Annual Computer Security Applications Conference 2020
DOI: 10.1145/3427228.3427248
|View full text |Cite
|
Sign up to set email alerts
|

Privacy-Preserving Production Process Parameter Exchange

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
10
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
5
2
2

Relationship

4
5

Authors

Journals

citations
Cited by 17 publications
(10 citation statements)
references
References 70 publications
0
10
0
Order By: Relevance
“…Regarding the sharing of production parameters and associated experiences, we analyzed the industry needs when commissioning new production lines and correspondingly developed an oblivious exchange platform to facilitate such information sharing [119]. Again, we rely on well-known concepts from confidential computing to ensure security and real-world deployability in the WWL.…”
Section: World Wide Lab (Wwl)mentioning
confidence: 99%
“…Regarding the sharing of production parameters and associated experiences, we analyzed the industry needs when commissioning new production lines and correspondingly developed an oblivious exchange platform to facilitate such information sharing [119]. Again, we rely on well-known concepts from confidential computing to ensure security and real-world deployability in the WWL.…”
Section: World Wide Lab (Wwl)mentioning
confidence: 99%
“…However, this approach is limited to transferring finished digital products and does not consider the exchange of manufacturing information. Researchers in [23] combine Bloom filters and Oblivious Transfer to guarantee a private industrial parameters exchange. However, this solution reduces the control retained by data producers by allowing customers to retrieve data without the data producers knowing what has been transferred.…”
Section: State Of the Artmentioning
confidence: 99%
“…The trade of physical products generates a multitude of sensitive data, which, if not protected, could be used by attackers and competitors. Pennekamp et al [23] Epiphaniou et al [7] Pennekamp et al [21] Dahlmanns et al [6] Qi et al [24] Pennekamp et al [22] R2. Working with limited computational power.…”
Section: Design Requirementsmentioning
confidence: 99%
“…Secure industrial collaborations across supply chains (Ă–), e.g., to reduce ramp-up costs [10]. To cover P1 and P2 not only with today's (established) long-term trust but also in settings with dynamically evolving and flexible short-term relationships, we identify a new research pillar (P3)…”
Section: (P0)mentioning
confidence: 99%