supply  ...  Additionally, the regulation model of the drug supply chain could be altered from the inspection and examination only model to the surveillance net model, and every unit that is involved in the drug supply  ...  chain partners", and "Internet security" [20] .  ... 
doi:10.3390/ijerph15061055 pmid:29882861 pmcid:PMC6025275 fatcat:wwtiq52gknhb3ifq4ipjq6bnvi

An Autonomous Cybersecurity Framework for Next-generation Digital Service Chains

Matteo Repetto, Domenico Striccoli, Giuseppe Piro, Alessandro Carrega, Gennaro Boggia, Raffaele Bolla
2021 Journal of Network and Systems Management  
of detail of inspection and monitoring processes.  ...  AbstractToday, the digital economy is pushing new business models, based on the creation of value chains for data processing, through the interconnection of processes, products, services, software, and  ...  The trustworthiness of the providers can be verified by checking a user-supplied list of trusted operators, or building their reputation based on external trust chains.  ... 
doi:10.1007/s10922-021-09607-7 fatcat:fyacmqb4nvaubmjaqxht3rg67y

Using Ontologies to Develop and Test a Certification and Inspection Data Infrastructure Building Block [chapter]

Joanne S. Luciano, Djoko S. Sayogo, Weijia Ran, Nicolau Depaula, Holly Jarman, Luis F. Luna-Reyes, Giri K. Tayi, Jing Zhang, Jana Hrdinova, Deborah Lines Andersen, David F. Andersen, Theresa A. Pardo
2016 Private Data and Public Value  
process for any product and service.  ...  the trustworthiness of certification schemes but also that our ontology generates consistent results.  ...  supply chain that feeds the consumer marketplace.  ... 
doi:10.1007/978-3-319-27823-0_5 fatcat:bw2n3lrykncvlcp2hgcs75hpqq

D2.1 Vision, State of the Art and Requirements Analysis

Striccoli Domenico
2019 Zenodo  
and demonstration use cases; (ii) to perform an analysis of the State of the Art and current market solutions; (iii) to identify and describe the technical and architectural requirements of the GUARD framework  ...  (secure chaining), see R12; • track data for secure propagation, see R13; • detect and verify the trustworthiness of services, see R14.  ...  Let's consider, for example, an industrial supply chain that encompasses manufacturing, transportation, and assembly.  ... 
doi:10.5281/zenodo.4268474 fatcat:vtvogbwapzdc7nn6vms2cvdjou

Introduction to Hardware Security

Yier Jin
2015 Electronics  
For the same reason, the research scope of hardware security has never been clearly defined.  ...  Emerging hardware security topics will also be clearly depicted through which the future trend will be elaborated, making this survey paper a good reference for the continuing research efforts in this  ...  Similar to FPCC and CAP framework, the new PCH framework uses the Coq functional language for proof construction and leverages the Coq platform for automatic proof validation [67] .  ... 
doi:10.3390/electronics4040763 fatcat:njdmrvdogzc73mp4yun6rpnun4

The design of an electronic pedigree system for food safety

Weili Han, Yun Gu, Wei Wang, Yin Zhang, Yuliang Yin, Junyu Wang, Li-Rong Zheng
2012 Information Systems Frontiers  
Finally, we analyze the trustworthiness assurance and security of our electronic pedigree system.  ...  This paper, therefore, introduces the design of an electronic pedigree system for food safety, which uses electronic pedigrees to enhance the safety of food supply.  ...  Min Li for her English polish.  ... 
doi:10.1007/s10796-012-9372-y fatcat:y7gdcnmo2jemdfekx62rh5bkau

D2.1 Vision, State of the Art and Requirements Analysis

Striccoli Domenico
2019 Zenodo  
and demonstration use cases; (ii) to perform an analysis of the State of the Art and current market solutions; (iii) to identify and describe the technical and architectural requirements of the GUARD framework  ...  Let's consider, for example, an industrial supply chain that encompasses manufacturing, transportation, and assembly.  ...  GUARD will address assessment of trustworthiness, by formal methods to derive the trust level from the set of available security properties for each service involved in the chain.  ... 
doi:10.5281/zenodo.3564301 fatcat:lrb6r6zat5bk5oqwpwwlui3ztm

Building Secure Clouds by Perpetual Auditing using Blockchain Technology.pdf

Balamurugan N
2020 Figshare  
But due to security and privacy concerns about the dependability of their CSP, consumers of Cloud service are irresolute to select cloud services.  ...  Also, by implementing the blockchain technology, the user's data will be split into blocks and stored in different servers which makes the data more secure.  ...  Thus the preceding signs are twice checked for Block level Probity Inspection.  ... 
doi:10.6084/m9.figshare.12206003.v1 fatcat:kxffoal6erfqzplklt6ud4dkkq

Towards a Backdoorless Network Architecture Based on Remote Attestation and Backdoor Inspection [article]

Takayuki Sasaki, Yusuke Shimada
2020 arXiv   pre-print
To keep a system secure, all devices in the system need to be benign.  ...  Specifically, the backdoor inspection result is stored in a server and the verifier retrieves and checks the backdoor inspection result when the remote attestation is performed.  ...  Integration with supply chain management In addition to the above technical measures, an ecosystem of a secure supply chain can be enforced as well.  ... 
arXiv:2007.14748v2 fatcat:o4ogqfmh7bcwppratpr5ndjoc4

Blockchain for automotive: An insight towards the IPFS blockchain-based auto insurance sector

Nishara Nizamuddin, Ahed Abugabah
2021 International Journal of Power Electronics and Drive Systems (IJPEDS)  
We present a decentralized IPFS and blockchain-based framework for the auto insurance sector that regulates the activities in terms of insurance claims for automobiles and automates payments.  ...  This article also discusses how blockchain technology's features can be useful for the decentralized autonomous vehicle's ecosystem.  ...  A similar model can be deployed for developing a transparent, secure, and tamperproof model for handling transactions in multiparty environments like the land registry, supply chain, logistics, healthcare  ... 
doi:10.11591/ijece.v11i3.pp2443-2456 fatcat:245a6x4bzjcpzenp64erajlg6a

Trust and tamper-proof software delivery

Martin Naedele, Thomas E. Koch
2006 Proceedings of the 2006 international workshop on Software engineering for secure systems - SESS '06  
This paper examines different trust models in the software supply chain and their rationales. Any trust-based supply chain also requires as prerequisite a tamper-proof distribution channel.  ...  Complete inspection of acquired code is, if not impossible, at least impractical and uneconomical for commercial software.  ...  Software production forms a supply chain. This is also true for most security and safety critical software applications, such as control systems for critical infrastructure.  ... 
doi:10.1145/1137627.1137636 dblp:conf/icse/NaedeleK06 fatcat:ja2rtwfhdrdwbj3xic624rvxoi
« Previous Showing results 1 — 15 out of 4,113 results