Nothing Special   »   [go: up one dir, main page]

skip to main content
research-article

Offering Two-way Privacy for Evolved Purchase Inquiries

Published: 17 November 2023 Publication History

Abstract

Dynamic and flexible business relationships are expected to become more important in the future to accommodate specialized change requests or small-batch production. Today, buyers and sellers must disclose sensitive information on products upfront before the actual manufacturing. However, without a trust relation, this situation is precarious for the involved companies as they fear for their competitiveness. Related work overlooks this issue so far: existing approaches protect the information of a single party only, hindering dynamic and on-demand business relationships. To account for the corresponding research gap of inadequately privacy-protected information and to deal with companies without an established trust relation, we pursue the direction of innovative privacy-preserving purchase inquiries that seamlessly integrate into today’s established supplier management and procurement processes. Utilizing well-established building blocks from private computing, such as private set intersection and homomorphic encryption, we propose two designs with slightly different privacy and performance implications to securely realize purchase inquiries over the Internet. In particular, we allow buyers to consider more potential sellers without sharing sensitive information and relieve sellers of the burden of repeatedly preparing elaborate yet discarded offers. We demonstrate our approaches’ scalability using two real-world use cases from the domain of production technology. Overall, we present deployable designs that offer two-way privacy for purchase inquiries and, in turn, fill a gap that currently hinders establishing dynamic and flexible business relationships. In the future, we expect significantly increasing research activity in this overlooked area to address the needs of an evolving production landscape.

References

[1]
5stardata.info. 2012. 5-star Open Data. https://5stardata.info/.
[2]
Abbas Acar, Hidayet Aksu, A. Selcuk Uluagac, and Mauro Conti. 2018. A survey on homomorphic encryption schemes: Theory and implementation. Comput. Surveys 51, 4 (2018), 1–35.
[3]
Evgeniy A. Ageshin. 2001. E-procurement at work: A case study. Production and Inventory Management Journal 42, 1 (2001), 48–53.
[4]
Rakesh Agrawal, Jerry Kiernan, Ramakrishnan Srikant, and Yirong Xu. 2004. Order preserving encryption for numeric data. In 2004 ACM SIGMOD International Conference on Management of Data (SIGMOD’04). ACM, 563–574.
[5]
Rebecca Angeles and Ravi Nath. 2007. Business-to-business e-procurement: Success factors and challenges to implementation. Supply Chain Management 12, 2 (2007), 104–115.
[6]
Lennart Bader, Jan Pennekamp, Roman Matzutt, David Hedderich, Markus Kowalski, Volker Lücken, and Klaus Wehrle. 2021. Blockchain-based privacy preservation for supply chains supporting lightweight multi-hop information accountability. Information Processing & Management 58, 3 (2021), 102529.
[7]
Sebastian R. Bader, Irlan Grangel-Gonzalez, Priyanka Nanjappa, Maria-Esther Vidal, and Maria Maleshkova. 2020. A knowledge graph for industry 4.0. In 17th International Conference on the Semantic Web (ESWC’20). Springer, 465–480.
[8]
[9]
Tim Berners-Lee. 2006. Linked Data - Design Issues. https://www.w3.org/DesignIssues/LinkedData.html.
[10]
Alex Bilsing. 2007. Kennzahlengestützte Bewertung der technologischen Leistungsfähigkeit der Fertigung im Werkzeug- und Formenbau. Ph.D. Dissertation. RWTH Aachen University.
[11]
Dan Boneh, Kevin Lewi, Mariana Raykova, Amit Sahai, Mark Zhandry, and Joe Zimmerman. 2015. Semantically secure order-revealing encryption: Multi-input functional encryption without obfuscation. In 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT’15). Springer, 563–594.
[12]
Wolfgang Boos, Christoph Maximilian Bernd Kelzenberg, Johan de Lange, Thilo Konrad Schultes, and Max Busch. 2018. Erfolgreich Lieferanten Managen im Werkzeugbau. Technical Report. WBA Aachener Werkzeugbau Akademie GmbH.
[13]
Felix Brandt. 2006. How to obtain full privacy in auctions. International Journal of Information Security 5, 4 (2006), 201–216.
[14]
Arnaud Braud, Gaël Fromentoux, Benoit Radier, and Olivier Le Grand. 2021. The road to European digital sovereignty with Gaia-X and IDSA. IEEE Network 35, 2 (2021), 4–5.
[15]
Philipp Brauner, Manuela Dalibor, Matthias Jarke, Ike Kunze, István Koren, Gerhard Lakemeyer, Martin Liebenberg, Judith Michael, Jan Pennekamp, Christoph Quix, Bernhard Rumpe, Wil van der Aalst, Klaus Wehrle, Andreas Wortmann, and Martina Ziefle. 2022. A computer science perspective on digital transformation in production. ACM Transactions on Internet of Things 3, 2 (2022), 1--32.
[16]
Nathan Chenette, Kevin Lewi, Stephen A. Weis, and David J. Wu. 2016. Practical order-revealing encryption with limited leakage. In Revised Selected Papers of the 23rd International Conference on Fast Software Encryption (FSE’16). Springer, 474–493.
[17]
Qiong Cheng and Chong-Zhi Gao. 2017. A cloud aided privacy-preserving profile matching scheme in mobile social networks. In 2017 IEEE International Conference on Embedded and Ubiquitous Computing (EUC’17). IEEE, 195–198.
[18]
Richard Chow, Philippe Golle, Markus Jakobsson, Elaine Shi, Jessica Staddon, Ryusuke Masuoka, and Jesus Molina. 2009. Controlling data in the cloud: Outsourcing computation without outsourcing control. In 2009 ACM Workshop on Cloud Computing Security (CCSW’09). ACM, 85–90.
[19]
Leon Yang Chu, Ying Rong, and Huan Zheng. 2020. The strategic benefit of request for proposal/quotation. Operations Research 70, 3 (2020), 1410--1427.
[20]
CSIRO’s Data61. 2014. Python-Paillier. https://github.com/data61/python-paillier.
[21]
Paolo D’Arco, María Isabel González Vasco, Angel L. Pérez del Pozo, and Claudio Soriente. 2012. Size-hiding in private set intersection: Existential results and constructions. In 5th International Conference on Cryptology in Africa (AFRICACRYPT’12). Springer, 378–394.
[22]
Emiliano De Cristofaro and Gene Tsudik. 2010. Practical private set intersection protocols with linear complexity. In 14th International Conference on Financial Cryptography and Data Security (FC’10), Vol. 6052. Springer, 143–159.
[23]
ECLASS e.V.2007. ECLASS – Standard for Master Data and Semantics for Digitalization. https://www.eclass.eu/.
[24]
Helder Eijs. 2014. PyCryptodome. https://www.pycryptodome.org/.
[25]
Fredrik Elgh. 2012. Decision support in the quotation process of engineered-to-order products. Advanced Engineering Informatics 26, 1 (2012), 66–79.
[26]
Caroline Fontaine and Fabien Galand. 2007. A survey of homomorphic encryption for nonspecialists. EURASIP Journal on Information Security 2007 (2007).
[27]
Michael Funke and Ralf Ruhwedel. 2001. Product variety and economic growth: Empirical evidence for the OECD countries. IMF Staff Papers 48, 2 (2001), 225–242.
[28]
Craig Gentry. 2009. Fully homomorphic encryption using ideal lattices. In 41st Annual ACM Symposium on Theory of Computing (STOC’09). ACM, 169–178.
[29]
Lars Gleim, Jan Pennekamp, Martin Liebenberg, Melanie Buchsbaum, Philipp Niemietz, Simon Knape, Alexander Epple, Simon Storms, Daniel Trauth, Thomas Bergs, Christian Brecher, Stefan Decker, Gerhard Lakemeyer, and Klaus Wehrle. 2020. FactDAG: Formalizing data interoperability in an internet of production. IEEE Internet of Things Journal 7, 4 (2020), 3243–3253.
[30]
Shafi Goldwasser and Silvio Micali. 1984. Probabilistic encryption. J. Comput. System Sci. 28, 2 (1984), 270–299.
[31]
Peter Gonczol, Panagiota Katsikouli, Lasse Herskind, and Nicola Dragoni. 2020. Blockchain implementations and use cases for supply chains-a survey. IEEE Access 8 (2020), 11856–11871.
[32]
Saikat Guha, Bin Cheng, and Paul Francis. 2011. Privad: Practical privacy in online advertising. In 8th USENIX Symposium on Networked Systems Design and Implementation (NSDI’11). USENIX Association, 169–182.
[33]
Sung Ho Ha and Sang Chan Park. 2001. Matching buyers and suppliers: An intelligent dynamic-exchange model. IEEE Intelligent Systems 16, 4 (2001), 28–40.
[34]
Hamed Haddadi, Pan Hui, Tristan Henderson, and Ian Brown. 2011. Targeted advertising on the handset: Privacy and security challenges. In Pervasive Advertising. Springer, 119–137.
[35]
Ali Hasnain and Dietrich Rebholz-Schuhmann. 2018. Assessing FAIR data principles against the 5-star open data principles. In ESWC 2018 Satellite Events on the Semantic Web (ESWC’18). Springer, 469–477.
[36]
Martin Hepp. 2015. The web of data for e-commerce: Schema.org and GoodRelations for researchers and practitioners. In 15th International Conference on Web Engineering (ICWE’15). Springer, 723–727.
[37]
Martin Hepp and Andreas Radinger. 2010. eClassOWL – The Web Ontology for Products and Services. http://www.heppnetz.de/projects/eclassowl/.
[38]
Kai Hüschelrath and Heike Schweitzer. 2014. Public and Private Enforcement of Competition Law in Europe (1st ed.). Springer.
[39]
Bernadette Hyland, Ghislain Atemezing, Michael Pendleton, and Biplav Srivastava. 2013. Linked Data Glossary. W3C Working Group Note.
[40]
Roman Inderst. 2008. Single sourcing versus multiple sourcing. RAND Journal of Economics 39, 1 (2008), 199–213.
[41]
Joakim Kalvenes and Amit Basu. 2006. Design of robust business-to-business electronic marketplaces with guaranteed privacy. Management Science 52, 11 (2006), 1721–1736.
[42]
Jan Martin Keil and Sirko Schindler. 2019. Comparison and evaluation of ontologies for units of measurement. Semantic Web 10, 1 (2019), 33–51.
[43]
Florian Kerschbaum and Anselme Tueno. 2019. An efficiently searchable encrypted data structure for range queries. In 24th European Symposium on Research in Computer Security (ESORICS’19). Springer, 344–364.
[44]
Ágnes Kiss, Jian Liu, Thomas Schneider, N. Asokan, and Benny Pinkas. 2017. Private set intersection for unequal set sizes with mobile applications. Proceedings on Privacy Enhancing Technologies Symposium (PETS’17) 2017, 4 (2017), 177–197.
[45]
Vladimir Kolesnikov, Ranjit Kumaresan, Mike Rosulek, and Ni Trieu. 2016. Efficient batched oblivious PRF with applications to private set intersection. In 2016 ACM SIGSAC Conference on Computer and Communications Security (CCS’16). ACM, 818–829.
[46]
Maria Linnartz, Ursula Motz, Tobias Schröer, Volker Stich, Kai Müller, and Christoph Greb. 2021. Increasing resilience in procurement in the context of the internet of production. Journal of Production Systems and Logistics 1, 2021 (2021).
[47]
Johannes Lohmöller, Jan Pennekamp, Roman Matzutt, and Klaus Wehrle. 2022. On the need for strong sovereignty in data ecosystems. In Proceedings of the 1st International Workshop on Data Ecosystems (DEco’22). CEUR Workshop Proceedings.
[48]
Sidra Malik, Volkan Dedeoglu, Salil Kanhere, and Raja Jurdak. 2022. PrivChain: Provenance and privacy preservation in blockchain enabled supply chains. In Proceedings of the 2022 IEEE International Conference on Blockchain (Blockchain’22). IEEE, 157–166.
[49]
Sidra Malik, Volkan Dedeoglu, Salil S. Kanhere, and Raja Jurdak. 2019. TrustChain: Trust management in blockchain and IoT supported supply chains. In 2019 IEEE International Conference on Blockchain (Blockchain’19). IEEE, 184–193.
[50]
Sidra Malik, Naman Gupta, Volkan Dedeoglu, Salil Kanhere, and Raja Jurdak. 2021. TradeChain: Decoupling traceability and identity in blockchain enabled supply chains. In Proceedings of the 2021 IEEE 20th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom’21). IEEE.
[51]
Sidra Malik, Salil S. Kanhere, and Raja Jurdak. 2018. ProductChain: Scalable blockchain framework to support provenance in supply chains. In 2018 IEEE 17th International Symposium on Network Computing and Applications (NCA’18). IEEE.
[52]
Dirk Merkel. 2014. Docker: Lightweight Linux containers for consistent development and deployment. Linux Journal 2014, 239 (2014).
[53]
Michael Naehrig, Kristin Lauter, and Vinod Vaikuntanathan. 2011. Can homomorphic encryption be practical? In 3rd ACM Workshop on Cloud Computing Security Workshop (CCSW’11). ACM, 113–124.
[54]
Moni Naor, Benny Pinkas, and Reuban Sumner. 1999. Privacy preserving auctions and mechanism design. In 1st ACM Conference on Electronic Commerce (EC’99). ACM, 129–139.
[55]
Rajesh Narang and Tanmay Narang. 2017. Preserving confidentiality and privacy of sensitive data in e-procurement system. International Journal of Cyber-security and Digital Forensics 6, 4 (2017), 186–197.
[56]
Khanh Quoc Nguyen and Jacques Traoré. 2000. An online public auction protocol protecting bidder privacy. In 5th Australasian Conference on Information Security and Privacy (ACISP’00). Springer, 427–442.
[57]
Robert A. Novack and Stephen W. Simco. 1991. The industrial procurement process: A supply chain perspective. Journal of Business Logistics 12, 1 (1991), 145--168.
[58]
Gilbert N. Nyaga, Judith M. Whipple, and Daniel F. Lynch. 2010. Examining supply chain relationships: Do buyer and supplier perspectives on collaborative relationships differ? Journal of Operations Management 28, 2 (2010), 101–114.
[59]
Organisation for Economic Co-operation and Development. 2013. Fighting bid rigging in public procurement. Retrieved April 20, 2023, from https://www.oecd.org/competition/cartels/fightingbidrigginginpublicprocurement.htm.
[60]
Organisation for Economic Co-operation and Development. 2013. Cartels and anti-competitive agreements. Retrieved March 6, 2023, from https://www.oecd.org/competition/cartels/.
[61]
Boris Otto, Sören Auer, Jan Cirullies, Jan Jürjens, Nadja Menz, Jochen Schon, and Sven Wenzel. 2016. Industrial Data Space: Digital Souvereignity over Data. White Paper. Fraunhofer.
[62]
Pascal Paillier. 1999. Public-key cryptosystems based on composite degree residuosity classes. In International Conference on the Theory and Application of Cryptographic Techniques (EUROCRYPT’99), Vol. 1592. Springer, 223–238.
[63]
Vijayakrishnan Pasupathinathan, Josef Pieprzyk, and Huaxiong Wang. 2008. A fair e-tendering protocol. In 5th International Conference on Security and Cryptography (SECRYPT’08). SCITEPRESS, 294–299.
[64]
Constantinos Patsakis. 2017. OrderRevealingEncryption. https://github.com/kpatsakis/OrderRevealingEncryption.
[65]
Jan Pennekamp, Erik Buchholz, Markus Dahlmanns, Ike Kunze, Stefan Braun, Eric Wagner, Matthias Brockmann, Klaus Wehrle, and Martin Henze. 2021. Collaboration is not evil: A systematic look at security research for industrial use. In Workshop on Learning from Authoritative Security Experiment Results (LASER’20). ACSA.
[66]
Jan Pennekamp, Erik Buchholz, Yannik Lockner, Markus Dahlmanns, Tiandong Xi, Marcel Fey, Christian Brecher, Christian Hopmann, and Klaus Wehrle. 2020. Privacy-preserving production process parameter exchange. In 36th Annual Computer Security Applications Conference (ACSAC’20). ACM, 510–525.
[67]
Jan Pennekamp, Frederik Fuhrmann, Markus Dahlmanns, Timo Heutmann, Alexander Kreppein, Dennis Grunert, Christoph Lange, Robert H. Schmitt, and Klaus Wehrle. 2021. Confidential Computing-induced Privacy Benefits for the Bootstrapping of New Business Relationships. Technical Report RWTH-2021-09499. RWTH Aachen University. Blitz Talk at the 2021 Cloud Computing Security Workshop (CCSW’21).
[68]
Jan Pennekamp, Frederik Fuhrmann, Markus Dahlmanns, Timo Heutmann, Alexander Kreppein, Dennis Grunert, Christoph Lange, Robert H. Schmitt, and Klaus Wehrle. 2023. Offering two-way privacy for evolved purchase inquiries. https://github.com/COMSYS/purchase-inquiries.
[69]
Jan Pennekamp, René Glebke, Martin Henze, Tobias Meisen, Christoph Quix, Rihan Hai, Lars Gleim, Philipp Niemietz, Maximilian Rudack, Simon Knape, Alexander Epple, Daniel Trauth, Uwe Vroomen, Thomas Bergs, Christian Brecher, Andreas Bührig-Polaczek, Matthias Jarke, and Klaus Wehrle. 2019. Towards an infrastructure enabling the internet of production. In 2019 IEEE International Conference on Industrial Cyber Physical Systems (ICPS’19). IEEE, 31–37.
[70]
Jan Pennekamp, Martin Henze, Simo Schmidt, Philipp Niemietz, Marcel Fey, Daniel Trauth, Thomas Bergs, Christian Brecher, and Klaus Wehrle. 2019. Dataflow challenges in an Internet of production: A security & privacy perspective. In ACM Workshop on Cyber-physical Systems Security & Privacy (CPS-SPC’19). ACM, 27–38.
[71]
Jan Pennekamp, Martin Henze, and Klaus Wehrle. 2021. Unlocking secure industrial collaborations through privacy-preserving computation. ERCIM News 126 (2021), 24–25.
[72]
Jan Pennekamp, Johannes Lohmöller, Eduard Vlad, Joscha Loos, Niklas Rodemann, Patrick Sapel, Ina Berenice Fink, Setz Schmitz, Christian Hopmann, Matthias Jarke, Günther Schuh, Klaus Wehrle, and Martin Henze. 2023. Designing secure and privacy-preserving information systems for industry benchmarking. In Proceedings of the 35th International Conference on Advanced Information Systems Engineering (CAiSE’23). Springer, 489--505.
[73]
Jan Pennekamp, Roman Matzutt, Salil S. Kanhere, Jens Hiller, and Klaus Wehrle. 2021. The road to accountable and dependable manufacturing. Automation 2, 3 (2021), 202–219.
[74]
Benny Pinkas, Thomas Schneider, and Michael Zohner. 2014. Faster private set intersection based on ot extension. In 23rd USENIX Conference on Security Symposium (SEC’14). USENIX Association, 797–812.
[75]
Raluca Ada Popa, Catherine M. Š. Redfield, Nickolai Zeldovich, and Hari Balakrishnan. 2011. CryptDB: Protecting confidentiality with encrypted query processing. In 23rd ACM Symposium on Operating Systems Principles (SOSP’11). ACM, 85–100.
[76]
Víctor Julio Ramírez-Durán, Idoia Berges, and Arantza Illarramendi. 2020. ExtruOnt: An ontology for describing a type of manufacturing machine for Industry 4.0 systems. Semantic Web 11, 6 (2020), 887–909.
[77]
Peter Rindal and Mike Rosulek. 2017. Malicious-secure private set intersection via dual execution. In 2017 ACM SIGSAC Conference on Computer and Communications Security (CCS’17). ACM, 1229–1242.
[78]
Ronald Rivest, Adi Shamir, and Leonard Adleman. 1978. A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21, 2 (1978), 120–126.
[79]
[80]
Mark D. Ryan. 2014. Enhanced certificate transparency and end-to-end encrypted mail. In 21st Annual Network and Distributed System Security Symposium (NDSS’14). Internet Society.
[81]
Leo Sauermann and Richard Cyganiak. 2008. Cool URIs for the Semantic Web. W3C Interest Group Note.
[82]
Ask Solem. 2009. Celery: Distributed Task Queue. http://www.celeryproject.org/.
[83]
Marten Van Dijk, Craig Gentry, Shai Halevi, and Vinod Vaikuntanathan. 2010. Fully homomorphic encryption over the integers. In 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT’10). Springer, 24–43.
[84]
Hal R. Varian. 1989. Chapter 10 price discrimination. In Handbook of Industrial Organization. Vol. 1. Elsevier, 597–654.
[85]
VDMA e.V. (Mechanical Engineering Industry Association). 2015. The VDMA – VDMA. https://www.vdma.org/en/.
[86]
Alexander Viand, Patrick Jattke, and Anwar Hithnawi. 2021. SoK: Fully homomorphic encryption compilers. In 2021 IEEE Symposium on Security and Privacy (SP’21). IEEE, 1092–1108.
[87]
Gordon Walker and David Weber. 1987. Supplier competition, uncertainty, and make-or-buy decisions. Academy of Management Journal 30, 3 (1987), 589–596.
[88]
Ulrich Weigel and Marco Ruecker. 2017. The Strategic Procurement Practice Guide. Springer.
[89]
Mark D. Wilkinson, Michel Dumontier, I. Jsbrand Jan Aalbersberg, Gabrielle Appleton, Myles Axton, Arie Baak, Niklas Blomberg, Jan-Willem Boiten, Luiz Bonino da Silva Santos, Philip E. Bourne, et al. 2016. The FAIR guiding principles for scientific data management and stewardship. Scientific Data 3 (2016).
[90]
David Wood, Markus Lanthaler, and Richard Cyganiak. 2014. RDF 1.1 Concepts and Abstract Syntax. W3C Rec.
[91]
Yu Xia, Bintong Chen, and Panos Kouvelis. 2008. Market-based supply chain coordination by matching suppliers’ cost structures with buyers’ order profiles. Management Science 54, 11 (2008), 1861–1875.
[92]
Xun Xu. 2017. Machine tool 4.0 for the new era of manufacturing. International Journal of Advanced Manufacturing Technology 92, 5 (2017), 1893–1900.
[93]
Jiho Yoon, Srinivas Talluri, and Claudia Rosales. 2020. Procurement decisions and information sharing under multi-tier disruption risk in a supply chain. International Journal of Production Research 58, 5 (2020), 1362–1383.
[94]
Yong Zeng, Lingyu Wang, Xiaoguang Deng, Xinlin Cao, and Nafisa Khundker. 2012. Secure collaboration in global design and supply chain environment: Problem analysis and literature review. Computers in Industry 63, 6 (2012), 545–556.
[95]
Jan Henrik Ziegeldorf, Jan Pennekamp, David Hellmanns, Felix Schwinger, Ike Kunze, Martin Henze, Jens Hiller, Roman Matzutt, and Klaus Wehrle. 2017. BLOOM: Bloom filter based oblivious outsourced matchings. BMC Medical Genomics 10 (Suppl 2) (2017).

Cited By

View all
  • (2024)Evolving the Industrial Internet of Things: The Advent of Secure CollaborationsNOMS 2024-2024 IEEE Network Operations and Management Symposium10.1109/NOMS59830.2024.10575325(1-6)Online publication date: 6-May-2024
  • (2023)An Interdisciplinary Survey on Information Flows in Supply ChainsACM Computing Surveys10.1145/360669356:2(1-38)Online publication date: 14-Sep-2023

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Transactions on Internet Technology
ACM Transactions on Internet Technology  Volume 23, Issue 4
November 2023
249 pages
ISSN:1533-5399
EISSN:1557-6051
DOI:10.1145/3633308
  • Editor:
  • Ling Liu
Issue’s Table of Contents

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 17 November 2023
Online AM: 25 May 2023
Accepted: 19 April 2023
Revised: 23 February 2023
Received: 15 March 2022
Published in TOIT Volume 23, Issue 4

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Bootstrapping procurement
  2. secure industrial collaboration
  3. private set intersection
  4. homomorphic encryption
  5. Internet of Production

Qualifiers

  • Research-article

Funding Sources

  • Deutsche Forschungsgemeinschaft (DFG, German Research Foundation)

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)131
  • Downloads (Last 6 weeks)2
Reflects downloads up to 19 Sep 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Evolving the Industrial Internet of Things: The Advent of Secure CollaborationsNOMS 2024-2024 IEEE Network Operations and Management Symposium10.1109/NOMS59830.2024.10575325(1-6)Online publication date: 6-May-2024
  • (2023)An Interdisciplinary Survey on Information Flows in Supply ChainsACM Computing Surveys10.1145/360669356:2(1-38)Online publication date: 14-Sep-2023

View Options

Get Access

Login options

Full Access

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Full Text

View this article in Full Text.

Full Text

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media