{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,6]],"date-time":"2025-11-06T05:53:38Z","timestamp":1762408418055},"reference-count":48,"publisher":"ASME International","issue":"2","content-domain":{"domain":["asmedigitalcollection.asme.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2006,6,1]]},"abstract":"<jats:title>Abstract<\/jats:title>\n               <jats:p>Establishing efficient, effective, and trustworthy engineering collaboration while protecting intellectual property is vital to maintain organizational competence in today\u2019s global business environment. In this paper, a lean information modeling and sharing framework is described to support engineering data security management in a peer-to-peer collaborative environment. It allows for selective and interoperable data sharing with fine-grained access control at both the server and client sides, thus securing different levels of design information dissemination for intellectual property protection purposes. The considerations of time and value-adding activity with roles, policy delegation relation in a distributed context, and fine-grained control at data set level in the model are to adhere to the general least privilege principle in access control. Heterogeneous design data are exchanged selectively through an eXtensible Markup Language common interface, which provides a neutral format to enhance data interoperability and prevents reverse engineering.<\/jats:p>","DOI":"10.1115\/1.2190235","type":"journal-article","created":{"date-parts":[[2006,5,26]],"date-time":"2006-05-26T15:16:37Z","timestamp":1148656597000},"page":"149-159","update-policy":"http:\/\/dx.doi.org\/10.1115\/crossmarkpolicy-asme","source":"Crossref","is-referenced-by-count":29,"title":["Intellectual Property Protection in Collaborative Design through Lean\n                    Information Modeling and Sharing"],"prefix":"10.1115","volume":"6","author":[{"given":"Yan","family":"Wang","sequence":"first","affiliation":[{"name":"NSF Center for e-Design, University of Central Florida, 4000 Central Florida Blvd., Orlando, FL 32816-2993"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Pamela N.","family":"Ajoku","sequence":"additional","affiliation":[{"name":"NSF Center for e-Design, University of Pittsburgh, 1048 Benedum Hall, Pittsburgh, PA 15261"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Jos\u00e9 C.","family":"Brustoloni","sequence":"additional","affiliation":[{"name":"Department of Computer Science, University of Pittsburgh, 6111 Sennott Sq. Bldg., 210 S. Bouquet St., Pittsburgh, PA 15260"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Bart O.","family":"Nnaji","sequence":"additional","affiliation":[{"name":"NSF Center for e-Design, University of Pittsburgh, 1048 Benedum Hall, Pittsburgh, PA 15261"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"33","published-online":{"date-parts":[[2005,11,23]]},"reference":[{"key":"2022042212514261900_c1","unstructured":"The white paper of U.S. National Science Foundation workshop on\n                    e-product design and realization for mechanically engineered products, October\n                    19\u201320, 2000, Pittsburgh, PA, http:\/\/www.e-designcenter.info"},{"key":"2022042212514261900_c2","unstructured":"Parunak, H. V.\n                                D.\n          , 1997,\n                        \u201cDistributed Collaborative Design (DisCollab): An ATP\n                        Opportunity,\u201d http:\/\/www.mel.nist.gov\/msid\/groups\/edt\/ATP\/white-paper (Whitepaper\n                    of NIST-ATP Workshop: Tools and Technologies for Distributed and Collaborative\n                    Design)"},{"key":"2022042212514261900_c3","unstructured":"Adobe DRM, http:\/\/www.adobe.co.uk\/epaper\/features\/drm\/drmtools.html"},{"key":"2022042212514261900_c4","unstructured":"IBM EMMS, http:\/\/www-306.ibm.com\/software\/data\/emms\/"},{"key":"2022042212514261900_c5","unstructured":"LockStream, http:\/\/www.lockstream.com"},{"key":"2022042212514261900_c6","unstructured":"Microsoft RMS, http:\/\/www.microsoft.com\/downloads\/details.aspx?FamilyID=be7fae0c-2db2-4f7f-8aa1-416fe1b04fb1&DisplayLang=en"},{"key":"2022042212514261900_c7","first-page":"316","article-title":"Comparing the\n                        Usage of Digital Rights Management Systems in the Music, Film, and Print\n                        Industry","volume-title":"ACM Proceedings of the Fifth\n                        International Conference on Electronic Commerce","author":"Fetscherin"},{"key":"2022042212514261900_c8","first-page":"55","article-title":"Broadcast\n                        Encryption With Short Keys and Transmissions","volume-title":"ACM\n                        Proceedings of the 2003 Workshop on Digital Rights Management","author":"Attrapadung"},{"key":"2022042212514261900_c9","first-page":"111","article-title":"Watermarking\n                        Schemes Provably Secure Against Copy and Ambiguity Attacks","volume-title":"ACM Proceedings of the 2003 Workshop on Digital Rights\n                        Management","author":"Adelsbach"},{"key":"2022042212514261900_c10","first-page":"176","article-title":"Inductive Methods\n                        and Contract-signing Protocols","volume-title":"ACM Proceedings of\n                        the Eigth Conference on Computer and Communications Security","author":"Chadha"},{"issue":"6","key":"2022042212514261900_c11","doi-asserted-by":"crossref","first-page":"883","DOI":"10.1109\/JPROC.2004.827357","article-title":"The Long March to\n                        Interoperable Digital Rights Management","volume":"92","author":"Koenen","journal-title":"Proc.\n                        IEEE","ISSN":"http:\/\/id.crossref.org\/issn\/0018-9219","issn-type":"print"},{"issue":"2","key":"2022042212514261900_c12","doi-asserted-by":"publisher","first-page":"1673","DOI":"10.1109\/83.650120","article-title":"Secure Spread\n                        Spectrum Watermarking for Images, Audio and Video","volume":"6","author":"Cox","journal-title":"IEEE Trans. Image Process.","ISSN":"http:\/\/id.crossref.org\/issn\/1057-7149","issn-type":"print"},{"issue":"2","key":"2022042212514261900_c13","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1109\/MSP.2004.1296540","article-title":"Data Hiding for\n                        Fighting Piracy","volume":"21","author":"Barni","journal-title":"IEEE Signal Process. Mag.","ISSN":"http:\/\/id.crossref.org\/issn\/1053-5888","issn-type":"print"},{"issue":"4","key":"2022042212514261900_c14","doi-asserted-by":"publisher","first-page":"551","DOI":"10.1109\/49.668977","article-title":"Watermarking\n                        Three-Dimensional Polygonal Models through Geometric and Topological\n                        Modifications","volume":"16","author":"Ohbuchi","journal-title":"IEEE J. Sel. Areas Commun.","ISSN":"http:\/\/id.crossref.org\/issn\/0733-8716","issn-type":"print"},{"issue":"1","key":"2022042212514261900_c15","doi-asserted-by":"crossref","first-page":"46","DOI":"10.1109\/38.736468","article-title":"Geometry-Based\n                        Watermarking of 3D Models","volume":"19","author":"Benedens","journal-title":"IEEE Comput. Graphics\n                        Appl.","ISSN":"http:\/\/id.crossref.org\/issn\/0272-1716","issn-type":"print"},{"key":"2022042212514261900_c16","first-page":"709","article-title":"Watermarking Graphical Objects","volume-title":"IEEE Proceedings of the 14th International Conference on Digital\n                        Signal Processing","author":"Harte"},{"key":"2022042212514261900_c17","first-page":"49","article-title":"Robust Mesh\n                        Watermarking","volume-title":"ACM Proc. SIGGRAPH\u201999","author":"Praun"},{"key":"2022042212514261900_c18","first-page":"296","article-title":"Digitial\n                        Watermarking for 3D Polygons Using Multiresolution Wavelet\n                        Decomposition","volume-title":"Proceedings of the Sixth IFIP\n                        WG5.2\/GI International Workshop on Geometric Modelling: Fundamentals &\n                        Applications","author":"Kanai"},{"issue":"3","key":"2022042212514261900_c19","first-page":"409","article-title":"Robust Mesh\n                        Watermarking Based on Multiresolution Processing","volume":"25","author":"Yi","journal-title":"Comput. Graphics","ISSN":"http:\/\/id.crossref.org\/issn\/0097-8493","issn-type":"print"},{"key":"2022042212514261900_c20","doi-asserted-by":"crossref","first-page":"1344","DOI":"10.1016\/S0140-3664(98)00202-3","article-title":"Data Embedding\n                        Algorithm for Geometrical and Non-geometrical Targets in Three-Dimensional\n                        Polygonal Models","volume":"21","author":"Ohbuchi","journal-title":"Comput. Commun.","ISSN":"http:\/\/id.crossref.org\/issn\/0140-3664","issn-type":"print"},{"key":"2022042212514261900_c21","first-page":"450","article-title":"A Mesh\n                        Watermarking Approach for Appearance Attributes","volume-title":"IEEE Proceedings of the Tenth Pacific Conference on Computer\n                        Graphics & Applications (PG\u201902)","author":"Zhang"},{"key":"2022042212514261900_c22","first-page":"180","article-title":"A\n                        Shape-Preserving Data Embedding Algorithm for NURBS Curves and\n                        Surfaces","volume-title":"IEEE Proceedings of the 1999 Computer\n                        Graphics International (CGI\u201999)","author":"Ohbuchi"},{"issue":"10","key":"2022042212514261900_c23","doi-asserted-by":"crossref","first-page":"1253","DOI":"10.1109\/43.952741","article-title":"Fingerprinting\n                        Techniques for Field-Programmable Gate Array Intellectual Property\n                        Protection","volume":"20","author":"Lach","journal-title":"IEEE Trans. Comput.-Aided Des. Integr.\n                        Circuits Sys."},{"issue":"2","key":"2022042212514261900_c24","doi-asserted-by":"crossref","first-page":"208","DOI":"10.1109\/TCAD.2003.822126","article-title":"Effective Iterative Techniques for Fingerprinting Design\n                        IP","volume":"23","author":"Caldwell","journal-title":"IEEE Trans. Comput.-Aided Des. Integr. Circuits\n                        Sys."},{"key":"2022042212514261900_c25","first-page":"196","article-title":"Shape Intrinsic\n                        Fingerprints for Free-Form Object Matching","volume-title":"ACM\n                        Proceedings of the SM\u201903","author":"Ko"},{"issue":"9","key":"2022042212514261900_c26","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1109\/35.312842","article-title":"Access Control:\n                        Principle and Practice","volume":"32","author":"Sandhu","journal-title":"IEEE Commun. Mag.","ISSN":"http:\/\/id.crossref.org\/issn\/0148-9615","issn-type":"print"},{"issue":"11","key":"2022042212514261900_c27","first-page":"9","article-title":"Lattice-Based\n                        Access Control Models","volume":"26","author":"Sandhu","journal-title":"IEEE Comput. Graphics\n                        Appl.","ISSN":"http:\/\/id.crossref.org\/issn\/0272-1716","issn-type":"print"},{"issue":"2","key":"2022042212514261900_c28","first-page":"38","article-title":"Role-Based Access Control Models","volume":"29","author":"Sandhu","journal-title":"IEEE Comput. Graphics Appl.","ISSN":"http:\/\/id.crossref.org\/issn\/0272-1716","issn-type":"print"},{"issue":"3","key":"2022042212514261900_c29","doi-asserted-by":"publisher","first-page":"224","DOI":"10.1145\/501978.501980","article-title":"Proposed NIST\n                        Standard for Role-Based Access Control","volume":"4","author":"Ferraiolo","journal-title":"ACM Trans.\n                        Inf. Syst. secur.","ISSN":"http:\/\/id.crossref.org\/issn\/1094-9224","issn-type":"print"},{"key":"2022042212514261900_c30","first-page":"21","article-title":"Flexible Team-Based Access Control Using\n                        Contexts","volume-title":"Proceedings of the Sixth ACM Symposium on\n                        Access Control Models and Technologies","author":"Georgiadis"},{"key":"2022042212514261900_c31","first-page":"13","article-title":"Team-Based Access Control (TMAC): A Primitive for Applying\n                        Role-Based Access Controls in Collaborative Environments","volume-title":"Proceedings of the Second ACM Workshop on Role-based Access\n                        Control","author":"Thomas"},{"key":"2022042212514261900_c32","first-page":"158","article-title":"Cryptographic\n                        Access Control in a Distributed File System","volume-title":"Proceedings of the Eigth ACM Symposium on Access Control Models and\n                        Technologies","author":"Harrington"},{"key":"2022042212514261900_c33","doi-asserted-by":"crossref","DOI":"10.1115\/DETC2003\/CIE-48277","article-title":"Hierarchical\n                        Role-Based Viewing for Secure Collaborative CAD","volume-title":"Proceedings of the 2003 ASME International Design Engineering\n                        Technical Conferences & The Computer and Information in Engineering\n                        Conference (DETC\/CIE2003)","author":"Cera"},{"issue":"9","key":"2022042212514261900_c34","doi-asserted-by":"crossref","first-page":"873","DOI":"10.1016\/j.cad.2003.09.014","article-title":"Role-Based Viewing Envelopes for Information Protection in\n                        Collaborative Modeling","volume":"36","author":"Cera","journal-title":"CAD","ISSN":"http:\/\/id.crossref.org\/issn\/0010-4485","issn-type":"print"},{"key":"2022042212514261900_c35","first-page":"191","article-title":"Scheduled Role-Based Distributed Data Access Control Model\n                        for Data Sharing in Collaborative Design","volume-title":"Proceedings of the 2004 International Symposium on Collaborative\n                        Technologies and Systems (CTS2004)","author":"Wang"},{"key":"2022042212514261900_c36","doi-asserted-by":"crossref","DOI":"10.1115\/DETC2004-57748","article-title":"Distributed Data Access Control for Lean Product Information\n                        Sharing in Collaborative Design","volume-title":"Proceedings of the\n                        2004 ASME International Design Engineering Technical Conferences & The\n                        Computer and Information in Engineering Conference (DETC\/CIE2004)","author":"Wang"},{"key":"2022042212514261900_c37","doi-asserted-by":"crossref","DOI":"10.1115\/DETC2003\/CIE-48282","article-title":"Business-to-Business Virtual Collaboration of Aircraft\n                        Engine Combustor Design","volume-title":"Proceedings of the 2003\n                        ASME International Design Engineering Technical Conferences & The\n                        Computer and Information in Engineering Conference (DETC\/CIE2003)","author":"Kao"},{"key":"2022042212514261900_c38","unstructured":"Engineous Software, http:\/\/www.engineous.com"},{"key":"2022042212514261900_c39","doi-asserted-by":"crossref","DOI":"10.1115\/DETC2004-57743","article-title":"STEP, XML, and UML: Complementary\n                        Technologies","volume-title":"Proceedings of the 2004 ASME\n                        International Design Engineering Technical Conferences & The Computer\n                        and Information in Engineering Conference (DETC\/CIE2004)","author":"Lubell"},{"key":"2022042212514261900_c40","volume-title":"Product Data Representation and Exchange: Implementation Methods:\n                        XML Schema Governed Representation of EXPRESS Schema Governed Data,\n                        2004-02-17"},{"key":"2022042212514261900_c41","unstructured":"Organization for the Advancement of Structured Information\n                    Standards, http:\/\/www.oasis-open.org"},{"key":"2022042212514261900_c42","unstructured":"World Wide Web Consortium, http:\/\/www.w3.org"},{"key":"2022042212514261900_c43","unstructured":"JT Open, http:\/\/www.jtopen.com"},{"key":"2022042212514261900_c44","unstructured":"Web Consortium, http:\/\/www.web3d.org"},{"key":"2022042212514261900_c45","unstructured":"UGS, http:\/\/www.ugs.com\/products\/open\/plmxml\/"},{"issue":"17","key":"2022042212514261900_c46","doi-asserted-by":"crossref","first-page":"3743","DOI":"10.1080\/002075403410001708443","article-title":"UL-PML: Constraint-Enabled Distributed Product Data\n                        Model","volume":"42","author":"Wang","journal-title":"Int. J. Prod. Res.","ISSN":"http:\/\/id.crossref.org\/issn\/0020-7543","issn-type":"print"},{"issue":"1","key":"2022042212514261900_c47","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1115\/1.1476682","article-title":"XML\n                        Representation of STEP Schemas and Data","volume":"2","author":"Lubell","journal-title":"ASME J.\n                        Comput. Inf. Sci. Eng.","ISSN":"http:\/\/id.crossref.org\/issn\/1530-9827","issn-type":"print"},{"key":"2022042212514261900_c48","article-title":"From Model to\n                        Markup","volume-title":"Proceedings of the 2002 XML\n                        Conference","author":"Lubell"}],"container-title":["Journal of Computing and Information Science in Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/asmedigitalcollection.asme.org\/computingengineering\/article-pdf\/6\/2\/149\/6873759\/149_1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/asmedigitalcollection.asme.org\/computingengineering\/article-pdf\/6\/2\/149\/6873759\/149_1.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,22]],"date-time":"2022-04-22T12:52:12Z","timestamp":1650631932000},"score":1,"resource":{"primary":{"URL":"https:\/\/asmedigitalcollection.asme.org\/computingengineering\/article\/6\/2\/149\/446548\/Intellectual-Property-Protection-in-Collaborative"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005,11,23]]},"references-count":48,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2006,6,1]]}},"URL":"https:\/\/doi.org\/10.1115\/1.2190235","relation":{},"ISSN":["1530-9827","1944-7078"],"issn-type":[{"value":"1530-9827","type":"print"},{"value":"1944-7078","type":"electronic"}],"subject":[],"published":{"date-parts":[[2005,11,23]]}}}