Protecting and Securing PLM and Supply Chain Data
1 / 1

Protecting and Securing PLM and Supply Chain Data

Author : lois-ondreau | Published Date : 2025-06-23

Description: Protecting and Securing PLM and Supply Chain Data Rohit Ranchal PI Bharat Bhargava CERIAS Computer Sciences PLM Center of Excellence Purdue University Outline Background Problem Statement Related Work Managed Information Object Active

Presentation Embed Code

Download Presentation

Download Presentation The PPT/PDF document "Protecting and Securing PLM and Supply Chain Data" is the property of its rightful owner. Permission is granted to download and print the materials on this website for personal, non-commercial use only, and to display it on your personal computer provided you do not modify the materials and that you retain all copyright notices contained in the materials. By downloading content from our website, you accept the terms of this agreement.

Transcript:Protecting and Securing PLM and Supply Chain Data:
Protecting and Securing PLM and Supply Chain Data Rohit Ranchal PI: Bharat Bhargava CERIAS Computer Sciences PLM Center of Excellence Purdue University Outline Background Problem Statement Related Work Managed Information Object Active Bundle Scheme Extending Active Bundle Scheme Possible Projects 2 Background: Modern Enterprises Globally distributed operations e.g. Boeing, Cummins, Dow Agro Sciences Focus on core competencies and outsource auxiliary tasks to partner organizations Rely on Supply Chain to collaborate with partners in transforming raw materials into products Use PLM Information Systems to manage the information flow that facilitates the movement of physical product related entities in the supply chain PLM systems continuously receive, process and share dynamic supply chain information (sensitive data) Commercial information shared with advisors and lawyers Personally identifiable information about customers and employees Intellectual property shared with partners 3 Background: Supply Chain Interaction 4 Information Flow in Supply Chain Information Flow in Supply Chain Globally distributed supply chain processes Information not confined to a single domain but distributed among and controlled by multiple partners Outsourcing of shared information by partner organizations No way to track the information access and usage in external domain (organization has no control over the processes in external domain) Intermediate steps of information flow might expose information to hostile threats Unauthorized disclosure and data leakage of information shared among partners across multiple domains Violations and malicious activities in a trusted domain remain undetected 5 Impact of Security Threats Leakage of sensitive information - list of customers, product secrets etc to competitors, malicious entities, government institutions or attackers High financial losses Damage to the reputation of organization and its partners Criminal activities Affect on National Security 6 Challenges for Supply Chain Security Lack of mechanisms to communicate information owner’s policies to the protection frameworks of the partners Lack of information sharing standards for protecting data in distributed supply chains Custom security requirements and controls applied by partners Incompatibility and reduced ability to ensure policy enforcement leaves security gaps Disparate, evolving and changing Information security standards to satisfy changing business models, regulatory and geographical law requirements 7 Related Work Generalized approach to protect shared data Secure data e.g. using encryption Define Policies for data sharing and usage e.g. access control policies Setup Policy enforcement mechanism to enforce policies on data Classification of available solutions Policy Enforcement at the Sender Policy Enforcement in the middle Policy Enforcement at the Receiver 8 Related Work Policy enforcement

Download Document

Here is the link to download the presentation.
"Protecting and Securing PLM and Supply Chain Data"The content belongs to its owner. You may download and print it for personal use, without modification, and keep all copyright notices. By downloading, you agree to these terms.

Related Presentations

Evaluating Alternative Supply Chain Models for the Provisio Supply Chain Management Supply Chain Risk Management Alternative Securing Devices: Four-part Shackles SUPPLY CHAIN MANAGEMENT Protecting the U.S. Drug Supply Chain Protecting the Supply Chain Distribution and Supply Chain Management Defining a PLM Business Case to Gain Executive Support Jeff Pohl, Paymaster Training: Chapter 10 Supply Chain Management The Supply Chain Insights Platform: Synthesizing economic data for supply chain analysis Protecting and Securing PLM and Supply Chain Data