
By Ganna Monakova, Cristina Severin, Achim D. Brucker, Ulrich Flegel, and Andreas Schaad.
In the today’s world of the global economy supply chains become more and more complicated. Widely distributed supply chains open more possibilities for attacks on both IT as well physical level. The potential threats can span over multiple supply chains. For example, if the same truck is used to transport chemicals and then the same truck is used to transport food, a contamination threat arises that neither of the supply chains can detect when analysed independently.
In this paper, we present a tool-supported framework that extends modelling and execution of supply chains processes with specification, execution and monitoring of the security and safety constraints that are used to protect supply chain assets. The tool allows to detect not only threats scoped to a single supply chain, but cross-cutting threats that can only be detected through analysis of the whole system.
Keywords: Supply Chain Security, Monitoring, Resource Modeling
Please cite this work as follows: G. Monakova, C. Severin, A. D. Brucker, U. Flegel, and A. Schaad, “Monitoring security and safety of assets in supply chains,” in Future security, 2012, vol. 318, pp. 9–20. doi: 10.1007/978-3-642-33161-9_3. Author copy: http://logicalhacking.com/publications/monakova.ea-monitoring-2012/
@InProceedings{ monakova.ea:monitoring:2012,
author = {Ganna Monakova and Cristina Severin and Achim D. Brucker and
Ulrich Flegel and Andreas Schaad},title = {Monitoring Security and Safety of Assets in Supply Chains},
language = {USenglish},
booktitle = {Future Security},
pages = {9--20},
year = {2012},
doi = {10.1007/978-3-642-33161-9_3},
editor = {Nils Aschenbruck and Peter Martini and Michael Meier and Jens
\"o}lle},
T{volume = {318},
series = {Communications in Computer and Information Science},
abstract = {In the today's world of the global economy supply chains
become more and more complicated. Widely distributed supply
chains open more possibilities for attacks on both IT as well
physical level. The potential threats can span over multiple
supply chains. For example, if the same truck is used to
transport chemicals and then the same truck is used to
transport food, a contamination threat arises that neither of
the supply chains can detect when analysed independently.
In this paper, we present a tool-supported framework that
extends modelling and execution of supply chains processes
with specification, execution and monitoring of the security
and safety constraints that are used to protect supply chain
assets. The tool allows to detect not only threats scoped to a
single supply chain, but cross-cutting threats that can only
be detected through analysis of the whole system.},isbn = {978-3-642-33160-2},
publisher = {Springer-Verlag },
address = {Heidelberg },
areas = {security,bpm},
keywords = {Supply Chain Security, Monitoring, Resource Modeling},
note = {Author copy: \url{http://logicalhacking.com/publications/monakova.ea-monitoring-2012/}},
}