Posted on by Achim D. Brucker, licensed under CC BY-ND 4.0.

Secure Life Cycle Assessment in Complex Supply Chains

The environmental impact of products becomes an increasingly important factor in buying decisions of customers, moreover, is also a growing concern of lawmakers. Hence, companies have an increased interest in determining the ecological footprint of their products. A standardized method for computing the ecological footprint of a product is life-cycle assessment (LCA).

Life Cycle Assessment (LCA) is a technique that evaluates the ecological sustainability of a product or service in a quantitative way. LCA requires exhaustive and comprehensible information about industrial activities to make an accurate evaluation. LCA relies on a variety of data about the production and delivery processes of the partners within a supply chain. As this data can reveal, e.g., trade secrets, it is often classified as confidential. Moreover, the collaborations within a supply chain can reveal business relationships within a supply chain, which can be confidential in themselves. As a result, security and confidentially concerns are currently hindering both the collaboration within supply chains and the timely and precise LCA.

On the 9th of June 2020, Sakine gave her first presentation at the NeGIS 2020 Workshops. In her presentation, she presented an approach for LCA that ensures the confidentiality of data (e.g., information about details of production processes) and meta-data (e.g., supplier-consumer relationships). One of the core ideas is the decomposition of LCA into “levels”, which allows for applying secure multi-party computation (SMPC) efficiently, enabling close-to real time LCA in complex supply chains.

Supplementary Material

Welcome to the blog of the Software Assurance & Security Research Team at the University of Exeter. We blog regularly news, tips & tricks, as well as fun facts about software assurance, reliability, security, testing, verification, hacking, and logic.

You can also follow us on Twitter: @logicalhacking.

Categories

Archive

Tags

academia ai android apidesign appsec bitcoin blockchain bpmn browser browserextensions browsersecurity bug certification chrome composition cordova dast devops devsecops dom dsbd efsm epsrc event extensions fixeffort floss formaldocument formalmethods funding hol-ocl hol-testgen humanfactor hybridapps iast industry internetofthings iot isabelle/hol isabelledof isadof latex logic maintance malicous mbst mobile mobile apps modelinference modeling monads monitoring msc ocl ontology opensource owasp patches pet phd phdlife phishing policy protocols publishing reliability research safelinks safety sap sast sdlc secdevops secureprogramming security securityengineering securitytesting semantics servicecomposition skills smartcontract smartthings softwareeinginering softwaresecurity softwaresupplychain solidity staff&positions statemachine studentproject tcb test&proof testing tips&tricks tools transport tuos uk uoe upgrade usability verification vulnerabilities vulnerableapplication webinar websecurity

Search


blog whole site