The supply chain of a Living Lab: Modelling security, privacy, and vulnerability issues alongside with their impact and potential mitigation strategies.
Kitty KioskliDaniele DellagiacomaTheofanis FotisHaralambos MouratidisPublished in: J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. (2022)
Keyphrases
- supply chain
- security issues
- security risks
- supply chain management
- privacy issues
- information security
- rfid technology
- trading agents
- rfid systems
- security problems
- bullwhip effect
- lead time
- operating costs
- radio frequency identification rfid
- security mechanisms
- decision making
- data security
- personal information
- supplier selection
- inventory control
- quantity discount
- inventory management
- cost savings
- privacy concerns
- cloud computing
- authentication protocol
- security requirements
- privacy preserving
- optimal strategy
- customer demand
- service level
- access control
- security policies
- stackelberg game
- resource allocation