Abstract
The Seamless Integrated Data Pipeline system was proposed to the European Union in order to overcome the information quality shortcomings of the current international supply chain information exchange systems. Next to identification and authorization of stakeholders, secure access control needs to be considered at design time of the new data pipeline system. This challenge is taken up in this paper. First, based on an analysis of the proposed data pipeline concept, access control requirements are being defined. Second, a new multi-level access control model is being designed. The resulting model organizes access control at two levels, namely, at country and at service level, herewith enabling secure information exchange between global stakeholders.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Adams C, Lloyd S (2002) Understanding PKI: concepts, standards, and deployment considerations. Addison-Wesley Longman Publishing Co., Inc., Boston
Bell DE, La Padula LJ (1976) Secure computer system: unified exposition and multics interpretation: DTIC Document 1976
Daskapan S, Costa A, Vree W, Eldin A (2004) Virtual trust in distributed systems trust and privacy in digital business. In: Katsikas S, Lopez J, Pernul G (eds) Lecture notes in computer science. Springer, Berlin, pp 30–39
Eertink H, Hulsebosch B, Lenzini G (2008) STORK-eID; framework mapping of technical/organisational issues to a quality scheme, 13 October 2008. https://www.eid-stork.eu/index.php?option=com_processes
Hesketh D (2009) Seamless electronic data and logistics pipelines shift focus from import declarations to start of commercial transaction. World Cust J 3(1):27–32
Hesketh D (2010) Weaknesses in the supply chain: who packed the box? World Cust J 4(2):17
Hofman W (2011) Supply chain visibility with linked open data for supply chain risk analysis. In: Overbeek S, Tan Y-H, Zomer G (eds) 1st workshop on IT innovations enabling seamless and secure supply chains, Delft, The Netherlands, pp 20–31
Horst Mvd, Lucassen I, Aldewereld H (2012) Cassandra – WP200 – intermediate report of Asia-Europe living lab, 29 April 2012. http://real.mtak.hu/6801/1/WP-200.pdf
Hulstijn J, Overbeek S, Aldewereld H, Christiaanse R (2012) Integrity of supply chain visibility. In: Bajec M, Eder J (eds) Advanced information systems engineering workshops. Lecture notes in business information processing. Springer, Berlin, pp 351–365
Johnson BC (2010) Information security basics. Inf Syst Secur Associ (ISSA J) 8:28–34
Lampson BW (1974) Protection. ACM SIGOPS Oper Syst Rev 8(1):18–24
Pruksasri P, Berg Jvd, Hofman W(2012) Three protocols for securing the Data Pipeline of the international supply chain. In: IADIS multi conference on computer science and information systems, Lisbon, Portugal, July 17–23 2012, pp 27–34
Rukanova B, Baida Z, Liu J, Stijn E, Tan Y-H, Hofman W et al (2011) Beer living lab. In: Tan Y-H, Bjørn-Andersen N, Klein S, Rukanova B (eds) Accelerating global supply chains with IT-innovation. Springer, Berlin/Heidelberg, pp 37–54
Sandhu RS, Coyne EJ, Feinstein HL, Youman CE (1996) Role-based access control models. Computer 29(2):38–47. doi:10.1109/2.485845
Stallings W (2003) Network security essentials, application and standards. Prentice Hall, Upper Saddle River
Acknowledgements
This paper results from the CASSANDRA project supported by funding from the 7th Framework Program of the European Commission.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Pruksasri, P., van den Berg, J., Hofman, W., Daskapan, S. (2013). Multi-level Access Control in the Data Pipeline of the International Supply Chain System. In: Chuan, P., Khachidze, V., Lai, I., Liu, Y., Siddiqui, S., Wang, T. (eds) Innovation in the High-Tech Economy. Contributions to Economics. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-41585-2_7
Download citation
DOI: https://doi.org/10.1007/978-3-642-41585-2_7
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-41584-5
Online ISBN: 978-3-642-41585-2
eBook Packages: Business and EconomicsBusiness and Management (R0)