Secure collaboration in global design and supply chain environment: Problem analysis and literature review

Increasing global competition has led to massive outsourcing of manufacturing businesses. Such outsourcing practices require effective collaborations between focal manufacturers and their suppliers by sharing a large amount of information. In the meantime, since some of the suppliers are also potential competitors, protection of confidential information, particularly intellectual properties, during the collaboration is becoming an important issue. Therefore, secure collaboration is of critical significance in the global design and supply chain management. This paper aims to collect and analyze systematically the existing scattered research of secure collaboration in global design and supply chain environment, and to give a comprehensive literature review to summarize the problems and the corresponding solutions. By applying the Environment-based Design (EBD) methodology, the existing methods and technologies are classified into four levels: infrastructure, information, agreement, and confidence. Four corresponding research problems are then formulated: information access control, information partitioning, legal information sharing, and partner trust management. As such, research papers scattered in different areas are integrated into this multi-disciplinary field. Future trends and challenges are also discussed in this paper.

[1]  Josep Domingo-Ferrer,et al.  Noise-Robust Watermarking for Numerical Datasets , 2005, MDAI.

[2]  Catherine Roussey,et al.  Technical documents classification , 2011, CSCWD.

[3]  Klaus R. Dittrich,et al.  An Approach for Building Secure Database Federations , 1994, VLDB.

[4]  Manu Goyal,et al.  Strategic Information Management Under Leakage in a Supply Chain , 2009, Manag. Sci..

[5]  Lode Li Information Sharing in a Supply Chain with Horizontal Competition , 2002, Manag. Sci..

[6]  Mark S. Fox,et al.  An ontology of trust: formal semantics and transitivity , 2006, ICEC '06.

[7]  Hae-Chang Rim,et al.  Some Effective Techniques for Naive Bayes Text Classification , 2006, IEEE Transactions on Knowledge and Data Engineering.

[8]  Tao Yu,et al.  The Research on Decision Model of Supply Chain Collaboration Management , 2008, 2008 4th International Conference on Wireless Communications, Networking and Mobile Computing.

[9]  Ninghui Li,et al.  Distributed Credential Chain Discovery in Trust Management , 2003, J. Comput. Secur..

[10]  Clayton M. Christensen The Innovator's Dilemma: When New Technologies Cause Great Firms to Fail , 2013 .

[11]  Reinhilde Veugelers,et al.  In Search of Complementarity in Innovation Strategy: Internal R&D and External Knowledge Acquisition , 2006, Manag. Sci..

[12]  R E Miles,et al.  Organizational strategy, structure, and process. , 1978, Academy of management review. Academy of Management.

[13]  Pedro M. Domingos,et al.  On the Optimality of the Simple Bayesian Classifier under Zero-One Loss , 1997, Machine Learning.

[14]  Yingjiu Li,et al.  SecTTS: A secure track & trace system for RFID-enabled supply chains , 2012, Comput. Ind..

[15]  James H. Cross,et al.  Reverse engineering and design recovery: a taxonomy , 1990, IEEE Software.

[16]  Chen Ming,et al.  A Shared Multi-Media Design Environment for Concurrent Engineering over the Internet , 2001, Concurr. Eng. Res. Appl..

[17]  Rudy Setiono,et al.  A comparative study of centroid-based, neighborhood-based and statistical approaches for effective document categorization , 2002, Object recognition supported by user interaction for service robots.

[18]  Thomas J. Watson,et al.  An empirical study of the naive Bayes classifier , 2001 .

[19]  Wenliang Du,et al.  Secure multi-party computation problems and their applications: a review and open problems , 2001, NSPW '01.

[20]  Tao Zhang,et al.  Hardware assisted control flow obfuscation for embedded processors , 2004, CASES '04.

[21]  Hong Peng,et al.  Document Classification Based on Support Vector Machine Using a Concept Vector Model , 2006, 2006 IEEE/WIC/ACM International Conference on Web Intelligence (WI 2006 Main Conference Proceedings)(WI'06).

[22]  Wei Liu,et al.  Formalization of design chain management using environment-based design (EBD) theory , 2013, J. Intell. Manuf..

[23]  Kyoung-Yun Kim,et al.  Ontology-based assembly design and information sharing for collaborative product development , 2006, Comput. Aided Des..

[24]  M. Christopher,et al.  The impact of product design on supply chain risk: A case study , 2008 .

[25]  Younghwan Choi,et al.  A design chain collaboration framework using reference models , 2005 .

[26]  Andrew McCallum,et al.  A comparison of event models for naive bayes text classification , 1998, AAAI 1998.

[27]  Kyle J. Mayer,et al.  Designing Effective Contracts: Exploring the Influence of Framing and Expectations , 2011 .

[28]  Sholom M. Weiss,et al.  Towards language independent automated learning of text categorization models , 1994, SIGIR '94.

[29]  Vincent Tam,et al.  A Comparative Study of Centroid-Based, Neighborhood-Based and Statistical Approaches for Effective Document Categorization , 2002, ICPR.

[30]  Xiaodong Lin,et al.  Privacy preserving regression modelling via distributed computation , 2004, KDD.

[31]  Khairullah Khan,et al.  A Review of Machine Learning Algorithms for Text-Documents Classification , 2010 .

[32]  Ortwin Renn,et al.  A New Approach to Risk Evaluation and Management: Risk‐Based, Precaution‐Based, and Discourse‐Based Strategies 1 , 2002, Risk analysis : an official publication of the Society for Risk Analysis.

[33]  Ninghui Li,et al.  Distributed credential chain discovery in trust management: extended abstract , 2001, CCS '01.

[34]  Reinhilde Veugelers,et al.  Complementarity in the Innovation Strategy: Internal R&D, External Technology Acquisition, and Cooperation in R&D , 2002 .

[35]  Nasir D. Memon,et al.  Preventing Piracy, Reverse Engineering, and Tampering , 2003, Computer.

[36]  Frans Coenen,et al.  Text classification using graph mining-based feature extraction , 2010 .

[37]  Janez Kopac,et al.  RE (reverse engineering) as necessary phase by rapid product development , 2006 .

[38]  Yuh-Min Chen,et al.  Developing a trust evaluation method between co-workers in virtual project team for enabling resource sharing and collaboration , 2008, Comput. Ind..

[39]  M. Christopher,et al.  Supply chain risk management: outlining an agenda for future research , 2003 .

[40]  Germaine H. Saad,et al.  Managing Disruption Risks in Supply Chains , 2005 .

[41]  D. Neiger,et al.  Supply chain risk identification with value-focused process engineering , 2009 .

[42]  Christian S. Collberg,et al.  Watermarking, Tamper-Proofing, and Obfuscation-Tools for Software Protection , 2002, IEEE Trans. Software Eng..

[44]  Chris Clifton,et al.  Privacy-preserving distributed mining of association rules on horizontally partitioned data , 2004, IEEE Transactions on Knowledge and Data Engineering.

[45]  Henry Tirri,et al.  Bayesian case-based reasoning with neural networks , 1993, IEEE International Conference on Neural Networks.

[46]  Vladimir N. Vapnik,et al.  The Nature of Statistical Learning Theory , 2000, Statistics for Engineering and Information Science.

[47]  Gina Colarelli O'Connor,et al.  Major Innovation as a Dynamic Capability: A Systems Approach* , 2008 .

[48]  Yong Zeng,et al.  ENVIRONMENT-BASED DESIGN (EBD) , 2011 .

[49]  Mark Strom,et al.  Model of Co-Development Emerges , 2002 .

[50]  Xianyi Zeng,et al.  Intelligent decision support tools for multicriteria product design , 2010, 2010 IEEE International Conference on Systems, Man and Cybernetics.

[51]  Anna Sankowska,et al.  Trust management in virtual work environments : a human factors perspective , 2008 .

[52]  John C. Stutz,et al.  Classification of Aeronautics System Health and Safety Documents , 2009, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).

[53]  Ian Vince McLoughlin Secure Embedded Systems: The Threat of Reverse Engineering , 2008, 2008 14th IEEE International Conference on Parallel and Distributed Systems.

[54]  Williams Sh Collaborative planning, forecasting, and replenishment. , 1999 .

[55]  Daniel Markovits,et al.  Contract and Collaboration , 2004 .

[56]  L. Toledo-Pereyra Trust , 2006, Mediation Behaviour.

[57]  Elisa Bertino,et al.  Secure knowledge management: confidentiality, trust, and privacy , 2006, IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans.

[58]  Lea Kutvonen,et al.  Trust Management Survey , 2005, iTrust.

[59]  James D. Thompson Organizations in Action: Social Science Bases of Administrative Theory , 1967 .

[60]  Hongtao Li,et al.  Modeling and evaluating information leakage caused by inferences in supply chains , 2011, Comput. Ind..

[61]  M. Attaran RFID: an enabler of supply chain operations , 2007 .

[62]  J. J. Rocchio,et al.  Relevance feedback in information retrieval , 1971 .

[63]  Philip R. Zimmermann,et al.  The official PGP user's guide , 1996 .

[64]  R. Handfield,et al.  Knowledge Sharing in Interorganizational Product Development Teams: The Effect of Formal and Informal Socialization Mechanisms* , 2009 .

[65]  Yong Zeng,et al.  Design Conflict: Conceptual Structure and Mathematical Representation , 2011, Trans. SDPS.

[66]  Hokey Min,et al.  Collaborative Planning, Forecasting and Replenishment: Demand Planning in Suppply Chain Management , 2007, ICEB.

[67]  B. Hillebrand,et al.  Trust, Contract and Relationship Development , 2005 .

[68]  J. R. Carter,et al.  An analysis of supply risk assessment techniques , 2004 .

[69]  Gregory M. Magnan,et al.  A Three-Stage Implementation Model for Supply Chain Collaboration , 2008 .

[70]  Stephen E. Robertson,et al.  Understanding inverse document frequency: on theoretical arguments for IDF , 2004, J. Documentation.

[71]  Hyunseung Choo,et al.  Multi-Level modeling and access control for data sharing in collaborative design , 2006, Adv. Eng. Informatics.

[72]  W. B. Lee,et al.  A security model for distributed product data management system , 2003, Comput. Ind..

[73]  Yehuda Lindell,et al.  Privacy Preserving Data Mining , 2002, Journal of Cryptology.

[74]  D RyallMichael,et al.  Formal Contracts in the Presence of Relational Enforcement Mechanisms , 2009 .

[75]  Albert Y. Ha,et al.  Contracting and Information Sharing Under Supply Chain Competition , 2008, Manag. Sci..

[76]  Yunghsiang Sam Han,et al.  Privacy-Preserving Multivariate Statistical Analysis: Linear Regression and Classification , 2004, SDM.

[77]  Soo Beng Khoh,et al.  Deploying design for Six Sigma™ in new product development , 2008, 2008 4th IEEE International Conference on Management of Innovation and Technology.

[78]  Jens H. Weber,et al.  Privacy Preserving Decision Tree Learning Using Unrealized Data Sets , 2012, IEEE Transactions on Knowledge and Data Engineering.

[79]  Adrian Bilski,et al.  A Review of Artificial Intelligence Algorithms in Document Classification , 2011 .

[80]  Bo Yu,et al.  Latent semantic analysis for text categorization using neural network , 2008, Knowl. Based Syst..

[81]  Jayant R. Haritsa,et al.  Maintaining Data Privacy in Association Rule Mining , 2002, VLDB.

[82]  Sushil Jajodia,et al.  Subject Switching Algorithms for Access Control in Federated Databases , 2001, DBSec.

[83]  Yong Zeng,et al.  Recursive object model (ROM) - Modelling of linguistic information in engineering design , 2008, Comput. Ind..

[84]  Yong Zeng,et al.  Mitigating the risk of information leakage in a two-level supply chain through optimal supplier selection , 2011, Journal of Intelligent Manufacturing.

[85]  Yolanda Gil,et al.  A survey of trust in computer science and the Semantic Web , 2007, J. Web Semant..

[86]  Yoke San Wong,et al.  Collaborative computer-aided design - research and development status , 2005, Comput. Aided Des..

[87]  Weidong Li,et al.  Collaborative Computer-Aided Design - Research and Development Status , 2004 .

[88]  Hau L. Lee,et al.  Mitigating supply chain risk through improved confidence , 2004 .

[89]  Yong Zeng,et al.  Axiomatic Theory of Design Modeling , 2002, Trans. SDPS.

[90]  Philip S. Yu,et al.  Privacy-preserving data publishing: A survey of recent developments , 2010, CSUR.

[91]  S H Williams Collaborative planning, forecasting, and replenishment. , 1999, Hospital materiel management quarterly.

[92]  Ian T. Foster,et al.  Security for Grid services , 2003, High Performance Distributed Computing, 2003. Proceedings. 12th IEEE International Symposium on.

[93]  Jie Ji,et al.  Clustering Large Sparse Text Data: A Comparative Advantage Approach , 2010, J. Inf. Process..

[94]  Uta Jüttner Supply chain risk management: Understanding the business requirements from a practitioner perspective , 2005 .

[95]  Ram D. Sriram,et al.  An object-oriented representation for product and design processes , 1998, Comput. Aided Des..

[96]  Weiming Shen,et al.  Collaborative conceptual design - state of the art and future trends , 2002, Comput. Aided Des..

[97]  Yong Zeng,et al.  Environment-Based formulation of Design Problem , 2004, Trans. SDPS.

[98]  Jordi Forné,et al.  Private location-based information retrieval through user collaboration , 2010, Comput. Commun..

[99]  Hongtao Zhang VERTICAL INFORMATION EXCHANGE IN A SUPPLY CHAIN WITH DUOPOLY RETAILERS , 2002 .

[100]  Weiming Shen,et al.  Computer supported collaborative design: Retrospective and perspective , 2008, Comput. Ind..

[101]  Wei Liu,et al.  Conceptual Modeling of Design Chain Management towards Product Lifecycle Management , 2009 .

[102]  Agusti Solanas,et al.  A TTP-free protocol for location privacy in location-based services , 2008, Comput. Commun..

[103]  Michael D. Ryall,et al.  Formal Contracts in the Presence of Relational Enforcement Mechanisms: Evidence from Technology Development Projects , 2009, Manag. Sci..

[104]  Hui-Ming Wee,et al.  A distributed change control workflow for collaborative design network , 2008, Comput. Ind..

[105]  Amydee M. Fawcett,et al.  Supply chain trust: The catalyst for collaborative innovation , 2012 .

[106]  Mark S. Fox,et al.  Proceedings of the 8th international conference on Electronic commerce: The new e-commerce: innovations for conquering current barriers, obstacles and limitations to conducting successful business on the internet , 2006 .

[107]  Cheryl T. Druehl,et al.  When Is a Disruptive Innovation Disruptive , 2008 .

[108]  Zhu Zhen-fang,et al.  Research of Text Classification Technology based on Genetic Annealing Algorithm , 2008, 2008 International Symposium on Computational Intelligence and Design.

[109]  Ahmed Al-Ashaab,et al.  Knowledge web-based system architecture for collaborative product development , 2005, Comput. Ind..

[110]  Radmila Juric,et al.  Semantic Support for Dynamic Changes in Enterprise Business Models , 2010, Trans. SDPS.

[111]  Heloisa A. Camargo,et al.  On the use of fuzzy rules to text document classification , 2010, 2010 10th International Conference on Hybrid Intelligent Systems.

[112]  JungHyun Han,et al.  Hierarchical Role-Based Viewing for Multilevel Information Security in Collaborative CAD , 2006, J. Comput. Inf. Sci. Eng..

[113]  James D. Thompson Organizations in Action , 1967 .

[114]  Nabil R. Adam,et al.  Security-control methods for statistical databases: a comparative study , 1989, ACM Comput. Surv..

[115]  Wen-Chieh Chuang,et al.  Design Chain Collaboration - A Strategic View , 2004, Int. J. Electron. Bus. Manag..

[116]  E. Moradi,et al.  Quantitative Models in Supply Chain Management , 2012 .

[117]  Sang-Bum Kim,et al.  Effective Methods for Improving Naive Bayes Text Classifiers , 2002, PRICAI.

[118]  Richard A. Harshman,et al.  Indexing by Latent Semantic Analysis , 1990, J. Am. Soc. Inf. Sci..

[119]  Sholom M. Weiss,et al.  Automated learning of decision rules for text categorization , 1994, TOIS.

[120]  James D. Herbsleb,et al.  A Fine-grain Measure of Coordination: Implications for the Design of Collaboration and Awareness Tools , 2006 .

[121]  Hicham G. Elmongui,et al.  Secure supply-chain protocols , 2003, EEE International Conference on E-Commerce, 2003. CEC 2003..

[122]  Tzi-cker Chiueh,et al.  Enforcing Mandatory Access Control in Commodity OS to Disable Malware , 2012, IEEE Transactions on Dependable and Secure Computing.

[123]  E. Munoko,et al.  Computers in Industry , 1963, Nature.

[124]  Todd J. Arnold,et al.  The effects of customer acquisition and retention orientations on a firm’s radical and incremental innovation performance , 2011 .

[125]  Thorsten Joachims,et al.  Text Categorization with Support Vector Machines: Learning with Many Relevant Features , 1998, ECML.

[126]  David M. Nicol,et al.  A Formal-Semantics-Based Calculus of Trust , 2010, IEEE Internet Computing.

[127]  Chris Clifton,et al.  Tools for privacy preserving distributed data mining , 2002, SKDD.

[128]  Chun Wang,et al.  Adsche: Design of an Auction-Based Framework for Decentralized Scheduling , 2011, Trans. SDPS.

[129]  A. Yao,et al.  Fair exchange with a semi-trusted third party (extended abstract) , 1997, CCS '97.

[130]  Hau L. Lee,et al.  Information sharing in a supply chain , 2000, Int. J. Manuf. Technol. Manag..

[131]  Gerard Salton,et al.  Term-Weighting Approaches in Automatic Text Retrieval , 1988, Inf. Process. Manag..

[132]  Padmini Srinivasan,et al.  Automatic Text Categorization Using Neural Networks , 1997 .

[133]  R. Margerum Collaborative Planning , 2002 .

[134]  Kevin McCormack,et al.  Analysing risks in supply networks to facilitate outsourcing decisions , 2010 .

[135]  Namchul Do,et al.  An object-oriented conceptual model of a collaborative product development management (CPDM) system , 2006 .

[136]  Gu Si-yang,et al.  Privacy preserving association rule mining in vertically partitioned data , 2006 .

[137]  P ShethAmit,et al.  Federated database systems for managing distributed, heterogeneous, and autonomous databases , 1990 .

[138]  José Carlos Brustoloni,et al.  Intellectual Property Protection in Collaborative Design through Lean Information Modeling and Sharing , 2006, J. Comput. Inf. Sci. Eng..

[139]  D. Malhotra,et al.  The Effects of Contracts on Interpersonal Trust , 2002 .