Secure Supply-Chain Protocols
نویسندگان
چکیده
Supply chain interactions have huge economic importance, yet these interactions are managed inefficiently. One of the major sources of inefficiency in supply-chain management is information asymmetry; i.e., information that is available to one or more organizations in the chain (e.g., manufacturer, retailer) is not available to others. There are several causes of information asymmetry, among them fear that a powerful buyer or supplier will take advantage of private information, that information will leak to a competitor, etc. We propose Secure Supply-Chain Collaboration (SSCC) protocols that enable supply-chain partners to cooperatively achieve desired system-wide goals without revealing the private information of any of the parties, even though the jointly-computed decisions require the information of all the parties. Secure supply-chain collaboration has the potential to improve supply-chain management practice, and, by removing one major inefficiency therein, improve productivity. We present specific SSCC protocols for two types of supply-chain interactions: Capacity allocation, and e-auctions. In the course of doing so, we design techniques that are of independent interest, and are likely to be useful in the design of future SSCC protocols.
منابع مشابه
Secure Supply-Chain Collaboration: A New Technology for Supply-Chain Management1
One of the major sources of inefficiency in managing supply chains is information asymmetry; i.e., information known by one or more links in the chain (e.g., a retailer) is not known by other links (e.g., the manufacturer) . Information asymmetry is known to create inefficiencies in managing supply chains, among them underinvestment in capacity, leading to shortages, misallocation of inventory,...
متن کاملSecure Collaborative Planning, Forecasting, and Replenishment (SCPFR)
Although the benefits of information sharing between supply-chain partners are well known, many companies are averse to share their “private” information due to fear of adverse impact of information leakage. This paper uses techniques from Secure Multiparty Computation (SMC) to develop “secure protocols” for the CPFR r © † (Collaborative Planning, Forecasting, and Replenishment) business proces...
متن کاملParallelizing secure linear programming
Information sharing in supply chain management can dramatically improve the performance of the supply chain. Although many such problems can be modeled and efficiently solved using linear programming, security requirements prevent their implementation in the traditional way. Companies are simply reluctant to exchange such sensitive information. Secure multi-party computation can help by realizi...
متن کاملImproving Lifetime of Strategic Information Network in Oil Supply Chain
Today, information networks play an important role in supply chain management. Therefore, in this article, clustering-based routing protocols, which are one of the most important ways to reduce energy consumption in wireless sensor networks, are used to optimize the supply chain informational cloud network. Accordingly, first, a clustering protocol is presented using self-organizing map neu...
متن کاملImproving Lifetime of Strategic Information Network in Oil Supply Chain
Today, information networks play an important role in supply chain management. Therefore, in this article, clustering-based routing protocols, which are one of the most important ways to reduce energy consumption in wireless sensor networks, are used to optimize the supply chain informational cloud network. Accordingly, first, a clustering protocol is presented using self-organizing map neu...
متن کامل