The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.09 - Sept. (2011 vol.44)
pp: 38-43
Axel Schröpfer , SAP Research Karlsruhe, Germany
Antonio Zilli , University of Salento, Italy
Richard Pibernik , EBS Business School, Germany
Octavian Catrina , University of Mannheim, Germany
Sebastiaan de Hoogh , Eindhoven University of Technology, Netherlands
Berry Schoenmakers , Eindhoven University of Technology, Netherlands
Stelvio Cimato , Universita degli studi di Milano, Italy
Ernesto Damiani , Universita degli studi di Milano, Italy
ABSTRACT
The SecureSCM project demonstrates the practical applicability of secure multiparty computation to online business collaboration. A prototype supply-chain management system protects the confidentiality of private data while rapidly adapting to changing business needs.
INDEX TERMS
Collaboration, Security, Secure multiparty computation, Supply-chain management
CITATION
Axel Schröpfer, Antonio Zilli, Richard Pibernik, Octavian Catrina, Sebastiaan de Hoogh, Berry Schoenmakers, Stelvio Cimato, Ernesto Damiani, "Secure Collaborative Supply-Chain Management", Computer, vol.44, no. 9, pp. 38-43, Sept. 2011, doi:10.1109/MC.2011.224
REFERENCES
1. O. Catrina and S. de Hoogh, "Improved Primitives for Secure Multiparty Integer Computation," Proc. 7th Conf. Security and Cryptography for Networks (SCN 10), LNCS 6280, Springer, 2010, pp. 182-199.
2. O. Catrina and A. Saxena, "Secure Computation with Fixed-Point Numbers," Proc. 14th Int'l Conf. Financial Cryptography and Data Security (FC 10), LNCS 6052, Springer, 2010, pp. 35-50.
3. T. Toft, "Solving Linear Programs Using Multiparty Computation," Proc. 13th Int'l Conf. Financial Cryptography and Data Security (FC 09), LNCS 5629, Springer, 2009, pp. 90-107.
4. O. Catrina and S. de Hoogh, "Secure Multiparty Linear Programming Using Fixed-Point Arithmetic," Proc. 15th European Symp. Research in Computer Security (ESORICS 10), LNCS 6345, Springer, 2010, pp. 134-150.
5. A. Schröpfer, F. Kerschbaum, and G. Müller, "L1—An Intermediate Language for Mixed-Protocol Secure Computation," Proc. 35th Ann. IEEE Computer Software and Applications Conf. (COMPSAC 11), IEEE CS Press, 2011; http://eprint.iacr.org/2010578.pdf.
6. M. Anisetti et al., "Using Incentive Schemes to Alleviate Supply Chain Risks," Proc. Int'l Conf. Management of Emergent Digital EcoSystems (MEDES 10), ACM Press, 2010, pp. 221-228.
7. F. Kerschbaum and A. Schaad, "Privacy-Preserving Social Network Analysis for Criminal Investigations," Proc. 7th ACM Workshop on Privacy in the Electronic Society (WPES 08), ACM Press, 2008, pp. 9-14.
17 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool