Efforts to Improve and Utilize Security Transparency in Software Supply Chains

被引:0
|
作者
Wada, Yasunori [1 ]
Arakawa, Reika [1 ]
机构
[1] NTT Social Informatics Laboratories, Japan
来源
NTT Technical Review | 2024年 / 22卷 / 11期
关键词
D O I
暂无
中图分类号
TB23 [工程制图];
学科分类号
摘要
Looking back on the expectations of various stakeholders for the utilization of visualization data to reduce risks in software supply chains and the actual situation in which the utilization has not progressed, we introduce the latest research trends toward addressing issues related to the use of visualization data and the security transparency technologies that NTT Social Informatics Laboratories is investigating. © 2024 Nippon Telegraph and Telephone Corp.. All rights reserved.
引用
收藏
页码:64 / 68
相关论文
共 50 条
  • [21] Current efforts in Ports and Supply Chains Risk Assessment
    Polemi, Nineta
    Papastergiou, Spyros
    2015 10TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST), 2015, : 349 - 354
  • [22] Contracting Supply Chains Considering Retailers' Marketing Efforts
    Li, Wenqiang
    He, Juan
    Shi, Yangyan
    MATHEMATICS, 2024, 12 (11)
  • [23] Security and trust management in supply chains
    Kolluru, Ramesh
    Meredith, Paul H.
    Information Management and Computer Security, 2001, 9 (05): : 233 - 236
  • [24] EFFORTS TO IMPROVE SAFETY OF BLOOD-SUPPLY
    NIGHTINGALE, SL
    JAMA-JOURNAL OF THE AMERICAN MEDICAL ASSOCIATION, 1988, 260 (20): : 2980 - 2980
  • [25] Intermodalism, supply chains and US security
    Szyliowicz, Joseph S.
    TRANSPORT REVIEWS, 2022, 42 (06) : 801 - 818
  • [26] Security of Information Processes in Supply Chains
    Iskanderov, Yury
    Pautov, Mikhail
    PROCEEDINGS OF THE THIRD INTERNATIONAL SCIENTIFIC CONFERENCE INTELLIGENT INFORMATION TECHNOLOGIES FOR INDUSTRY (IITI'18), VOL 2, 2019, 875 : 13 - 22
  • [27] Security of an RFID Protocol for Supply Chains
    van Deursen, Ton
    Radomirovic, Sasa
    PROCEEDINGS OF THE ICEBE 2008: IEEE INTERNATIONAL CONFERENCE ON E-BUSINESS ENGINEERING, 2008, : 568 - 573
  • [28] The security of critical mineral supply chains
    Dou Shiquan
    Xu Deyi
    Mineral Economics, 2023, 36 : 401 - 412
  • [29] Understanding vulnerabilities in software supply chains
    Shen, Yijun
    Gao, Xiang
    Sun, Hailong
    Guo, Yu
    EMPIRICAL SOFTWARE ENGINEERING, 2025, 30 (01)
  • [30] Security And Risk Management in Supply Chains
    Badr, Youakim
    Stephan, Jean
    JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2007, 2 (04): : 288 - 296