Skip to main content

Multi-level Access Control in the Data Pipeline of the International Supply Chain System

  • Chapter
  • First Online:
Book cover Innovation in the High-Tech Economy

Part of the book series: Contributions to Economics ((CE))

Abstract

The Seamless Integrated Data Pipeline system was proposed to the European Union in order to overcome the information quality shortcomings of the current international supply chain information exchange systems. Next to identification and authorization of stakeholders, secure access control needs to be considered at design time of the new data pipeline system. This challenge is taken up in this paper. First, based on an analysis of the proposed data pipeline concept, access control requirements are being defined. Second, a new multi-level access control model is being designed. The resulting model organizes access control at two levels, namely, at country and at service level, herewith enabling secure information exchange between global stakeholders.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  • Adams C, Lloyd S (2002) Understanding PKI: concepts, standards, and deployment considerations. Addison-Wesley Longman Publishing Co., Inc., Boston

    Google Scholar 

  • Bell DE, La Padula LJ (1976) Secure computer system: unified exposition and multics interpretation: DTIC Document 1976

    Google Scholar 

  • Daskapan S, Costa A, Vree W, Eldin A (2004) Virtual trust in distributed systems trust and privacy in digital business. In: Katsikas S, Lopez J, Pernul G (eds) Lecture notes in computer science. Springer, Berlin, pp 30–39

    Google Scholar 

  • Eertink H, Hulsebosch B, Lenzini G (2008) STORK-eID; framework mapping of technical/organisational issues to a quality scheme, 13 October 2008. https://www.eid-stork.eu/index.php?option=com_processes

  • Hesketh D (2009) Seamless electronic data and logistics pipelines shift focus from import declarations to start of commercial transaction. World Cust J 3(1):27–32

    Google Scholar 

  • Hesketh D (2010) Weaknesses in the supply chain: who packed the box? World Cust J 4(2):17

    Google Scholar 

  • Hofman W (2011) Supply chain visibility with linked open data for supply chain risk analysis. In: Overbeek S, Tan Y-H, Zomer G (eds) 1st workshop on IT innovations enabling seamless and secure supply chains, Delft, The Netherlands, pp 20–31

    Google Scholar 

  • Horst Mvd, Lucassen I, Aldewereld H (2012) Cassandra – WP200 – intermediate report of Asia-Europe living lab, 29 April 2012. http://real.mtak.hu/6801/1/WP-200.pdf

  • Hulstijn J, Overbeek S, Aldewereld H, Christiaanse R (2012) Integrity of supply chain visibility. In: Bajec M, Eder J (eds) Advanced information systems engineering workshops. Lecture notes in business information processing. Springer, Berlin, pp 351–365

    Google Scholar 

  • Johnson BC (2010) Information security basics. Inf Syst Secur Associ (ISSA J) 8:28–34

    Google Scholar 

  • Lampson BW (1974) Protection. ACM SIGOPS Oper Syst Rev 8(1):18–24

    Article  Google Scholar 

  • Pruksasri P, Berg Jvd, Hofman W(2012) Three protocols for securing the Data Pipeline of the international supply chain. In: IADIS multi conference on computer science and information systems, Lisbon, Portugal, July 17–23 2012, pp 27–34

    Google Scholar 

  • Rukanova B, Baida Z, Liu J, Stijn E, Tan Y-H, Hofman W et al (2011) Beer living lab. In: Tan Y-H, Bjørn-Andersen N, Klein S, Rukanova B (eds) Accelerating global supply chains with IT-innovation. Springer, Berlin/Heidelberg, pp 37–54

    Chapter  Google Scholar 

  • Sandhu RS, Coyne EJ, Feinstein HL, Youman CE (1996) Role-based access control models. Computer 29(2):38–47. doi:10.1109/2.485845

    Article  Google Scholar 

  • Stallings W (2003) Network security essentials, application and standards. Prentice Hall, Upper Saddle River

    Google Scholar 

Download references

Acknowledgements

This paper results from the CASSANDRA project supported by funding from the 7th Framework Program of the European Commission.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Potchara Pruksasri .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Pruksasri, P., van den Berg, J., Hofman, W., Daskapan, S. (2013). Multi-level Access Control in the Data Pipeline of the International Supply Chain System. In: Chuan, P., Khachidze, V., Lai, I., Liu, Y., Siddiqui, S., Wang, T. (eds) Innovation in the High-Tech Economy. Contributions to Economics. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-41585-2_7

Download citation

Publish with us

Policies and ethics