參考文獻 |
[1] V. Hassija, V. Chamola, V. Gupta, S. Jain, and N. Guizani, “A Survey on Supply
Chain Security: Application Areas, Security Threats, and Solution Architectures,”
IEEE Internet of Things Journal, vol. 8, no. 8, pp. 6222–6246, Apr. 2021, doi:
10.1109/JIOT.2020.3025775.
[2] D. Prajogo and J. Olhager, “Supply chain integration and performance: The effects
of long-term relationships, information technology and sharing, and logistics
integration,” International Journal of Production Economics, vol. 135, no. 1, pp.
514–522, Jan. 2012, doi: 10.1016/j.ijpe.2011.09.001.
[3] H. L. Lee, K. C. So, and C. S. Tang, “The Value of Information Sharing in a TwoLevel Supply Chain,” Management Science, vol. 46, no. 5, pp. 626–643, May 2000,
doi: 10.1287/mnsc.46.5.626.12047.
[4] H. Zhou and W. C. Benton, “Supply chain practice and information sharing,”
Journal of Operations Management, vol. 25, no. 6, pp. 1348–1365, Nov. 2007, doi:
10.1016/j.jom.2007.01.009.
[5] S. Qi, Y. Zheng, M. Li, Y. Liu, and J. Qiu, “Scalable Industry Data Access Control
in RFID-Enabled Supply Chain,” IEEE/ACM Transactions on Networking, vol. 24,
no. 6, pp. 3551–3564, Dec. 2016, doi: 10.1109/TNET.2016.2536626.
[6] “Data Risk in the Third-Party Ecosystem: Third Annual Study,” Ponemon Institute.
https://www.ponemon.org/research/ponemon-library/security/data-risk-in-thethird-party-ecosystem-third-annual-study.html (accessed Mar. 08, 2023).
[7] A. Sahai and B. Waters, “Fuzzy Identity-Based Encryption,” in Advances in
Cryptology – EUROCRYPT 2005, R. Cramer, Ed., in Lecture Notes in Computer
Science. Berlin, Heidelberg: Springer, 2005, pp. 457–473. doi:
10.1007/11426639_27.
[8] S. Nakamoto, “Bitcoin: A Peer-to-Peer Electronic Cash System”.
[9] “Ethereum Whitepaper,” ethereum.org. https://ethereum.org (accessed Mar. 09,
2023).
[10]“IPFS Documentation | IPFS Docs.” https://docs.ipfs.tech/ (accessed Mar. 10,
2023).
[11]L.-Y. Yeh, C.-Y. Shen, W.-C. Huang, W.-H. Hsu, and H.-C. Wu, “GDPR-Aware
Revocable P2P File-Sharing System Over Consortium Blockchain,” IEEE Systems
Journal, vol. 16, no. 4, pp. 5234–5245, Feb. 2022, doi:
10.1109/JSYST.2021.3139319.
[12]V. Goyal, O. Pandey, A. Sahai, and B. Waters, “Attribute-based encryption for finegrained access control of encrypted data,” in Proceedings of the 13th ACM
conference on Computer and communications security, in CCS ’06. New York, NY, USA: Association for Computing Machinery, Oct. 2006, pp. 89–98. doi:
10.1145/1180405.1180418.
[13]J. Bethencourt, A. Sahai, and B. Waters, “Ciphertext-Policy Attribute-Based
Encryption,” in 2007 IEEE Symposium on Security and Privacy (SP ’07), Berkeley,
CA: IEEE, May 2007, pp. 321–334. doi: 10.1109/SP.2007.11.
[14]M. Nakasumi, “Information Sharing for Supply Chain Management Based on
Block Chain Technology,” in 2017 IEEE 19th Conference on Business Informatics
(CBI), Jul. 2017, pp. 140–149. doi: 10.1109/CBI.2017.56.
[15]I. A. Omar, R. Jayaraman, M. S. Debe, H. R. Hasan, K. Salah, and M. Omar,
“Supply Chain Inventory Sharing Using Ethereum Blockchain and Smart
Contracts,” IEEE Access, vol. 10, pp. 2345–2356, 2022, doi:
10.1109/ACCESS.2021.3139829.
[16]M. Du, Q. Chen, J. Xiao, H. Yang, and X. Ma, “Supply Chain Finance Innovation
Using Blockchain,” IEEE Transactions on Engineering Management, vol. 67, no.
4, pp. 1045–1058, Jan. 2020, doi: 10.1109/TEM.2020.2971858.
[17]S. van Engelenburg, M. Janssen, and B. Klievink, “A Blockchain Architecture for
Reducing the Bullwhip Effect,” in Business Modeling and Software Design, B.
Shishkov, Ed., in Lecture Notes in Business Information Processing. Cham:
Springer International Publishing, 2018, pp. 69–82. doi: 10.1007/978-3-319-
94214-8_5.
[18]M. H. Abidi, H. Alkhalefah, U. Umer, and M. K. Mohammed, “Blockchain-based
secure information sharing for supply chain management: Optimization assisted
data sanitization process,” International Journal of Intelligent Systems, vol. 36, no.
1, pp. 260–290, 2021, doi: 10.1002/int.22299.
[19]S. Mirjalili and A. Lewis, “The Whale Optimization Algorithm,” Advances in
Engineering Software, vol. 95, pp. 51–67, May 2016, doi:
10.1016/j.advengsoft.2016.01.008.
[20]Q. Song, Y. Chen, Y. Zhong, K. Lan, S. Fong, and R. Tang, “A Supply-chain System
Framework Based on Internet of Things Using Blockchain Technology,” ACM
Trans. Internet Technol., vol. 21, no. 1, p. 13:1-13:24, Jan. 2021, doi:
10.1145/3409798.
[21]Q. Wen, Y. Gao, Z. Chen, and D. Wu, “A Blockchain-based Data Sharing Scheme
in The Supply Chain by IIoT,” in 2019 IEEE International Conference on
Industrial Cyber Physical Systems (ICPS), May 2019, pp. 695–700. doi:
10.1109/ICPHYS.2019.8780161.
[22]C. Liu, F. Xiang, and Z. Sun, “Multiauthority Attribute-Based Access Control for
Supply Chain Information Sharing in Blockchain,” Security and Communication
Networks, vol. 2022, p. e8497628, Apr. 2022, doi: 10.1155/2022/8497628.
[23]C. Bösch, P. Hartel, W. Jonker, and A. Peter, “A Survey of Provably Secure
Searchable Encryption,” ACM Comput. Surv., vol. 47, no. 2, p. 18:1-18:51, Aug.
2014, doi: 10.1145/2636328.
[24]D. X. Song, D. Wagner, and A. Perrig, “Practical techniques for searches on
encrypted data,” in Proceeding 2000 IEEE Symposium on Security and Privacy.
S&P 2000, May 2000, pp. 44–55. doi: 10.1109/SECPRI.2000.848445.
[25]R. Curtmola, J. Garay, S. Kamara, and R. Ostrovsky, “Searchable symmetric
encryption: improved definitions and efficient constructions,” in Proceedings of
the 13th ACM conference on Computer and communications security, in CCS ’06.
New York, NY, USA: Association for Computing Machinery, Oct. 2006, pp. 79–
88. doi: 10.1145/1180405.1180417.
[26]D. Boneh, G. Di Crescenzo, R. Ostrovsky, and G. Persiano, “Public Key
Encryption with Keyword Search,” in Advances in Cryptology - EUROCRYPT
2004, C. Cachin and J. L. Camenisch, Eds., in Lecture Notes in Computer Science.
Berlin, Heidelberg: Springer, 2004, pp. 506–522. doi: 10.1007/978-3-540-24676-
3_30.
[27]S. Hu, C. Cai, Q. Wang, C. Wang, X. Luo, and K. Ren, “Searching an Encrypted
Cloud Meets Blockchain: A Decentralized, Reliable and Fair Realization,” in IEEE
INFOCOM 2018 - IEEE Conference on Computer Communications, Apr. 2018, pp.
792–800. doi: 10.1109/INFOCOM.2018.8485890.
[28]C. Cai, J. Weng, X. Yuan, and C. Wang, “Enabling Reliable Keyword Search in
Encrypted Decentralized Storage with Fairness,” IEEE Transactions on
Dependable and Secure Computing, vol. 18, no. 1, pp. 131–144, Jan. 2021, doi:
10.1109/TDSC.2018.2877332.
[29]S. Tahir and M. Rajarajan, “Privacy-Preserving Searchable Encryption Framework
for Permissioned Blockchain Networks,” in 2018 IEEE International Conference
on Internet of Things (iThings) and IEEE Green Computing and Communications
(GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and
IEEE Smart Data (SmartData), Jul. 2018, pp. 1628–1633. doi:
10.1109/Cybermatics_2018.2018.00272.
[30]H. Li, H. Tian, F. Zhang, and J. He, “Blockchain-based searchable symmetric
encryption scheme,” Computers & Electrical Engineering, vol. 73, pp. 32–45, Jan.
2019, doi: 10.1016/j.compeleceng.2018.10.015.
[31]L. Chen, W.-K. Lee, C.-C. Chang, K.-K. R. Choo, and N. Zhang, “Blockchain
based searchable encryption for electronic health record sharing,” Future
Generation Computer Systems, vol. 95, pp. 420–429, Jun. 2019, doi:
10.1016/j.future.2019.01.018.
[32]S. Gao, Y. Chen, J. Zhu, Z. Sui, R. Zhang, and X. Ma, “BPMS: Blockchain-based Privacy-preserving Multi-keyword Search in Multi-owner Setting,” IEEE
Transactions on Cloud Computing, pp. 1–13, 2022, doi:
10.1109/TCC.2022.3196712.
[33]B. H. Bloom, “Space/time trade-offs in hash coding with allowable errors,”
Commun. ACM, vol. 13, no. 7, pp. 422–426, Jul. 1970, doi:
10.1145/362686.362692.
[34]Z. Ying, W. Jiang, X. Liu, S. Xu, and R. H. Deng, “Reliable Policy Updating Under
Efficient Policy Hidden Fine-Grained Access Control Framework for Cloud Data
Sharing,” IEEE Transactions on Services Computing, vol. 15, no. 6, pp. 3485–3498,
Jan. 2022, doi: 10.1109/TSC.2021.3096177.
[35]M. J. Dworkin, “Advanced Encryption Standard (AES),” National Institute of
Standards and Technology, Gaithersburg, MD, NIST FIPS 197-upd1, 2023. doi:
10.6028/NIST.FIPS.197-upd1.
[36]D. Boneh, X. Boyen, and E.-J. Goh, “Hierarchical Identity Based Encryption with
Constant Size Ciphertext,” in Advances in Cryptology – EUROCRYPT 2005, R.
Cramer, Ed., in Lecture Notes in Computer Science. Berlin, Heidelberg: Springer,
2005, pp. 440–456. doi: 10.1007/11426639_26.
[37]M. J. Dworkin, “SHA-3 Standard: Permutation-Based Hash and ExtendableOutput Functions,” National Institute of Standards and Technology, NIST FIPS 202,
Jul. 2015. doi: 10.6028/NIST.FIPS.202.
[38]A. De Caro and V. Iovino, “jPBC: Java pairing based cryptography,” in 2011 IEEE
Symposium on Computers and Communications (ISCC), Jun. 2011, pp. 850–855.
doi: 10.1109/ISCC.2011.5983948. |