pdfreaders.org

Monitoring Security and Safety of Assets in Supply Chains

Ganna Monakova, Cristina Severin, Achim D. Brucker, Ulrich Flegel und Andreas Schaad

Cover for monakova.ea:monitoring:2012.In the today's world of the global economy supply chains become more and more complicated. Widely distributed supply chains open more possibilities for attacks on both IT as well physical level. The potential threats can span over multiple supply chains. For example, if the same truck is used to transport chemicals and then the same truck is used to transport food, a contamination threat arises that neither of the supply chains can detect when analysed independently.

In this paper, we present a tool-supported framework that extends modelling and execution of supply chains processes with specification, execution and monitoring of the security and safety constraints that are used to protect supply chain assets. The tool allows to detect not only threats scoped to a single supply chain, but cross-cutting threats that can only be detected through analysis of the whole system.

Schlüsselwörter: Supply Chain Security, Monitoring, Resource Modeling
Kategorien: ,
Dokumente: (Artikel als PDF Datei)

QR Code for monakova.ea:monitoring:2012.Bitte zitieren sie diesen Artikel wie folgt:
Ganna Monakova, Cristina Severin, Achim D. Brucker, Ulrich Flegel und Andreas Schaad. Monitoring Security and Safety of Assets in Supply Chains. In Future Security. Communications in Computer and Information Science, 318, pages 9-20, Springer-Verlag, 2012.
Schlüsselwörter: Supply Chain Security, Monitoring, Resource Modeling
(Artikel als PDF Datei) (BibTeX) (Endnote) (RIS) (Word) (doi:10.1007/978-3-642-33161-9_3) (Share article on LinkedIn. Share article on CiteULike.)

BibTeX
@InProceedings{ monakova.ea:monitoring:2012,
abstract = {In the today's world of the global economy supply chains become more and more complicated. Widely distributed supply chains open more possibilities for attacks on both IT as well physical level. The potential threats can span over multiple supply chains. For example, if the same truck is used to transport chemicals and then the same truck is used to transport food, a contamination threat arises that neither of the supply chains can detect when analysed independently.\\\\In this paper, we present a tool-supported framework that extends modelling and execution of supply chains processes with specification, execution and monitoring of the security and safety constraints that are used to protect supply chain assets. The tool allows to detect not only threats scoped to a single supply chain, but cross-cutting threats that can only be detected through analysis of the whole system.},
address = {Heidelberg},
author = {Ganna Monakova and Cristina Severin and Achim D. Brucker and Ulrich Flegel and Andreas Schaad},
booktitle = {Future Security},
doi = {10.1007/978-3-642-33161-9_3},
editor = {Nils Aschenbruck and Peter Martini and Michael Meier and Jens T{\"o}lle},
isbn = {978-3-642-33160-2},
keywords = {Supply Chain Security, Monitoring, Resource Modeling},
language = {USenglish},
pages = {9--20},
pdf = {https://www.brucker.ch/bibliography/download/2012/monakova.ea-monitoring-2012.pdf},
publisher = {Springer-Verlag},
series = {Communications in Computer and Information Science},
title = {Monitoring Security and Safety of Assets in Supply Chains},
url = {https://www.brucker.ch/bibliography/abstract/monakova.ea-monitoring-2012},
volume = {318},
year = {2012},
}