{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,16]],"date-time":"2026-01-16T08:43:56Z","timestamp":1768553036500,"version":"3.49.0"},"reference-count":189,"publisher":"ASME International","issue":"4","funder":[{"DOI":"10.13039\/501100008982","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1329979"],"award-info":[{"award-number":["1329979"]}],"id":[{"id":"10.13039\/501100008982","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["asmedigitalcollection.asme.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,12,1]]},"abstract":"<jats:p>Developments in digital technology and manufacturing processes have expanded the horizon of designer innovation in creating products. In addition to this, real-time collaborative platforms help designers shorten the product development cycle by enabling collaborations with domain experts from concept generation to product realization and after-market. These collaborations are extending beyond enterprise and national boundaries, contributing to a growing concern among designers regarding the security of their sensitive information such as intellectual property (IP) and trade secrets. The source of such sensitive information leaks could be external (e.g., hacker) or internal (e.g., disgruntled employee) to the collaboration. From a designer's perspective, this fear can inhibit participation in a collaboration even though it might result in better products or services. In this paper, we aim to contextualize this evolving security space by discussing various security practices in digital domains, such as encryption and secret sharing, as well as manufacturing domains, such as physically unclonable function (PUF) and physical part watermarking for anticounterfeiting and tamper evidence purposes. Further, we classify these practices with respect to their performance against different adversarial models for different stages in product development. Such a classification can help designers to make informed decisions regarding security practices during the product realization process.<\/jats:p>","DOI":"10.1115\/1.4040341","type":"journal-article","created":{"date-parts":[[2018,7,21]],"date-time":"2018-07-21T00:42:20Z","timestamp":1532133740000},"update-policy":"https:\/\/doi.org\/10.1115\/crossmarkpolicy-asme","source":"Crossref","is-referenced-by-count":25,"title":["Security in Cyber-Enabled Design and Manufacturing: A Survey"],"prefix":"10.1115","volume":"18","author":[{"given":"Siva Chaitanya","family":"Chaduvula","sequence":"first","affiliation":[{"name":"School of Mechanical Engineering, Purdue University, West Lafayette, IN 47907 e-mail:"}]},{"given":"Adam","family":"Dachowicz","sequence":"additional","affiliation":[{"name":"School of Mechanical Engineering, Purdue University, West Lafayette, IN 47907 e-mail:"}]},{"given":"Mikhail J.","family":"Atallah","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Purdue University, West Lafayette, IN 47907"}]},{"given":"Jitesh H.","family":"Panchal","sequence":"additional","affiliation":[{"name":"School of Mechanical Engineering, Purdue University, West Lafayette, IN 47907"}]}],"member":"33","published-online":{"date-parts":[[2018,7,5]]},"reference":[{"key":"2019100315030812400_bib1","volume-title":"Engineering Design: A Systematic Approach","year":"2013"},{"issue":"1","key":"2019100315030812400_bib2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.compind.2003.09.002","article-title":"A Review of Internet-Based Product Information Sharing and Visualization","volume":"54","year":"2004","journal-title":"Comput. Ind."},{"key":"2019100315030812400_bib3","article-title":"Target Provides Update on Data Breach and Financial Performance","author":"Target","year":"2013"},{"key":"2019100315030812400_bib4","article-title":"After Jeep Hack, Chrysler Recalls 1.4m Vehicles for Bug Fix","year":"2015"},{"key":"2019100315030812400_bib5","article-title":"Cybersecurity for Manufacturers: Securing the Digitized and Connected Factory","year":"2017"},{"key":"2019100315030812400_bib6","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1016\/S1353-4858(11)70086-1","article-title":"Advanced Persistent Threats and How to Monitor and Deter Them","volume":"8","year":"2011","journal-title":"Network Secur."},{"key":"2019100315030812400_bib7","doi-asserted-by":"crossref","unstructured":"Bilge, L., and Dumitras, T., 2012, \u201cBefore We Knew It: An Empirical Study of Zero-Day Attacks in the Real World,\u201d ACM Conference on Computer and Communications Security (CCS), Raleigh, NC, Oct. 16\u201318, pp. 833\u2013844.","DOI":"10.1145\/2382196.2382284"},{"key":"2019100315030812400_bib8","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1016\/j.cose.2013.04.004","article-title":"From Information Security to Cyber Security","volume":"38","year":"2013","journal-title":"Comput. Secur."},{"key":"2019100315030812400_bib9","doi-asserted-by":"crossref","unstructured":"Mouratidis, H., Giorgini, P., and Manson, G., 2003, \u201cIntegrating Security and Systems Engineering: Towards the Modelling of Secure Information Systems,\u201d International Conference on Advanced Information Systems Engineering, Klagenfurt, Austria, June 16\u201318, pp. 63\u201378.http:\/\/citeseerx.ist.psu.edu\/viewdoc\/download?doi=10.1.1.65.2014&rep=rep1&type=pdf","DOI":"10.1007\/3-540-45017-3_7"},{"key":"2019100315030812400_bib10","article-title":"Security in Open Versus Closed Systems\u2014the Dance of Boltzmann, Coase and Moore","year":"2002"},{"key":"2019100315030812400_bib11","unstructured":"C\u00e1rdenas, A. A., Amin, S., and Sastry, S., 2008, \u201cResearch Challenges for the Security of Control Systems,\u201d Third Conference on Hot Topics in Security (HOTSEC), Berkeley, CA, pp. 1\u20136."},{"key":"2019100315030812400_bib12","doi-asserted-by":"crossref","unstructured":"Kocher, P., Lee, R., McGraw, G., Raghunathan, A., and Moderator-Ravi, S., 2004, \u201cSecurity as a New Dimension in Embedded System Design,\u201d 41st Annual Design Automation Conference, San Diego, CA, July 7\u201311, pp. 753\u2013760.https:\/\/ieeexplore.ieee.org\/document\/1322583\/","DOI":"10.1145\/996566.996771"},{"key":"2019100315030812400_bib13","volume-title":"The (Honest) Truth About Dishonesty: How We Lie to Everyone, Especially Ourselves","year":"2012"},{"key":"2019100315030812400_bib14","unstructured":"Roosta, T., Shieh, S., and Sastry, S., 2006, \u201cTaxonomy of Security Attacks in Sensor Networks and Countermeasures,\u201d First IEEE International Conference on System Integration and Reliability Improvements, Hanoi, VN, Dec. 13\u201315, p. 94."},{"issue":"1","key":"2019100315030812400_bib15","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1145\/2545883","article-title":"Security and Privacy Protection in Visual Sensor Networks: A Survey","volume":"47","year":"2014","journal-title":"ACM Comput. Surv. (CSUR)"},{"key":"2019100315030812400_bib16","article-title":"Watermark Holograms","volume-title":"6,782,115B2","year":"2004"},{"key":"2019100315030812400_bib17","doi-asserted-by":"crossref","unstructured":"Staake, T., Thiesse, F., and Fleisch, E., 2005, \u201cExtending the Epc Network: The Potential of Rfid in Anti-Counterfeiting,\u201d ACM Symposium on Applied Computing (SAC '05), Santa Fe, NM, Mar. 13\u201317, pp. 1607\u20131612.10.1145\/1066677.1067041","DOI":"10.1145\/1066677.1067041"},{"key":"2019100315030812400_bib18","doi-asserted-by":"crossref","unstructured":"Devadas, S., Suh, E., Paral, S., Sowell, R., Ziola, T., and Khandelwal, V., 2008, \u201cDesign and Implementation of PUF-Based \u201cUnclonable\u201d RFID ICS for Anti-Counterfeiting and Security Applications,\u201d IEEEInternational Conference on RFID, Las Vegas, NV, Apr. 16\u201317, pp. 58\u201364.10.1109\/RFID.2008.4519377","DOI":"10.1109\/RFID.2008.4519377"},{"key":"2019100315030812400_bib19","doi-asserted-by":"crossref","unstructured":"Suh, G. E., and Devadas, S., 2007, \u201cPhysical Unclonable Functions for Device Authentication and Secret Key Generation,\u201d 44th ACM\/IEEE Design Automation Conference, San Diego, CA, June 4\u20138, Apr. 16\u201317, pp. 9\u201314.https:\/\/ieeexplore.ieee.org\/document\/4261134\/","DOI":"10.1109\/DAC.2007.375043"},{"key":"2019100315030812400_bib20","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1007\/978-3-642-14452-3_1","article-title":"Physically Unclonable Functions: A Study on the State of the Art and Future Research Directions","volume-title":"Towards Hardware-Intrinsic Security","year":"2010"},{"key":"2019100315030812400_bib21","doi-asserted-by":"crossref","unstructured":"Bond, M., 2001, \u201cAttacks on Cryptoprocessor Transaction Sets,\u201d Cryptographic Hardware and Embedded Systems (CHES), Paris, France, May 14\u201316, pp. 220\u2013234.10.1007\/3-540-44709-1_19","DOI":"10.1007\/3-540-44709-1_19"},{"issue":"2","key":"2019100315030812400_bib22","doi-asserted-by":"publisher","first-page":"357","DOI":"10.1109\/JPROC.2005.862423","article-title":"Cryptographic Processors-A Survey","volume":"94","year":"2006","journal-title":"Proc. IEEE"},{"key":"2019100315030812400_bib23","doi-asserted-by":"crossref","unstructured":"Rieck, K., Holz, T., Willems, C., D\u00fcssel, P., and Laskov, P., 2008, \u201cLearning and Classification of Malware Behavior,\u201d International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA 2008), Paris, France, July 10\u201311, pp. 108\u2013125.10.1007\/978-3-540-70542-0_6","DOI":"10.1007\/978-3-540-70542-0_6"},{"issue":"4","key":"2019100315030812400_bib24","doi-asserted-by":"publisher","first-page":"639","DOI":"10.3233\/JCS-2010-0410","article-title":"Automatic Analysis of Malware Behavior Using Machine Learning","volume":"19","year":"2011","journal-title":"J. Comput. Secur."},{"key":"2019100315030812400_bib25","doi-asserted-by":"crossref","unstructured":"Jakubowski, M. H., Saw, C. W. N., and Venkatesan, R., 2009, \u201cTamper-Tolerant Software: Modeling and Implementation,\u201d International Workshop on Security (IWSEC 2009), Heidelberg, Germany, Oct. 28, pp. 125\u2013139.10.1007\/978-3-642-04846-3_9","DOI":"10.1007\/978-3-642-04846-3_9"},{"key":"2019100315030812400_bib26","unstructured":"Langelaar, G. C., Lagendijk, R. L., and Biemond, J., 1998, \u201cRemoving Spatial Spread Spectrum Watermarks by Non-Linear Filtering,\u201d Nineth European Signal Processing Conference (EUSIPCO), Rhodes, Greece, Sept. 8\u201311, pp. 1\u20134.https:\/\/ieeexplore.ieee.org\/document\/7089554\/"},{"key":"2019100315030812400_bib27","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.cad.2014.07.006","article-title":"Cloud-Based Design and Manufacturing: A New Paradigm in Digital Manufacturing and Design Innovation","volume":"59","year":"2015","journal-title":"Comput.-Aided Des."},{"issue":"1","key":"2019100315030812400_bib28","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1016\/j.rcim.2011.07.002","article-title":"From Cloud Computing to Cloud Manufacturing","volume":"28","year":"2012","journal-title":"Rob. Comput.-Integr. Manuf."},{"issue":"1","key":"2019100315030812400_bib29","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1177\/0954405411405575","article-title":"Cloud Manufacturing: A New Service-Oriented Networked Manufacturing Model","volume":"16","year":"2010","journal-title":"Comput. Integr. Manuf. Syst."},{"key":"2019100315030812400_bib30","volume-title":"Blockchain: Blueprint for a New Economy","year":"2015"},{"key":"2019100315030812400_bib31","doi-asserted-by":"crossref","unstructured":"Tan, L., and Sherwood, T., 2005, \u201cA High Throughput String Matching Architecture for Intrusion Detection and Prevention,\u201d 32nd International Symposium on Computer Architecture (ISCA'05), Madison, WI, June 4\u20138, pp. 112\u2013122.10.1109\/ISCA.2005.5","DOI":"10.1145\/1080695.1069981"},{"issue":"2","key":"2019100315030812400_bib32","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1145\/293411.293443","article-title":"Onion Routing","volume":"42","year":"1999","journal-title":"Commun. ACM"},{"key":"2019100315030812400_bib33","article-title":"AES Proposal: Rijndael","year":"1999"},{"key":"2019100315030812400_bib34","article-title":"Announcing the Advanced Encryption Standard (AES)"},{"issue":"6","key":"2019100315030812400_bib35","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","article-title":"New Directions in Cryptography","volume":"22","year":"1976","journal-title":"IEEE Trans. Inf. Theory"},{"key":"2019100315030812400_bib36","article-title":"About Passwords and Encryption","author":"AutoDesk-2016","year":"2017"},{"key":"2019100315030812400_bib37","article-title":"Onshape Security","author":"Onshape","year":"2017"},{"issue":"2","key":"2019100315030812400_bib38","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1145\/359340.359342","article-title":"A Method for Obtaining Digital Signatures and Public-Key Cryptosystems","volume":"21","year":"1978","journal-title":"Commun. ACM"},{"issue":"4","key":"2019100315030812400_bib39","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1109\/TIT.1985.1057074","article-title":"A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms","volume":"31","year":"1985","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"177","key":"2019100315030812400_bib40","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1090\/S0025-5718-1987-0866109-5","article-title":"Elliptic Curve Cryptosystems","volume":"48","year":"1987","journal-title":"Math. Comput."},{"key":"2019100315030812400_bib41","first-page":"417","article-title":"Use of Elliptic Curves in Cryptography","volume-title":"CRYPTO '85","year":"1985"},{"issue":"11","key":"2019100315030812400_bib42","doi-asserted-by":"publisher","first-page":"612","DOI":"10.1145\/359168.359176","article-title":"How to Share a Secret","volume":"22","year":"1979","journal-title":"Commun. ACM"},{"key":"2019100315030812400_bib43","doi-asserted-by":"crossref","unstructured":"Blakley, G. R., 1979, \u201cSafeguarding Cryptographic Keys,\u201d National Computer Conference, Monval, NJ, June 4\u20137, pp. 313\u2013317.","DOI":"10.1109\/MARK.1979.8817296"},{"issue":"5","key":"2019100315030812400_bib44","doi-asserted-by":"publisher","first-page":"765","DOI":"10.1016\/S0097-8493(02)00131-0","article-title":"Secret Image Sharing","volume":"26","year":"2002","journal-title":"Comput. Graph."},{"issue":"9","key":"2019100315030812400_bib45","doi-asserted-by":"publisher","first-page":"909","DOI":"10.1109\/71.722223","article-title":"Access Control and Signatures Via Quorum Secret Sharing","volume":"9","year":"1998","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"2019100315030812400_bib46","first-page":"223","article-title":"Public-Key Cryptosystems Based on Composite Degree Residuosity Classes","volume-title":"Eurocrypt","year":"1999"},{"issue":"2","key":"2019100315030812400_bib47","doi-asserted-by":"publisher","first-page":"270","DOI":"10.1016\/0022-0000(84)90070-9","article-title":"Probabilistic Encryption","volume":"28","year":"1984","journal-title":"J. Comput. Syst. Sci."},{"key":"2019100315030812400_bib48","unstructured":"Gentry, C., 2009, \u201cA Fully Homomorphic Encryption Scheme,\u201d Stanford University, Stanford, CA."},{"key":"2019100315030812400_bib49","doi-asserted-by":"crossref","unstructured":"Chaum, D., Cr\u00e9peau, C., and Damgard, I., 1988, \u201cMultiparty Unconditionally Secure Protocols,\u201d 20th Annual ACM Symposium on Theory of Computing (STOC '88), Chicago, IL, May 2\u20134, pp. 11\u201319.10.1145\/62212.62214","DOI":"10.1145\/62212.62214"},{"key":"2019100315030812400_bib50","doi-asserted-by":"crossref","unstructured":"Cramer, R., Damg\u00e5rd, I., and Maurer, U., 2000, \u201cGeneral Secure Multi-Party Computation From any Linear Secret-Sharing Scheme,\u201d 19th International Conference on Theory and Application of Cryptographic Techniques (EUROCRYPT'00), Bruges, Belgium, May 14\u201318, pp. 316\u2013334.https:\/\/dl.acm.org\/citation.cfm?id=1756200","DOI":"10.1007\/3-540-45539-6_22"},{"key":"2019100315030812400_bib51","doi-asserted-by":"crossref","unstructured":"Ben-Or, M., Goldwasser, S., and Wigderson, A., 1988, \u201cCompleteness Theorems for Non-Cryptographic Fault-Tolerant Distributed Computation,\u201d 20th Annual ACM Symposium on Theory of Computing (STOC '88), Chicago, IL, May 2\u20134, pp. 1\u201310.10.1145\/62212.62213","DOI":"10.1145\/62212.62213"},{"key":"2019100315030812400_bib52","article-title":"HMAC: Keyed-Hashing for Message Authentication","volume-title":"IETF RFC 2104","year":"1997"},{"key":"2019100315030812400_bib53","first-page":"1","article-title":"Keying Hash Functions for Message Authentication","volume-title":"Advances in Cryptology\u2014CRYPTO","year":"1996"},{"key":"2019100315030812400_bib54","article-title":"The Oauth 2.0 Authorization Framework","volume-title":"RFC 6749","year":"2012"},{"key":"2019100315030812400_bib55","doi-asserted-by":"crossref","unstructured":"Banyal, R. K., Jain, P., and Jain, V. K., 2013, \u201cMulti-Factor Authentication Framework for Cloud Computing,\u201d Fifth International Conference on Computational Intelligence, Modelling and Simulation (CIMSim), Seoul, South Korea, Sept. 24\u201325, pp. 105\u2013110.10.1109\/CIMSim.2013.25","DOI":"10.1109\/CIMSim.2013.25"},{"key":"2019100315030812400_bib56","article-title":"Secure Computer Systems: Mathematical Foundations","year":"1973"},{"issue":"5","key":"2019100315030812400_bib57","doi-asserted-by":"publisher","first-page":"571","DOI":"10.1142\/S021848850200165X","article-title":"Achieving k-Anonymity Privacy Protection Using Generalization and Suppression","volume":"10","year":"2002","journal-title":"Int. J. Uncertainty, Fuzziness Knowl.-Based Syst."},{"key":"2019100315030812400_bib58","first-page":"123","volume-title":"Guide to General Server Security","year":"2008"},{"issue":"5","key":"2019100315030812400_bib59","doi-asserted-by":"publisher","first-page":"361","DOI":"10.1016\/0010-4485(95)00055-0","article-title":"Case-Based Conceptual Design Information Server for Concurrent Engineering","volume":"28","year":"1996","journal-title":"Comput.-Aided Des."},{"issue":"1\u20132","key":"2019100315030812400_bib60","doi-asserted-by":"publisher","first-page":"183","DOI":"10.1007\/s00170-004-2262-9","article-title":"A Design Chain Collaboration Framework Using Reference Models","volume":"26","year":"2005","journal-title":"Int. J. Adv. Manuf. Technol."},{"key":"2019100315030812400_bib61","article-title":"Collaborative Product Commerce: Creating Value Across the Enterprise","year":"2002"},{"issue":"4","key":"2019100315030812400_bib62","doi-asserted-by":"publisher","first-page":"377","DOI":"10.1115\/1.1315592","article-title":"Evaluation of Idea Generation Methods for Conceptual Design: Effectiveness Metrics and Design of Experiments","volume":"122","year":"2000","journal-title":"ASME J. Mech. Des."},{"key":"2019100315030812400_bib63","doi-asserted-by":"crossref","unstructured":"Horner, J., and Atwood, M. E., 2006, \u201cDesign Rationale: The Rationale and the Barriers,\u201d Fourth Nordic Conference on Human-Computer Interaction: Changing Roles (NordiCHI 2006), Oslo, Norway, Oct. 14\u201318, pp. 341\u2013350.10.1145\/1182475.1182511","DOI":"10.1145\/1182475.1182511"},{"issue":"9","key":"2019100315030812400_bib64","doi-asserted-by":"publisher","first-page":"641","DOI":"10.1016\/j.cad.2009.04.007","article-title":"Protection of Intellectual Property Based on a Skeleton Model in Product Design Collaboration","volume":"41","year":"2009","journal-title":"Comput.-Aided Des."},{"key":"2019100315030812400_bib65","first-page":"102","article-title":"Trustworthy Medical Device Software","volume":"510","year":"2011","journal-title":"Public Health Effectiveness FDA"},{"issue":"9","key":"2019100315030812400_bib66","doi-asserted-by":"publisher","first-page":"931","DOI":"10.1016\/j.cad.2004.09.020","article-title":"Collaborative Computer-Aided Design\u2014Research and Development Status","volume":"37","year":"2005","journal-title":"Comput.-Aided Des."},{"key":"2019100315030812400_bib67","doi-asserted-by":"crossref","unstructured":"Potkonjak, M., 2010, \u201cSynthesis of Trustable ICs Using Untrusted CAD Tools,\u201d 47th ACM\/IEEE Design Automation Conference (DAC), Anaheim, CA, June 13\u201318, San Jose, CA, Nov. 2\u20136, pp. 633\u2013634.10.1145\/1837274.1837435","DOI":"10.1145\/1837274.1837435"},{"key":"2019100315030812400_bib68","doi-asserted-by":"crossref","unstructured":"Xu, T., Wendt, J. B., and Potkonjak, M., 2014, \u201cSecurity of IoT Systems: Design Challenges and Opportunities,\u201d IEEE\/ACMInternational Conference on Computer-Aided Design, San Jose, CA, Nov. 2\u20136, pp. 417\u2013423.10.1109\/ICCAD.2014.7001385","DOI":"10.1109\/ICCAD.2014.7001385"},{"issue":"3","key":"2019100315030812400_bib69","doi-asserted-by":"publisher","first-page":"031001","DOI":"10.1115\/1.4023917","article-title":"Emerging Design Methods and Tools in Collaborative Product Development","volume":"13","year":"2013","journal-title":"ASME J. Comput. Inf. Sci. Eng."},{"issue":"4","key":"2019100315030812400_bib70","doi-asserted-by":"publisher","first-page":"479","DOI":"10.3722\/cadaps.2011.479-497","article-title":"A Flexible Context Architecture for a Multi-User Gui","volume":"8","year":"2011","journal-title":"Comput.-Aided Des. Appl."},{"key":"2019100315030812400_bib71","doi-asserted-by":"crossref","unstructured":"Jensen, M., Schwenk, J., Gruschka, N., and Iacono, L. L., 2009, \u201cOn Technical Security Issues in Cloud Computing,\u201d IEEE International Conference on Cloud Computing (CLOUD), Bangalore, India, Sept. 21\u201325, pp. 109\u2013116.10.1109\/CLOUD.2009.60","DOI":"10.1109\/CLOUD.2009.60"},{"key":"2019100315030812400_bib72","unstructured":"Popovi\u0107, K., and Hocenski, \u017d., 2010, \u201cCloud Computing Security Issues and Challenges,\u201d 33rd International Convention MIPRO, Opatija, Croatia, May 24\u201328, pp. 344\u2013349.https:\/\/ieeexplore.ieee.org\/document\/5533317\/"},{"issue":"1","key":"2019100315030812400_bib73","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1007\/s12394-008-0005-z","article-title":"Privacy in the Clouds","volume":"1","year":"2008","journal-title":"Identity Inf. Soc."},{"issue":"1","key":"2019100315030812400_bib74","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1145\/1866739.1866751","article-title":"Cloud Computing Privacy Concerns on Our Doorstep","volume":"54","year":"2011","journal-title":"Commun. ACM"},{"issue":"9","key":"2019100315030812400_bib75","doi-asserted-by":"publisher","first-page":"891","DOI":"10.1016\/j.cad.2008.05.006","article-title":"Development of a Distributed Collaborative Design Framework Within Peer-to-Peer Environment","volume":"40","year":"2008","journal-title":"Comput.-Aided Des."},{"issue":"2","key":"2019100315030812400_bib76","doi-asserted-by":"publisher","first-page":"334","DOI":"10.1016\/j.rcim.2007.01.005","article-title":"Multi-Agent Collaborative 3d Design With Geometric Model at Different Levels of Detail","volume":"25","year":"2009","journal-title":"Rob. Comput.-Integr. Manuf."},{"issue":"9","key":"2019100315030812400_bib77","doi-asserted-by":"publisher","first-page":"873","DOI":"10.1016\/j.cad.2003.09.014","article-title":"Role-Based Viewing Envelopes for Information Protection in Collaborative Modeling","volume":"36","year":"2004","journal-title":"Comput.- Aided Des."},{"issue":"1","key":"2019100315030812400_bib78","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1177\/1063293X0100900102","article-title":"Categorisation of Geometry Users","volume":"9","year":"2001","journal-title":"Concurrent Eng."},{"issue":"5","key":"2019100315030812400_bib79","doi-asserted-by":"publisher","first-page":"1559","DOI":"10.1007\/s10845-010-0459-3","article-title":"Optimized Product Data Transmission in Lod-Based Collaborative Design Using p2p Cad Streaming","volume":"23","year":"2012","journal-title":"J. Intell. Manuf."},{"key":"2019100315030812400_bib80","volume-title":"Introduction to Algorithms","year":"2009"},{"issue":"6","key":"2019100315030812400_bib81","doi-asserted-by":"publisher","first-page":"545","DOI":"10.1016\/j.compind.2012.05.001","article-title":"Secure Collaboration in Global Design and Supply Chain Environment: Problem Analysis and Literature Review","volume":"63","year":"2012","journal-title":"Comput. Ind."},{"key":"2019100315030812400_bib82","doi-asserted-by":"crossref","unstructured":"Chang, H., Kim, K.-K., and Kim, Y., 2007, \u201cThe Research of Security System for Sharing Engineering Drawings,\u201d IEEE International Conference on Intelligent Pervasive Computing (IPC), Jeju City, South Korea, Oct. 11\u201313, pp. 319\u2013322.10.1109\/IPC.2007.78","DOI":"10.1109\/IPC.2007.78"},{"issue":"1","key":"2019100315030812400_bib83","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1177\/1063293X13510010","article-title":"Collaborative Design by Sharing Multiple-Level Encryption Files","volume":"22","year":"2014","journal-title":"Concurrent Eng."},{"key":"2019100315030812400_bib84","doi-asserted-by":"crossref","unstructured":"Cai, X., Wang, S., Lu, X., and Li, W., 2016, \u201cParametric Encryption of CAD Models in Cloud Manufacturing Environment,\u201d IEEE 20th International Conference on Computer Supported Cooperative Work in Design (CSCWD), Nanchang, China. May 4\u20136, pp. 551\u2013556.10.1109\/CSCWD.2016.7566049","DOI":"10.1109\/CSCWD.2016.7566049"},{"key":"2019100315030812400_bib85","doi-asserted-by":"crossref","unstructured":"Wu, Y., He, F., Li, W., Cai, X., and Li, X., 2016, \u201cSensitive Information Protection of CAD Model Based on Free-Form Deformation in Collaborative Design,\u201d International Conference on Human Centered Computing (HCC 2016), Colombo, Sri Lanka, Jan. 7\u20139, pp. 465\u2013474.10.1007\/978-3-319-31854-7_42","DOI":"10.1007\/978-3-319-31854-7_42"},{"issue":"11","key":"2019100315030812400_bib86","doi-asserted-by":"publisher","first-page":"13906","DOI":"10.1016\/j.eswa.2011.04.197","article-title":"Secret Sharing Approaches for 3d Object Encryption","volume":"38","year":"2011","journal-title":"Expert Syst. Appl."},{"issue":"4","key":"2019100315030812400_bib87","doi-asserted-by":"publisher","first-page":"2114","DOI":"10.1016\/j.eswa.2014.10.035","article-title":"A Multi-Secret Sharing Scheme for 3d Solid Objects","volume":"42","year":"2015","journal-title":"Expert Syst. Appl."},{"key":"2019100315030812400_bib88","doi-asserted-by":"publisher","DOI":"10.1117\/12.455358","article-title":"Steganography for Three-Dimensional Polygonal Meshes","volume":"4790","year":"2002","journal-title":"Proc. SPIE"},{"issue":"9\u201311","key":"2019100315030812400_bib89","doi-asserted-by":"publisher","first-page":"845","DOI":"10.1007\/s00371-006-0069-4","article-title":"A High-Capacity Steganographic Approach for 3d Polygonal Meshes","volume":"22","year":"2006","journal-title":"Visual Comput."},{"issue":"2","key":"2019100315030812400_bib90","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1016\/S0166-3615(02)00119-7","article-title":"A Security Model for Distributed Product Data Management System","volume":"50","year":"2003","journal-title":"Comput. Ind."},{"issue":"1","key":"2019100315030812400_bib91","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1145\/775265.775268","article-title":"Protection","volume":"8","year":"1974","journal-title":"ACM SIGOPS Oper. Syst. Rev."},{"issue":"1","key":"2019100315030812400_bib92","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1115\/1.2161226","article-title":"Hierarchical Role-Based Viewing for Multilevel Information Security in Collaborative CAD","volume":"6","year":"2006","journal-title":"ASME J. Comput. Inf. Sci. Eng."},{"issue":"6","key":"2019100315030812400_bib93","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1109\/MC.2010.155","article-title":"Adding Attributes to Role-Based Access Control","volume":"43","year":"2010","journal-title":"Computer"},{"issue":"6","key":"2019100315030812400_bib94","doi-asserted-by":"publisher","first-page":"619","DOI":"10.1016\/j.compind.2012.04.003","article-title":"A Matrix-Based Modularization Approach for Supporting Secure Collaboration in Parametric Design","volume":"63","year":"2012","journal-title":"Comput. Ind."},{"issue":"3","key":"2019100315030812400_bib95","doi-asserted-by":"publisher","first-page":"243","DOI":"10.3233\/ICA-150487","article-title":"Encryption Based Partial Sharing of Cad Models","volume":"22","year":"2015","journal-title":"Integr. Comput.-Aided Eng."},{"issue":"1","key":"2019100315030812400_bib96","doi-asserted-by":"publisher","first-page":"011008","DOI":"10.1115\/1.4034131","article-title":"Embedding x. 509 Digital Certificates in Three-Dimensional Models for Authentication, Authorization, and Traceability of Product Data","volume":"17","year":"2017","journal-title":"J. Computing Inf. Sci. Eng."},{"key":"2019100315030812400_bib97","doi-asserted-by":"crossref","unstructured":"Ying, W., Li, A., and Xu, L., 2008, \u201cResearch on the Authentication Strategy of Asp Mode-Based Networked Manufacturing System,\u201d IEEE\/ASME International Conference on Advanced Intelligent Mechatronics (AIM), Xian, China, July 2\u20135, pp. 1014\u20131017. 10.1109\/AIM.2008.4601800","DOI":"10.1109\/AIM.2008.4601800"},{"key":"2019100315030812400_bib98","doi-asserted-by":"publisher","first-page":"349","DOI":"10.1007\/978-3-642-16530-6","article-title":"A Model for Cooperative Design Based on Multi-Agent System","volume":"6319","year":"2010","journal-title":"Artif. Intell. Comput. Intell."},{"issue":"3","key":"2019100315030812400_bib99","doi-asserted-by":"publisher","first-page":"583","DOI":"10.1016\/j.future.2010.12.006","article-title":"Addressing Cloud Computing Security Issues","volume":"28","year":"2012","journal-title":"Future Gener. Comput. Syst."},{"issue":"11","key":"2019100315030812400_bib100","doi-asserted-by":"publisher","first-page":"1754","DOI":"10.1109\/83.967402","article-title":"A Class of Authentication Digital Watermarks for Secure Multimedia Communication","volume":"10","year":"2001","journal-title":"IEEE Trans. Image Process."},{"key":"2019100315030812400_bib101","volume-title":"Applied Cryptography: Protocols, Algorithms, and Source Code in c","year":"1996"},{"key":"2019100315030812400_bib102","first-page":"373","article-title":"A Frequency-Domain Approach to Watermarking 3d Shapes","volume-title":"Computer Graphics Forum","year":"2002"},{"issue":"1","key":"2019100315030812400_bib103","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1109\/38.736467","article-title":"Watermarking 3d Objects for Verification","volume":"19","year":"1999","journal-title":"IEEE Comput. Graph. Appl."},{"issue":"11","key":"2019100315030812400_bib104","doi-asserted-by":"publisher","first-page":"1154","DOI":"10.1016\/j.cad.2006.06.009","article-title":"A Public Fragile Watermarking Scheme for 3d Model Authentication","volume":"38","year":"2006","journal-title":"Comput.-Aided Des."},{"key":"2019100315030812400_bib105","doi-asserted-by":"crossref","unstructured":"Wu, H.-T., and Cheung, Y.-M., 2005, \u201cA Fragile Watermarking Scheme for 3d Meshes,\u201d Seventh Workshop on Multimedia and Security, pp. 117\u2013124.","DOI":"10.1145\/1073170.1073192"},{"issue":"5","key":"2019100315030812400_bib106","doi-asserted-by":"publisher","first-page":"634","DOI":"10.1016\/j.cad.2008.03.001","article-title":"A Numerically Stable Fragile Watermarking Scheme for Authenticating 3d Models","volume":"40","year":"2008","journal-title":"Comput.-Aided Des."},{"key":"2019100315030812400_bib107","doi-asserted-by":"crossref","first-page":"103","DOI":"10.1007\/978-0-387-35494-1_8","article-title":"Managing CAD Data as a Multimedia Data Type Using Digital Watermarking","volume-title":"From Knowledge Intensive CAD to Knowledge Intensive Engineering","year":"2002"},{"issue":"8","key":"2019100315030812400_bib108","doi-asserted-by":"publisher","first-page":"1018","DOI":"10.1016\/j.cad.2011.03.011","article-title":"A Reversible Watermarking Scheme for Two-Dimensional Cad Engineering Graphics Based on Improved Difference Expansion","volume":"43","year":"2011","journal-title":"Comput.-Aided Des."},{"issue":"2","key":"2019100315030812400_bib109","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1115\/1.2190235","article-title":"Intellectual Property Protection in Collaborative Design Through Lean Information Modeling and Sharing","volume":"6","year":"2006","journal-title":"ASME J. Comput. Inf. Sci. Eng."},{"issue":"5","key":"2019100315030812400_bib110","doi-asserted-by":"publisher","first-page":"9409","DOI":"10.1016\/j.eswa.2008.12.062","article-title":"Information-Theoretic Hashing of 3d Objects Using Spectral Graph Theory","volume":"36","year":"2009","journal-title":"Expert Syst. Appl."},{"issue":"4","key":"2019100315030812400_bib111","doi-asserted-by":"publisher","first-page":"421","DOI":"10.1080\/09544820310001606902","article-title":"A Collaborative Design System for Product Data Integration","volume":"14","year":"2003","journal-title":"J. Eng. Des."},{"issue":"2","key":"2019100315030812400_bib112","doi-asserted-by":"publisher","first-page":"217","DOI":"10.1016\/j.rcim.2006.02.011","article-title":"Dynamic Data Sharing and Security in a Collaborative Product Definition Management System","volume":"23","year":"2007","journal-title":"Rob. Comput.-Integr. Manuf."},{"issue":"4","key":"2019100315030812400_bib113","doi-asserted-by":"publisher","first-page":"041010","DOI":"10.1115\/1.4036615","article-title":"Secure Collaboration in Engineering Systems Design","volume":"17","year":"2017","journal-title":"ASME J. Comput. Inf. Sci. Eng."},{"issue":"2","key":"2019100315030812400_bib114","doi-asserted-by":"publisher","first-page":"021007","DOI":"10.1115\/1.4039431","article-title":"Secure Codesign: Achieving Optimality Without Revealing","volume":"18","year":"2018","journal-title":"ASME J. Comput. Inf. Sci. Eng."},{"key":"2019100315030812400_bib115","doi-asserted-by":"crossref","unstructured":"Chaduvula, S. C., Atallah, M., and Panchal, J. H., 2018, \u201cSFEA: A Lightweight, Scalable, and Secure Finite Element Analysis Technique,\u201d ASME Paper No. DETC-85566.","DOI":"10.1115\/DETC2018-85566"},{"key":"2019100315030812400_bib116","article-title":"Secure Collaborative Assembly and Assembly Streaming","year":"2004"},{"key":"2019100315030812400_bib117","unstructured":"Xue, H., and Li, J., 2005, \u201cA Method for Information Protection in Collaborative Assembly Design,\u201d IEEENinth International Conference on Computer Aided Design and Computer Graphics, Hong Kong, China, Dec. 7\u201310, p. 6.10.1109\/CAD-CG.2005.7"},{"key":"2019100315030812400_bib118","first-page":"S1","article-title":"Research on the Technologies of Multi-Users Modeling and Cooperation in Distributed Virtual Assembly System","year":"2008","journal-title":"J. Syst. Simul."},{"key":"2019100315030812400_bib119","doi-asserted-by":"publisher","first-page":"374","DOI":"10.1016\/j.aei.2016.12.001","article-title":"An Encryption Approach for Product Assembly Models","volume":"33","year":"2017","journal-title":"Adv. Eng. Inf."},{"key":"2019100315030812400_bib120","first-page":"137","article-title":"Conceptual Modeling of Design Chain Management Towards Product Lifecycle Management","volume-title":"Global Perspective Competitive Enterprise, Economy Ecology","year":"2009"},{"key":"2019100315030812400_bib121","doi-asserted-by":"publisher","DOI":"10.1007\/s10845-011-0607-4","article-title":"Formalization of Design Chain Management Using Environment-Based Design (Ebd) Theory","volume":"24","year":"2013","journal-title":"J. Intell. Manuf."},{"issue":"1","key":"2019100315030812400_bib122","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1080\/09537287.2010.543169","article-title":"Collaborative Product Development: A Literature Overview","volume":"23","year":"2012","journal-title":"Prod. Plann. Control"},{"issue":"1","key":"2019100315030812400_bib123","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1111\/j.1540-5885.2005.00181.x","article-title":"Trust Formation in Collaborative New Product Development","volume":"23","year":"2006","journal-title":"J. Prod. Innovation Manage."},{"issue":"5","key":"2019100315030812400_bib124","doi-asserted-by":"publisher","first-page":"471","DOI":"10.1002\/smj.656","article-title":"Factors Influencing Partner Selection in Strategic Alliances: The Moderating Role of Alliance Context","volume":"29","year":"2008","journal-title":"Strategic Manage. J."},{"issue":"3","key":"2019100315030812400_bib125","doi-asserted-by":"publisher","first-page":"422","DOI":"10.1109\/TLA.2009.5336645","article-title":"Security Model for Next Generation Collaborative Working Environments","volume":"7","year":"2009","journal-title":"IEEE Latin Am. Trans."},{"key":"2019100315030812400_bib126","article-title":"Secure Collaborative Product Development"},{"key":"2019100315030812400_bib127","doi-asserted-by":"crossref","unstructured":"Cao, X., and Zeng, Y., 2011, \u201cDetecting Risk of Intellectual Property (Ip) Leakage Due to Reverse Design in Collaborative Product Development Environments,\u201d ASME Paper No. DETC2011-48278.10.1115\/DETC2011-48278","DOI":"10.1115\/DETC2011-48278"},{"issue":"7","key":"2019100315030812400_bib128","doi-asserted-by":"publisher","first-page":"789","DOI":"10.1016\/j.cad.2007.06.012","article-title":"Information Sharing and Exchange in the Context of Product Lifecycle Management: Role of Standards","volume":"40","year":"2008","journal-title":"Comput.-Aided Des."},{"issue":"S2","key":"2019100315030812400_bib129","doi-asserted-by":"publisher","first-page":"579","DOI":"10.1111\/radm.12126","article-title":"Intellectual Property Protection Mechanisms in Collaborative New Product Development","volume":"46","year":"2016","journal-title":"R&D Manage."},{"key":"2019100315030812400_bib130","doi-asserted-by":"crossref","unstructured":"Ranchal, R., and Bhargava, B., 2013, \u201cProtecting PLM Data throughout Their Lifecycle,\u201d International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness, Greater Noida, India, Jan. 11\u201312, pp. 633\u2013642.","DOI":"10.1007\/978-3-642-37949-9_55"},{"key":"2019100315030812400_bib131","doi-asserted-by":"crossref","unstructured":"Liese, H., Stjepandic, J., and Rulhoff, S., 2010, \u201cSecuring Product Know-How by Embedding IP-Protection into the Organisation,\u201d IEEE International Technology Management Conference (ICE), Lugano, Switzerland, June 21\u201323, pp. 1\u20138.10.1109\/ICE.2010.7477025","DOI":"10.1109\/ICE.2010.7477025"},{"key":"2019100315030812400_bib132","article-title":"Cyber Incident Blamed for Nuclear Power Plant Shutdown","year":"2008"},{"issue":"3","key":"2019100315030812400_bib133","doi-asserted-by":"publisher","first-page":"79","DOI":"10.5121\/ijcsit.2013.5306","article-title":"Security Threats on Cloud Computing Vulnerabilities","volume":"5","year":"2013","journal-title":"Int. J. Comput. Sci. Inf. Technol."},{"key":"2019100315030812400_bib134","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1016\/j.dss.2015.12.007","article-title":"Online Shopping Intention in the Context of Data Breach in Online Retail Stores: An Examination of Older and Younger Adults","volume":"83","year":"2016","journal-title":"Decis. Support Syst."},{"key":"2019100315030812400_bib135","doi-asserted-by":"crossref","unstructured":"Sadeghi, A.-R., Wachsmann, C., and Waidner, M., 2015, \u201cSecurity and Privacy Challenges in Industrial Internet of Things,\u201d 52nd ACM\/EDAC\/IEEE Design Automation Conference (DAC), San Francisco, CA, June 8\u201312, pp. 1\u20136.10.1145\/2744769.2747942","DOI":"10.1145\/2744769.2747942"},{"issue":"1","key":"2019100315030812400_bib136","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1999\/1307-6892\/9997144","article-title":"How Virtualization, Decentralization and Network Building Change the Manufacturing Landscape: An Industry 4.0 Perspective","volume":"8","year":"2014","journal-title":"Int. J. Mech., Ind. Sci. Eng."},{"issue":"7\u20138","key":"2019100315030812400_bib137","doi-asserted-by":"publisher","first-page":"707","DOI":"10.1016\/j.jom.2011.06.007","article-title":"Product Safety and Security in the Global Supply Chain: Issues, Challenges and Research Opportunities","volume":"29","year":"2011","journal-title":"J. Oper. Manage."},{"issue":"8","key":"2019100315030812400_bib138","doi-asserted-by":"publisher","first-page":"662","DOI":"10.1080\/09537287.2013.798086","article-title":"Supporting the Collaborative Decision-Making Process in an Automotive Supply Chain With a Multi-Agent System","volume":"25","year":"2014","journal-title":"Prod. Plann. Control"},{"issue":"2","key":"2019100315030812400_bib139","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1108\/09574090410700275","article-title":"Building the Resilient Supply Chain","volume":"15","year":"2004","journal-title":"Int. J. Logist. Manage."},{"issue":"2","key":"2019100315030812400_bib140","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1108\/09574090110806262","article-title":"Supply Chain Management Under the Threat of International Terrorism","volume":"12","year":"2001","journal-title":"Int. J. Logist. Manage."},{"issue":"4","key":"2019100315030812400_bib141","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1080\/08874417.2006.11645910","article-title":"Secure Information Sharing in Internet-Based Supply Chain Management Systems","volume":"46","year":"2006","journal-title":"J. Comput. Inf. Syst."},{"issue":"3","key":"2019100315030812400_bib142","doi-asserted-by":"publisher","first-page":"351","DOI":"10.1016\/j.compind.2010.10.002","article-title":"Modeling and Evaluating Information Leakage Caused by Inferences in Supply Chains","volume":"62","year":"2011","journal-title":"Comput. Ind."},{"issue":"3","key":"2019100315030812400_bib143","doi-asserted-by":"publisher","first-page":"438","DOI":"10.1287\/mnsc.1080.0930","article-title":"Strategic Information Management Under Leakage in a Supply Chain","volume":"55","year":"2009","journal-title":"Manage. Sci."},{"issue":"4","key":"2019100315030812400_bib144","doi-asserted-by":"publisher","first-page":"1351","DOI":"10.1007\/s10845-011-0527-3","article-title":"Mitigating the Risk of Information Leakage in a Two-Level Supply Chain Through Optimal Supplier Selection","volume":"23","year":"2012","journal-title":"J. Intell. Manuf."},{"issue":"1","key":"2019100315030812400_bib145","doi-asserted-by":"publisher","first-page":"243","DOI":"10.2308\/isys-50692","article-title":"A Survey of Privacy-Aware Supply Chain Collaboration: From Theory to Applications","volume":"28","year":"2013","journal-title":"J. Inf. Syst."},{"key":"2019100315030812400_bib146","doi-asserted-by":"crossref","unstructured":"Atallah, M. J., Elmongui, H. G., Deshpande, V., and Schwarz, L. B., 2003, \u201cSecure Supply-Chain Protocols,\u201d IEEE International Conference on E-Commerce (CEC), Newport Beach, CA, June 24\u201327, pp. 293\u2013302. 10.1109\/COEC.2003.1210264","DOI":"10.1109\/COEC.2003.1210264"},{"key":"2019100315030812400_bib147","doi-asserted-by":"publisher","first-page":"242","DOI":"10.1016\/j.aei.2018.04.004","article-title":"Strategic Information Revelation in Collaborative Design","volume":"36","year":"2018","journal-title":"Adv. Eng. Inf."},{"issue":"1","key":"2019100315030812400_bib148","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1504\/IJECRM.2009.024488","article-title":"Developing a Collaborative Supply Chain Reference Model for a Regional Manufacturing Industry in China","volume":"3","year":"2009","journal-title":"Int. J. Electron. Customer Relat. Manage."},{"issue":"2","key":"2019100315030812400_bib149","doi-asserted-by":"publisher","first-page":"170","DOI":"10.1016\/j.emj.2005.02.008","article-title":"Supply Chain Collaboration:: Making Sense of the Strategy Continuum","volume":"23","year":"2005","journal-title":"Eur. Manage. J."},{"issue":"2","key":"2019100315030812400_bib150","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1108\/09574090510634539","article-title":"Supply Chain Collaboration: What's Happening?","volume":"16","year":"2005","journal-title":"Int. J. Logist. Manage."},{"issue":"5","key":"2019100315030812400_bib151","doi-asserted-by":"publisher","first-page":"629","DOI":"10.1287\/mnsc.47.5.629.10486","article-title":"Contracting to Assure Supply: How to Share Demand Forecasts in a Supply Chain","volume":"47","year":"2001","journal-title":"Manage. Sci."},{"key":"2019100315030812400_bib152","doi-asserted-by":"crossref","first-page":"239","DOI":"10.1007\/978-3-319-42448-4_13","article-title":"Understanding Modern Banking Ledgers Through Blockchain Technologies: Future of Transaction Processing and Smart Contracts on the Internet of Money","volume-title":"Banking Beyond Banks and Money","year":"2016"},{"key":"2019100315030812400_bib153","article-title":"Ethereum: A Secure Decentralised Generalised Transaction Ledger","volume":"151","year":"2014","journal-title":"Ethereum Project Yellow Paper"},{"key":"2019100315030812400_bib154","doi-asserted-by":"crossref","unstructured":"Atzei, N., Bartoletti, M., and Cimoli, T., 2017, \u201cA Survey of Attacks on Ethereum Smart Contracts (Sok),\u201d International Conference on Principles of Security and Trust, New York, Apr. 22\u201329, pp. 164\u2013186.10.1007\/978-3-662-54455-6_8","DOI":"10.1007\/978-3-662-54455-6_8"},{"key":"2019100315030812400_bib155","doi-asserted-by":"publisher","first-page":"2292","DOI":"10.1109\/ACCESS.2016.2566339","article-title":"Blockchains and Smart Contracts for the Internet of Things","volume":"4","year":"2016","journal-title":"IEEE Access"},{"key":"2019100315030812400_bib156","doi-asserted-by":"crossref","unstructured":"Luu, L., Chu, D.-H., Olickel, H., Saxena, P., and Hobor, A., 2016, \u201cMaking Smart Contracts Smarter,\u201d ACM SIGSACConference on Computer and Communications Security, Vienna, Austria, Oct. 24\u201328, pp. 254\u2013269.10.1145\/2976749.2978309","DOI":"10.1145\/2976749.2978309"},{"key":"2019100315030812400_bib157","doi-asserted-by":"crossref","unstructured":"Rajkumar, R. R., Lee, I., Sha, L., and Stankovic, J., 2010, \u201cCyber-Physical Systems: The Next Computing Revolution,\u201d 47th Design Automation Conference (DAC), Anaheim, CA, June 13\u201318, pp. 731\u2013736.10.1145\/1837274.1837461","DOI":"10.1145\/1837274.1837461"},{"issue":"4","key":"2019100315030812400_bib158","doi-asserted-by":"publisher","first-page":"2233","DOI":"10.1109\/TII.2014.2300753","article-title":"Internet of Things in Industries: A Survey","volume":"10","year":"2014","journal-title":"IEEE Trans. Ind. Inf."},{"key":"2019100315030812400_bib159","doi-asserted-by":"crossref","unstructured":"Guin , U., Forte, D., and Tehranipoor, M., 2013, \u201cAnti-Counterfeit Techniques: From Design to Resign,\u201d 14th International Workshop on Microprocessor Test and Verification (MTV), Austin, TX, Dec. 11\u201313, pp. 89\u201394.10.1109\/MTV.2013.28","DOI":"10.1109\/MTV.2013.28"},{"issue":"8","key":"2019100315030812400_bib160","doi-asserted-by":"publisher","first-page":"1207","DOI":"10.1109\/JPROC.2014.2332291","article-title":"Counterfeit Integrated Circuits: A Rising Threat in the Global Semiconductor Supply Chain","volume":"102","year":"2014","journal-title":"Proc. IEEE"},{"issue":"1","key":"2019100315030812400_bib161","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1362\/1469347053294832","article-title":"Modelling Anti-Counterfeiting Strategies in Response to Protecting Intellectual Property Rights in a Global Environment","volume":"5","year":"2005","journal-title":"Mark. Rev."},{"issue":"1","key":"2019100315030812400_bib162","doi-asserted-by":"publisher","first-page":"98","DOI":"10.1108\/IJOEM-02-2011-0014","article-title":"How Should Firms Deal With Counterfeiting? a Review of the Success Conditions of Anti-Counterfeiting Strategies","volume":"9","year":"2014","journal-title":"Int. J. Emerging Mark."},{"key":"2019100315030812400_bib163","article-title":"The Global Risk of Product Counterfeiting: Facilitators of the Criminal Opportunity","volume-title":"Center for Anti-Counterfeiting and Product Protection Backgrounder Series","year":"2015"},{"issue":"1","key":"2019100315030812400_bib164","doi-asserted-by":"publisher","first-page":"110","DOI":"10.1108\/IJOPM-04-2012-0174","article-title":"An Exploratory Analysis of Counterfeiting Strategies: Towards Counterfeit-Resilient Supply Chains","volume":"35","year":"2015","journal-title":"Int. J. Oper. Prod. Manage."},{"key":"2019100315030812400_bib165","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1109\/TPAMI.1982.4767309","article-title":"Automated Visual Inspection: A Survey","volume":"4","year":"1982","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"issue":"2","key":"2019100315030812400_bib166","doi-asserted-by":"publisher","first-page":"231","DOI":"10.1006\/cviu.1995.1017","article-title":"A Survey of Automated Visual Inspection","volume":"61","year":"1995","journal-title":"Comput. Vision Image Understanding"},{"key":"2019100315030812400_bib167","doi-asserted-by":"crossref","unstructured":"Roy, J. A., Koushanfar, F., and Markov, I. L., 2008, \u201cCircuit CAD Tools as a Security Threat,\u201d IEEE International Workshop on Hardware-Oriented Security and Trust (HOST), Anaheim, CA, June 9, pp. 65\u201366.10.1109\/HST.2008.4559052","DOI":"10.1109\/HST.2008.4559052"},{"key":"2019100315030812400_bib168","doi-asserted-by":"crossref","unstructured":"Koushanfar, F., and Potkonjak, M., 2007, \u201cCAD-Based Security, Cryptography, and Digital Rights Management,\u201d 44th Annual Design Automation Conference (DAC '07), San Diego, CA, June 4\u20138, pp. 268\u2013269.https:\/\/ieeexplore.ieee.org\/document\/4261186\/","DOI":"10.1145\/1278480.1278547"},{"key":"2019100315030812400_bib169","doi-asserted-by":"crossref","unstructured":"McLoughlin, I., 2008, \u201cSecure Embedded Systems: The Threat of Reverse Engineering,\u201d 14th IEEE International Conference on Parallel and Distributed Systems (ICPADS), Melbourne, Australia, Dec. 8\u201310, pp. 729\u2013736.10.1109\/ICPADS.2008.126","DOI":"10.1109\/ICPADS.2008.126"},{"issue":"7","key":"2019100315030812400_bib170","doi-asserted-by":"publisher","first-page":"1062","DOI":"10.1109\/5.771065","article-title":"Information Hiding-a Survey","volume":"87","year":"1999","journal-title":"Proc. IEEE"},{"issue":"6","key":"2019100315030812400_bib171","doi-asserted-by":"publisher","first-page":"1435","DOI":"10.1007\/s11948-014-9617-x","article-title":"Printing Insecurity? the Security Implications of 3D-Printing of Weapons","volume":"21","year":"2015","journal-title":"Sci. Engineering Ethics"},{"key":"2019100315030812400_bib172","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1016\/j.ijcip.2015.12.004","article-title":"Using 3D Printers as Weapons","volume":"14","year":"2016","journal-title":"Int. J. Crit. Infrastruct. Prot."},{"issue":"7","key":"2019100315030812400_bib173","doi-asserted-by":"publisher","first-page":"1872","DOI":"10.1007\/s11837-016-1937-7","article-title":"Manufacturing and Security Challenges in 3D Printing","volume":"68","year":"2016","journal-title":"JOM"},{"key":"2019100315030812400_bib174","doi-asserted-by":"crossref","unstructured":"Dachowicz, A., Atallah, M., and Panchal, J. H., 2018, \u201cOptical PUF Design for Anti-Counterfeiting in Manufacturing of Metallic Goods,\u201d ASME Paper No. DETC-85714.","DOI":"10.1115\/DETC2018-85714"},{"key":"2019100315030812400_bib175","unstructured":"Ravikanth, P. S., 2001, \u201cPhysical One-Way Functions,\u201d Ph.D. thesis, Massachusetts Institute of Technology, Cambridge, MA."},{"issue":"5589","key":"2019100315030812400_bib176","doi-asserted-by":"publisher","first-page":"2026","DOI":"10.1126\/science.1074376","article-title":"Physical One-Way Functions","volume":"297","year":"2002","journal-title":"Science"},{"key":"2019100315030812400_bib177","doi-asserted-by":"crossref","unstructured":"Tuyls, P., Schrijen, G.-J., \u0160kori\u0107, B., Van Geloven, J., Verhaegh, N., and Wolters, R., 2006, \u201cRead-Proof Hardware From Protective Coatings,\u201d In International Workshop on Cryptographic Hardware and Embedded Systems (CHES 2006), Yokohama, Japan, Oct. 10\u201313, pp. 369\u2013383.10.1007\/11894063_29","DOI":"10.1007\/11894063_29"},{"key":"2019100315030812400_bib178","article-title":"Attach Detection With Coating PUF","volume-title":"US20090265758A1","year":"2007"},{"key":"2019100315030812400_bib179","doi-asserted-by":"publisher","article-title":"Counterfeiting, Supply Chain Security, and the Cyber Threat; Why Defending AgainstCounterfeit Electronics is no Longer Enough","volume-title":"SAE","DOI":"10.4271\/2014-01-2125"},{"key":"2019100315030812400_bib180","article-title":"Addressing Counterfeit Parts in the DOD Supply Chain","volume-title":"ADA613231","year":"2014"},{"key":"2019100315030812400_bib181","doi-asserted-by":"crossref","unstructured":"Dodis, Y., Reyzin, L., and Smith, A., 2004, \u201cFuzzy Extractors: How to Generate Strong Keys From Biometrics and Other Noisy Data,\u201d International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, May 2\u20136, pp. 523\u2013540.","DOI":"10.1007\/978-3-540-24676-3_31"},{"key":"2019100315030812400_bib182","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1145\/373256.373258","article-title":"Securing Context-Aware Applications Using Environment Roles","volume-title":"Sixth ACM Symposium on Access Control Models and Technologies","year":"2001"},{"issue":"1","key":"2019100315030812400_bib183","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1007\/s10619-005-1075-7","article-title":"A Trust-Based Context-Aware Access Control Model for Web-Services","volume":"18","year":"2005","journal-title":"Distributed Parallel Databases"},{"key":"2019100315030812400_bib184","unstructured":"Chakraborty, S., and Ray, I., 2006, \u201cTrustbac: Integrating Trust Relationships into the RBAC Model for Access Control in Open Systems,\u201d 11th ACM Symposium on Access Control Models and Technologies, Tahoe City, CA, June 07\u201309, pp. 49\u201358.http:\/\/citeseerx.ist.psu.edu\/viewdoc\/summary?doi=10.1.1.88.2042"},{"key":"2019100315030812400_bib185","doi-asserted-by":"crossref","unstructured":"Almohri, H., Cheng, L., Yao, D., and Alemzadeh, H., 2017, \u201cOn Threat Modeling and Mitigation of Medical Cyber-Physical Systems,\u201d IEEE\/ACM International Conference on Connected Health: Applications, Systems and Engineering Technologies (CHASE), Philadelphia, PA, July 17\u201319, pp. 114\u2013119.10.1109\/CHASE.2017.69","DOI":"10.1109\/CHASE.2017.69"},{"key":"2019100315030812400_bib186","article-title":"Closing Security Gaps to Protect Corporate Data: A Study of US and European Organizations","year":"2016"},{"key":"2019100315030812400_bib187","doi-asserted-by":"crossref","unstructured":"Sochor, T., and Zuzcak, M., 2014, \u201cStudy of Internet Threats and Attack Methods Using Honeypots and Honeynets,\u201d International Conference on Computer Networks, Brun\u00f3w, Poland, June 23\u201327, pp. 118\u2013127.","DOI":"10.1007\/978-3-319-07941-7_12"},{"key":"2019100315030812400_bib188","doi-asserted-by":"crossref","unstructured":"Higgins, F., Tomlinson, A., and Martin, K. M., 2009, \u201cSurvey on Security Challenges for Swarm Robotics,\u201d Fifth International Conference on Autonomic and Autonomous Systems (ICAS), Valencia, Spain, Apr. 20\u201325, pp. 307\u2013312.10.1109\/ICAS.2009.62","DOI":"10.1109\/ICAS.2009.62"},{"key":"2019100315030812400_bib189","first-page":"42","article-title":"Security in Swarm Robotics","volume-title":"Handbook of Research on Design, Control, and Modeling of Swarm Robotics","year":"2015"}],"container-title":["Journal of Computing and Information Science in Engineering"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/asmedigitalcollection.asme.org\/computingengineering\/article-pdf\/doi\/10.1115\/1.4040341\/6365588\/jcise_018_04_040802.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"http:\/\/asmedigitalcollection.asme.org\/computingengineering\/article-pdf\/doi\/10.1115\/1.4040341\/6365588\/jcise_018_04_040802.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,5]],"date-time":"2025-07-05T23:05:15Z","timestamp":1751756715000},"score":1,"resource":{"primary":{"URL":"https:\/\/asmedigitalcollection.asme.org\/computingengineering\/article\/doi\/10.1115\/1.4040341\/368952\/Security-in-CyberEnabled-Design-and-Manufacturing"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,7,5]]},"references-count":189,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2018,12,1]]}},"URL":"https:\/\/doi.org\/10.1115\/1.4040341","relation":{},"ISSN":["1530-9827","1944-7078"],"issn-type":[{"value":"1530-9827","type":"print"},{"value":"1944-7078","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,7,5]]},"article-number":"040802"}}