{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T00:04:42Z","timestamp":1774915482973,"version":"3.50.1"},"publisher-location":"New York, New York, USA","reference-count":80,"publisher":"ACM Press","license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"German Research Foundation (DFG)","award":["Project ID: 390621612"],"award-info":[{"award-number":["Project ID: 390621612"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1145\/3338499.3357357","type":"proceedings-article","created":{"date-parts":[[2019,11,8]],"date-time":"2019-11-08T13:40:33Z","timestamp":1573220433000},"page":"27-38","source":"Crossref","is-referenced-by-count":60,"title":["Dataflow Challenges in an Internet of Production"],"prefix":"10.1145","author":[{"given":"Jan","family":"Pennekamp","sequence":"first","affiliation":[{"name":"RWTH Aachen University, Aachen, Germany"}]},{"given":"Martin","family":"Henze","sequence":"additional","affiliation":[{"name":"Fraunhofer FKIE, Bonn-Bad Godesberg, Germany"}]},{"given":"Simo","family":"Schmidt","sequence":"additional","affiliation":[{"name":"RWTH Aachen University, Aachen, Germany"}]},{"given":"Philipp","family":"Niemietz","sequence":"additional","affiliation":[{"name":"RWTH Aachen University, Aachen, Germany"}]},{"given":"Marcel","family":"Fey","sequence":"additional","affiliation":[{"name":"RWTH Aachen University, Aachen, Germany"}]},{"given":"Daniel","family":"Trauth","sequence":"additional","affiliation":[{"name":"RWTH Aachen University, Aachen, Germany"}]},{"given":"Thomas","family":"Bergs","sequence":"additional","affiliation":[{"name":"RWTH Aachen University, Aachen, Germany"}]},{"given":"Christian","family":"Brecher","sequence":"additional","affiliation":[{"name":"RWTH Aachen University, Aachen, Germany"}]},{"given":"Klaus","family":"Wehrle","sequence":"additional","affiliation":[{"name":"RWTH Aachen University, Aachen, Germany"}]}],"member":"320","reference":[{"key":"key-10.1145\/3338499.3357357-1","unstructured":"Mohamed Abdel-Basset et almbox. 2018. Internet of Things (IoT) and its impact on supply chain: A framework for building smart, secure and efficient systems. Future Generation Computer Systems, Vol. 86."},{"key":"key-10.1145\/3338499.3357357-2","doi-asserted-by":"crossref","unstructured":"Rakesh Agrawal et almbox. 2004. Order preserving encryption for numeric data. In ACM SIGMOD.","DOI":"10.1145\/1007568.1007632"},{"key":"key-10.1145\/3338499.3357357-3","unstructured":"Thiago Alves and Don Felton. 2004. TrustZone: Integrated Hardware and Software Security."},{"key":"key-10.1145\/3338499.3357357-4","unstructured":"Alvaro Arenas and Michael Wilson. 2008. Contracts as Trust Substitutes in Collaborative Business. Computer, Vol. 41, 7."},{"key":"key-10.1145\/3338499.3357357-5","unstructured":"International Data Spaces Association. 2019. IDS Reference Architecture Model."},{"key":"key-10.1145\/3338499.3357357-6","doi-asserted-by":"crossref","unstructured":"Lennart Bader et almbox. 2018. Smart Contract-based Car Insurance Policies. In IEEE GC Wkshps.","DOI":"10.1109\/GLOCOMW.2018.8644136"},{"key":"key-10.1145\/3338499.3357357-7","doi-asserted-by":"crossref","unstructured":"Mihir Bellare et almbox. 2000. Public-Key Encryption in a Multi-user Setting: Security Proofs and Improvements. In EUROCRYPT.","DOI":"10.1007\/3-540-45539-6_18"},{"key":"key-10.1145\/3338499.3357357-8","unstructured":"Thomas Bergs et almbox. 2019. Stamping Process Modelling in an Internet of Production. In CIRP TESConf."},{"key":"key-10.1145\/3338499.3357357-9","doi-asserted-by":"crossref","unstructured":"Guoxing Chen et almbox. 2018. SgxPectre Attacks: Stealing Intel Secrets from SGX Enclaves via Speculative Execution. arXiv:1802.09085.","DOI":"10.1109\/EuroSP.2019.00020"},{"key":"key-10.1145\/3338499.3357357-10","unstructured":"Xiaofeng Chen. 2016. Introduction to Secure Outsourcing Computation. Synthesis Lectures on Information Security, Privacy, &#38; Trust, Vol. 8, 2."},{"key":"key-10.1145\/3338499.3357357-11","unstructured":"Konstantinos Christidis and Michael Devetsikiotis. 2016. Blockchains and Smart Contracts for the Internet of Things. IEEE Access, Vol. 4."},{"key":"key-10.1145\/3338499.3357357-12","unstructured":"Victor Costan and Srinivas Devadas. 2016. Intel SGX Explained. IACR Cryptology ePrint Archive, Vol. 2016, 086."},{"key":"key-10.1145\/3338499.3357357-13","doi-asserted-by":"crossref","unstructured":"Marek A. Cyran. 2018. Blockchain as a Foundation for Sharing Healthcare Data. Blockchain in Healthcare Today.","DOI":"10.30953\/bhty.v1.13"},{"key":"key-10.1145\/3338499.3357357-14","doi-asserted-by":"crossref","unstructured":"Markus Dahlmanns et almbox. 2019. Privacy-Preserving Remote Knowledge System. In IEEE ICNP.","DOI":"10.1109\/ICNP.2019.8888121"},{"key":"key-10.1145\/3338499.3357357-15","doi-asserted-by":"crossref","unstructured":"Cynthia Dwork et almbox. 2006. Our Data, Ourselves: Privacy Via Distributed Noise Generation. In EUROCRYPT.","DOI":"10.1007\/11761679_29"},{"key":"key-10.1145\/3338499.3357357-16","unstructured":"Cynthia Dwork et almbox. 2014. The Algorithmic Foundations of Differential Privacy. Foundations and Trends in Theoretical Computer Science, Vol. 9."},{"key":"key-10.1145\/3338499.3357357-17","unstructured":"Christian Esposito et almbox. 2016. Cloud Manufacturing: Security, Privacy, and Forensic Concerns. IEEE CLOUD, Vol. 3, 4."},{"key":"key-10.1145\/3338499.3357357-18","unstructured":"Valentina Gatteschi et almbox. 2018. Blockchain and Smart Contracts for Insurance: Is the Technology Mature Enough? Future Internet, Vol. 10, 2."},{"key":"key-10.1145\/3338499.3357357-19","unstructured":"Craig Gentry. 2009. Fully homomorphic encryption using ideal lattices. In ACM STOC, Vol. 9."},{"key":"key-10.1145\/3338499.3357357-20","doi-asserted-by":"crossref","unstructured":"Ren&#233; Glebke et almbox. 2019. A Case for Integrated Data Processing in Large-Scale Cyber-Physical Systems. In HICSS.","DOI":"10.24251\/HICSS.2019.871"},{"key":"key-10.1145\/3338499.3357357-21","unstructured":"Satashu Goel and Rohit Negi. 2008. Guaranteeing Secrecy using Artificial Noise. IEEE Trans. Wireless Commun., Vol. 7, 6."},{"key":"key-10.1145\/3338499.3357357-22","unstructured":"Oded Goldreich et almbox. 1991. Proofs that yield nothing but their validity or all languages in NP have zero-knowledge proof systems. J. ACM, Vol. 38, 3."},{"key":"key-10.1145\/3338499.3357357-23","unstructured":"Mitch Greeley. 2018 (accessed June 16, 2019). Fine Blanking cuts into Industry 4.0. https:\/\/blog.feintool.com\/en\/fine-blanking-cuts-into-industry-4-0\/."},{"key":"key-10.1145\/3338499.3357357-24","unstructured":"Karl-Heinrich Grote and Erik K. Antonsson. 2009. Springer Handbook of Mechanical Engineering. Springer."},{"key":"key-10.1145\/3338499.3357357-25","unstructured":"Wenbo He et almbox. 2007. PDA: Privacy-Preserving Data Aggregation in Wireless Sensor Networks. In IEEE INFOCOM."},{"key":"key-10.1145\/3338499.3357357-26","unstructured":"Tobias Heer et almbox. 2011. Security Challenges in the IP-based Internet of Things. Wirel. Pers. Commun., Vol. 61, 3."},{"key":"key-10.1145\/3338499.3357357-27","doi-asserted-by":"crossref","unstructured":"Martin Henze et almbox. 2017a. Network Security and Privacy for Cyber-Physical Systems.","DOI":"10.1002\/9781119226079.ch2"},{"key":"key-10.1145\/3338499.3357357-28","doi-asserted-by":"crossref","unstructured":"Martin Henze et almbox. 2016. CPPL: Compact Privacy Policy Language. In WPES.","DOI":"10.1145\/2994620.2994627"},{"key":"key-10.1145\/3338499.3357357-29","doi-asserted-by":"crossref","unstructured":"Martin Henze et almbox. 2017b. Privacy-preserving Comparison of Cloud Exposure Induced by Mobile Apps. In EAI MobiQuitous.","DOI":"10.1145\/3144457.3144511"},{"key":"key-10.1145\/3338499.3357357-30","doi-asserted-by":"crossref","unstructured":"Martin Henze et almbox. 2017c. CloudAnalyzer: Uncovering the Cloud Usage of Mobile Apps. In EAI MobiQuitous.","DOI":"10.1145\/3144457.3144471"},{"key":"key-10.1145\/3338499.3357357-31","doi-asserted-by":"crossref","unstructured":"Jens Hiller et almbox. 2019. Tailoring Onion Routing to the Internet of Things: Security and Privacy in Untrusted Environments. In IEEE ICNP.","DOI":"10.1109\/ICNP.2019.8888033"},{"key":"key-10.1145\/3338499.3357357-32","unstructured":"Karin H&#246;ne and Jan Harm Petrus Eloff. 2002. Information security policy -- what do international information security standards say? Computers &#38; Security, Vol. 21, 5."},{"key":"key-10.1145\/3338499.3357357-33","doi-asserted-by":"crossref","unstructured":"Sabina Jeschke et almbox. 2017. Industrial Internet of Things and Cyber Manufacturing Systems.","DOI":"10.1007\/978-3-319-42559-7_1"},{"key":"key-10.1145\/3338499.3357357-34","unstructured":"Merve Can Kus Khalilov and Albert Levi. 2018. A Survey on Anonymity and Privacy in Bitcoin-Like Digital Cash Systems. IEEE Commun. Surveys Tuts., Vol. 20, 3."},{"key":"key-10.1145\/3338499.3357357-35","unstructured":"Fritz Klocke and Aaron Kuchle. 2009. Manufacturing Processes. Springer."},{"key":"key-10.1145\/3338499.3357357-36","unstructured":"Kurt Lange. 1997. Cold forming and fineblanking. Wetzlar."},{"key":"key-10.1145\/3338499.3357357-37","unstructured":"Jay Lee et almbox. 2015. A Cyber-Physical Systems architecture for Industry 4.0-based manufacturing systems. Manuf. Lett., Vol. 3."},{"key":"key-10.1145\/3338499.3357357-38","doi-asserted-by":"crossref","unstructured":"Yehida Lindell. 2005. Secure Multiparty Computation for Privacy-Preserving Data Mining.","DOI":"10.4018\/978-1-59140-557-3.ch189"},{"key":"key-10.1145\/3338499.3357357-39","doi-asserted-by":"crossref","unstructured":"Jing Liu et almbox. 2012. Authentication and Access Control in the Internet of Things. In ICDCS.","DOI":"10.1504\/IJSN.2012.053461"},{"key":"key-10.1145\/3338499.3357357-40","unstructured":"Jon Loeliger and Matthew McCullough. 2012. Version Control with Git: Powerful tools and techniques for collaborative software development. O'Reilly Media."},{"key":"key-10.1145\/3338499.3357357-41","unstructured":"Mimi Ma et almbox. 2018. Certificateless Searchable Public Key Encryption Scheme for Industrial Internet of Things. IEEE Trans. Ind. Informat., Vol. 14, 2."},{"key":"key-10.1145\/3338499.3357357-42","unstructured":"Roman Matzutt et almbox. 2017. myneData: Towards a Trusted and User-controlled Ecosystem for Sharing Personal Data. In INFORMATIK."},{"key":"key-10.1145\/3338499.3357357-43","unstructured":"Silvio Micali and Phillip Rogaway. 1991. Secure Computation. In CRYPTO."},{"key":"key-10.1145\/3338499.3357357-44","doi-asserted-by":"crossref","unstructured":"David C Mills et almbox. 2016. Distributed Ledger Technology in Payments, Clearing, and Settlement.","DOI":"10.17016\/FEDS.2016.095"},{"key":"key-10.1145\/3338499.3357357-45","unstructured":"Malte M&#246;ser et almbox. 2018. An Empirical Analysis of Traceability in the Monero Blockchain. PoPETS, Vol. 2018, 3."},{"key":"key-10.1145\/3338499.3357357-46","unstructured":"Satoshi Nakamoto et almbox. 2008. Bitcoin: A peer-to-peer electronic cash system."},{"key":"key-10.1145\/3338499.3357357-47","unstructured":"Torben Pryds Pedersen. 1992. Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing. In CRYPTO."},{"key":"key-10.1145\/3338499.3357357-48","doi-asserted-by":"crossref","unstructured":"Jan Pennekamp et almbox. 2019. Towards an Infrastructure Enabling the Internet of Production. In IEEE ICPS.","DOI":"10.1109\/ICPHYS.2019.8780276"},{"key":"key-10.1145\/3338499.3357357-49","unstructured":"Sandro Pinto et almbox. 2017. IIoTEED: An Enhanced, Trusted Execution Environment for Industrial IoT Edge Devices. IEEE Internet Comput., Vol. 21, 1."},{"key":"key-10.1145\/3338499.3357357-50","unstructured":"Stephen Pollard et almbox. 2018. Authentication of 3D Printed Parts using 3D Physical Signatures. In NIP &#38; Digital Fabrication Conference, Vol. 2018."},{"key":"key-10.1145\/3338499.3357357-51","unstructured":"Serguei Popov. 2016. The tangle."},{"key":"key-10.1145\/3338499.3357357-52","doi-asserted-by":"crossref","unstructured":"Alexander Pretschner et almbox. 2006. Distributed usage control. In Commun. ACM.","DOI":"10.1145\/1151030.1151053"},{"key":"key-10.1145\/3338499.3357357-53","unstructured":"Michael O Rabin. 2005. How To Exchange Secrets with Oblivious Transfer. IACR Cryptology ePrint Archive, Vol. 2005."},{"key":"key-10.1145\/3338499.3357357-54","doi-asserted-by":"crossref","unstructured":"Ragunathan Rajkumar et almbox. 2010. Cyber-physical systems: The next computing revolution. In DAC.","DOI":"10.1145\/1837274.1837461"},{"key":"key-10.1145\/3338499.3357357-55","unstructured":"Ronald Rivest et almbox. 1978. A Method for Obtaining Digital Signatures and Public-key Cryptosystems. Commun. ACM, Vol. 21, 2."},{"key":"key-10.1145\/3338499.3357357-56","doi-asserted-by":"crossref","unstructured":"Ahmad-Reza Sadeghi et almbox. 2015. Security and Privacy Challenges in Industrial Internet of Things. In DAC.","DOI":"10.1145\/2744769.2747942"},{"key":"key-10.1145\/3338499.3357357-57","unstructured":"Ravi S. Sandhu and Pierangela Samarati. 1994. Access control: principle and practice. IEEE Commun. Mag., Vol. 32, 9."},{"key":"key-10.1145\/3338499.3357357-58","unstructured":"Nuno Santos et almbox. 2009. Towards trusted cloud computing. HotCloud, Vol. 9, 9."},{"key":"key-10.1145\/3338499.3357357-59","unstructured":"G&#252;nther Schuh et almbox. 2018. The Digital Shadow of Services: A Reference Model for Comprehensive Data Collection in MRO Services of Machine Manufacturers. Procedia CIRP, Vol. 73."},{"key":"key-10.1145\/3338499.3357357-60","unstructured":"Adi Shamir. 1979. How to share a secret. Commun. ACM, Vol. 22, 11."},{"key":"key-10.1145\/3338499.3357357-61","unstructured":"Elaine Shi et almbox. 2011. Privacy-Preserving Aggregation of Time-Series Data. In NDSS."},{"key":"key-10.1145\/3338499.3357357-62","unstructured":"Jordi Soria-Comas and Josep Domingo-Ferrer. 2016. Big Data Privacy: Challenges to Privacy Principles and Models. Data Science and Engineering, Vol. 1, 1."},{"key":"key-10.1145\/3338499.3357357-63","doi-asserted-by":"crossref","unstructured":"Markus Stadler. 1996. Publicly Verifiable Secret Sharing. In EUROCRYPT.","DOI":"10.1007\/3-540-68339-9_17"},{"key":"key-10.1145\/3338499.3357357-64","doi-asserted-by":"crossref","unstructured":"Ralf Steinmetz and Klaus Wehrle. 2005. Peer-to-Peer Systems and Applications. Springer.","DOI":"10.1007\/11530657"},{"key":"key-10.1145\/3338499.3357357-65","unstructured":"Tim Stock and G&#252;nther Seliger. 2016. Opportunities of Sustainable Manufacturing in Industry 4.0. Procedia CIRP, Vol. 40."},{"key":"key-10.1145\/3338499.3357357-66","unstructured":"Latanya Sweeney. 2002. k-anonymity: a model for protecting privacy. Int. J. Uncertain. Fuzz., Vol. 10, 5."},{"key":"key-10.1145\/3338499.3357357-67","unstructured":"Hassan Takabi et almbox. 2010. Security and Privacy Challenges in Cloud Computing Environments. IEEE Security Privacy, Vol. 8, 6."},{"key":"key-10.1145\/3338499.3357357-68","unstructured":"Daniel Trauth et almbox. 2018 (accessed June 14, 2019). Manufacturing Economy. https:\/\/medium.com\/industrial-iota-lab-aachen-wzl-of-rwth-aachen\/manufacturing-economy-e541066889ee."},{"key":"key-10.1145\/3338499.3357357-69","unstructured":"Thomas H.-J. Uhlemann et almbox. 2017. The Digital Twin: Demonstrating the Potential of Real Time Data Acquisition in Production Systems. Procedia Manuf., Vol. 9."},{"key":"key-10.1145\/3338499.3357357-70","doi-asserted-by":"crossref","unstructured":"Marten Van Dijk et almbox. 2010. Fully Homomorphic Encryption over the Integers. In EUROCRYPT.","DOI":"10.1007\/978-3-642-13190-5_2"},{"key":"key-10.1145\/3338499.3357357-71","unstructured":"Diana M. Segura Velandia et almbox. 2016. Towards industrial internet of things: Crankshaft monitoring, traceability and tracking using RFID. Robot. Comput. Integr. Manuf., Vol. 41."},{"key":"key-10.1145\/3338499.3357357-72","unstructured":"Herman Voigts et almbox. 2018. Dependencies of the die-roll height during fine blanking of case hardening steel 16MnCr5 without V-ring using a nesting strategy. Int. J. Adv. Manuf. Technol., Vol. 95, 5."},{"key":"key-10.1145\/3338499.3357357-73","unstructured":"Matthew Waller et almbox. 2008. Supply chain security: an overview and research agenda. The International Journal of Logistics Management."},{"key":"key-10.1145\/3338499.3357357-74","unstructured":"Michael E. Whitman and Herbert J. Mattord. 2011. Principles of Information Security 4th ed.). Course Technology Press."},{"key":"key-10.1145\/3338499.3357357-75","unstructured":"Gavin Wood et almbox. 2014. Ethereum: A secure decentralised generalised transaction ledger."},{"key":"key-10.1145\/3338499.3357357-76","unstructured":"Chunyong Yin et almbox. 2018. Location Privacy Protection Based on Differential Privacy Strategy for Big Data in Industrial Internet of Things. IEEE Trans. Ind. Informat., Vol. 14, 8."},{"key":"key-10.1145\/3338499.3357357-77","doi-asserted-by":"crossref","unstructured":"Yuanyu Zhang et almbox. 2018. Smart Contract-Based Access Control for the Internet of Things. IEEE Internet Things J.","DOI":"10.1109\/JIOT.2018.2847705"},{"key":"key-10.1145\/3338499.3357357-78","unstructured":"Qide Zheng et almbox. 2019. State-of-the-art and future challenge in fine-blanking technology. Production Engineering, Vol. 13, 1."},{"key":"key-10.1145\/3338499.3357357-79","unstructured":"Liang Zhou and Han-Chieh Chao. 2011. Multimedia traffic security architecture for the internet of things. IEEE Netw., Vol. 25, 3."},{"key":"key-10.1145\/3338499.3357357-80","unstructured":"Jan Henrik Ziegeldorf et almbox. 2017. BLOOM: BLoom filter based Oblivious Outsourced Matchings. BMC Medical Genomics, Vol. 10, Suppl 2."}],"event":{"name":"the ACM Workshop","location":"London, United Kingdom","acronym":"CPS-SPC'19","number":"2019","sponsor":["SIGSAC, ACM Special Interest Group on Security, Audit, and Control"],"start":{"date-parts":[[2019,11,11]]},"end":{"date-parts":[[2019,11,11]]}},"container-title":["Proceedings of the ACM Workshop on Cyber-Physical Systems Security &amp; Privacy - CPS-SPC'19"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3338499.3357357","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/dl.acm.org\/ft_gateway.cfm?id=3357357&ftid=2095971&dwn=1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:12:48Z","timestamp":1750201968000},"score":1,"resource":{"primary":{"URL":"http:\/\/dl.acm.org\/citation.cfm?doid=3338499.3357357"}},"subtitle":["A Security &amp; Privacy Perspective"],"proceedings-subject":"Cyber-Physical Systems Security & Privacy","short-title":[],"issued":{"date-parts":[[2019]]},"references-count":80,"URL":"https:\/\/doi.org\/10.1145\/3338499.3357357","relation":{},"subject":[],"published":{"date-parts":[[2019]]}}}