Abstract

Establishing efficient, effective, and trustworthy engineering collaboration while protecting intellectual property is vital to maintain organizational competence in today’s global business environment. In this paper, a lean information modeling and sharing framework is described to support engineering data security management in a peer-to-peer collaborative environment. It allows for selective and interoperable data sharing with fine-grained access control at both the server and client sides, thus securing different levels of design information dissemination for intellectual property protection purposes. The considerations of time and value-adding activity with roles, policy delegation relation in a distributed context, and fine-grained control at data set level in the model are to adhere to the general least privilege principle in access control. Heterogeneous design data are exchanged selectively through an eXtensible Markup Language common interface, which provides a neutral format to enhance data interoperability and prevents reverse engineering.

1.
The white paper of U.S. National Science Foundation workshop on e-product design and realization for mechanically engineered products, October 19–20, 2000, Pittsburgh, PA, http://www.e-designcenter.infohttp://www.e-designcenter.info
2.
Parunak
,
H. V. D.
, 1997, “
Distributed Collaborative Design (DisCollab): An ATP Opportunity
,” http://www.mel.nist.gov/msid/groups/edt/ATP/white-paperhttp://www.mel.nist.gov/msid/groups/edt/ATP/white-paper (Whitepaper of NIST-ATP Workshop: Tools and Technologies for Distributed and Collaborative Design)
7.
Fetscherin
,
M.
, and
Schmid
,
M.
, 2003, “
Comparing the Usage of Digital Rights Management Systems in the Music, Film, and Print Industry
,”
ACM Proceedings of the Fifth International Conference on Electronic Commerce
,
Pittsburgh
, PA, pp.
316
325
.
8.
Attrapadung
,
N.
,
Kobara
,
K.
, and
Imai
,
H.
, 2003, “
Broadcast Encryption With Short Keys and Transmissions
,”
ACM Proceedings of the 2003 Workshop on Digital Rights Management
,
Washington
, DC, pp.
55
66
.
9.
Adelsbach
,
A.
,
Katzenbeisser
,
S.
, and
Veith
,
H.
, 2003, “
Watermarking Schemes Provably Secure Against Copy and Ambiguity Attacks
,”
ACM Proceedings of the 2003 Workshop on Digital Rights Management
,
Washington
, DC, pp.
111
119
.
10.
Chadha
,
R.
,
Kanovich
,
M.
, and
Scedrov
,
A.
, 2001, “
Inductive Methods and Contract-signing Protocols
,”
ACM Proceedings of the Eigth Conference on Computer and Communications Security
,
Philadelphia
, PA, pp.
176
185
.
11.
Koenen
,
R. H.
,
Lacy
,
J.
,
Mackay
,
M.
, and
Mitchell
,
S.
, 2004, “
The Long March to Interoperable Digital Rights Management
,”
Proc. IEEE
0018-9219,
92
(
6
), pp.
883
897
.
12.
Cox
,
I. J.
,
Kilian
,
J.
,
Leightont
,
T.
, and
Shamoon
,
T.
, 1997, “
Secure Spread Spectrum Watermarking for Images, Audio and Video
,”
IEEE Trans. Image Process.
1057-7149,
6
(
2
), pp.
1673
1687
.
13.
Barni
,
M.
, and
Barolini
,
F.
, 2004, “
Data Hiding for Fighting Piracy
,”
IEEE Signal Process. Mag.
1053-5888,
21
(
2
), pp.
28
39
.
14.
Ohbuchi
,
R.
,
Masuda
,
H.
, and
Aono
,
M.
, 1998, “
Watermarking Three-Dimensional Polygonal Models through Geometric and Topological Modifications
,”
IEEE J. Sel. Areas Commun.
0733-8716,
16
(
4
), pp.
551
560
.
15.
Benedens
,
O.
, 1999, “
Geometry-Based Watermarking of 3D Models
,”
IEEE Comput. Graphics Appl.
0272-1716,
19
(
1
), pp.
46
55
.
16.
Harte
,
T.
, and
Bors
,
A. G.
, 2002, “
Watermarking Graphical Objects
,”
IEEE Proceedings of the 14th International Conference on Digital Signal Processing
, Vol.
2
, pp.
709
721
.
17.
Praun
,
E.
,
Hoppe
,
H.
, and
Finkelstein
,
A.
, 1999, “
Robust Mesh Watermarking
,”
ACM Proc. SIGGRAPH’99
, pp.
49
56
.
18.
Kanai
,
S.
,
Date
,
H.
, and
Kishinami
,
T.
, 1998, “
Digitial Watermarking for 3D Polygons Using Multiresolution Wavelet Decomposition
,”
Proceedings of the Sixth IFIP WG5.2/GI International Workshop on Geometric Modelling: Fundamentals & Applications
,
Tokyo
, pp.
296
307
.
19.
Yi
,
K.
,
Pan
,
Z.
,
Shi
,
J.
, and
Zhang
,
D.
, 2001, “
Robust Mesh Watermarking Based on Multiresolution Processing
,”
Comput. Graphics
0097-8493,
25
(
3
), pp.
409
420
.
20.
Ohbuchi
,
R.
,
Masuda
,
H.
, and
Aono
,
M.
, 1998, “
Data Embedding Algorithm for Geometrical and Non-geometrical Targets in Three-Dimensional Polygonal Models
,”
Comput. Commun.
0140-3664,
21
, pp.
1344
1354
.
21.
Zhang
,
L.
,
Tong
,
R.
,
Su
,
F.
, and
Dong
,
J.
, 2002, “
A Mesh Watermarking Approach for Appearance Attributes
,”
IEEE Proceedings of the Tenth Pacific Conference on Computer Graphics & Applications (PG’02)
, pp.
450
451
.
22.
Ohbuchi
,
R.
,
Masuda
,
H.
, and
Aono
,
M.
, 1999, “
A Shape-Preserving Data Embedding Algorithm for NURBS Curves and Surfaces
,”
IEEE Proceedings of the 1999 Computer Graphics International (CGI’99)
,
Canmore
, Canada, pp.
180
187
.
23.
Lach
,
J.
,
Mangione-Smith
,
W. H.
, and
Potkonjak
,
M.
, 2001, “
Fingerprinting Techniques for Field-Programmable Gate Array Intellectual Property Protection
,”
IEEE Trans. Comput.-Aided Des. Integr. Circuits Sys.
,
20
(
10
), pp.
1253
1261
.
24.
Caldwell
,
A. E.
,
Choi
,
H.-J.
,
Kahng
,
A. B.
,
Mantik
,
S.
,
Potkonjak
,
M.
,
Qu
,
G.
, and
Wong
,
J. L.
, 2004, “
Effective Iterative Techniques for Fingerprinting Design IP
,”
IEEE Trans. Comput.-Aided Des. Integr. Circuits Sys.
,
23
(
2
), pp.
208
215
.
25.
Ko
,
K.
,
Maekawa
,
T.
,
Patrikalakis
,
N.
,
Masuda
,
H.
, and
Wolter
,
F.
, 2003, “
Shape Intrinsic Fingerprints for Free-Form Object Matching
,”
ACM Proceedings of the SM’03
,
Seattle
, Washington, pp.
196
207
.
26.
Sandhu
,
R. S.
, and
Samarati
,
P.
, 1994, “
Access Control: Principle and Practice
,”
IEEE Commun. Mag.
0148-9615,
32
(
9
), pp.
40
48
.
27.
Sandhu
,
R.
, 1993, “
Lattice-Based Access Control Models
,”
IEEE Comput. Graphics Appl.
0272-1716,
26
(
11
), pp.
9
19
.
28.
Sandhu
,
R.
,
Coyne
,
E. J.
,
Feinstein
,
H. L.
, and
Youman
,
C. E.
, 1996, “
Role-Based Access Control Models
,”
IEEE Comput. Graphics Appl.
0272-1716,
29
(
2
), pp.
38
47
.
29.
Ferraiolo
,
D. F.
,
Sandhu
,
R.
,
Gavrila
,
S.
,
Kuhn
,
D. R.
, and
Chandramouli
,
R.
, 2001, “
Proposed NIST Standard for Role-Based Access Control
,”
ACM Trans. Inf. Syst. secur.
1094-9224,
4
(
3
), pp.
224
274
.
30.
Georgiadis
,
C. K.
,
Marvridis
,
I.
,
Pangalos
,
G.
, and
Thomas
,
R. K.
, 2001, “
Flexible Team-Based Access Control Using Contexts
,”
Proceedings of the Sixth ACM Symposium on Access Control Models and Technologies
,
Chantilly
, VA, pp.
21
27
.
31.
Thomas
,
R. K.
, 1997, “
Team-Based Access Control (TMAC): A Primitive for Applying Role-Based Access Controls in Collaborative Environments
,”
Proceedings of the Second ACM Workshop on Role-based Access Control
,
Fairfax
, VA, pp.
13
19
.
32.
Harrington
,
A.
, and
Jensen
,
C.
, 2003, “
Cryptographic Access Control in a Distributed File System
,”
Proceedings of the Eigth ACM Symposium on Access Control Models and Technologies
,
Como
, Italy, pp.
158
165
.
33.
Cera
,
C.
,
Braude
,
I.
,
Comer
,
I.
,
Kim
,
T.
,
Han
,
J.
, and
Regli
,
W.
, 2003, “
Hierarchical Role-Based Viewing for Secure Collaborative CAD
,”
Proceedings of the 2003 ASME International Design Engineering Technical Conferences & The Computer and Information in Engineering Conference (DETC/CIE2003)
,
Chicago
, IL, Paper No. DETC2003/CIE-48277.
34.
Cera
,
C. D.
,
Kim
,
T.
,
Han
,
J. H.
, and
Regli
,
W. C.
, 2004, “
Role-Based Viewing Envelopes for Information Protection in Collaborative Modeling
,”
CAD
0010-4485,
36
(
9
), pp.
873
886
.
35.
Wang
,
Y.
,
Ajoku
,
P. N.
, and
Nnaji
,
B. O.
, 2004, “
Scheduled Role-Based Distributed Data Access Control Model for Data Sharing in Collaborative Design
,”
Proceedings of the 2004 International Symposium on Collaborative Technologies and Systems (CTS2004)
,
San Diego
, CA, pp.
191
196
.
36.
Wang
,
Y.
,
Ajoku
,
P. N.
, and
Nnaji
,
B. O.
, 2004, “
Distributed Data Access Control for Lean Product Information Sharing in Collaborative Design
,”
Proceedings of the 2004 ASME International Design Engineering Technical Conferences & The Computer and Information in Engineering Conference (DETC/CIE2004)
,
Salt Lake City
, UT, Paper No. DETC2004/CIE-57748.
37.
Kao
,
K. J.
,
Seeley
,
C. E.
,
Yin
,
S.
,
Kolonay
,
R. M.
,
Rus
,
T.
, and
Paradis
,
M.
, 2003, “
Business-to-Business Virtual Collaboration of Aircraft Engine Combustor Design
,”
Proceedings of the 2003 ASME International Design Engineering Technical Conferences & The Computer and Information in Engineering Conference (DETC/CIE2003)
,
Chicago
, IL, Paper No. DETC2003/CIE-48282.
39.
Lubell
,
J.
,
Peak.
,
R. S.
,
Srinivasan
,
V.
, and
Waterbury
,
S. C.
, 2004, “
STEP, XML, and UML: Complementary Technologies
,”
Proceedings of the 2004 ASME International Design Engineering Technical Conferences & The Computer and Information in Engineering Conference (DETC/CIE2004)
,
Salt Lake City
, UT, Paper No. DETC2004/CIE-57743.
40.
ISO TC184/SC4/WG11 N223, ISO/WD 10303–28,
Product Data Representation and Exchange: Implementation Methods: XML Schema Governed Representation of EXPRESS Schema Governed Data, 2004-02-17
.
41.
Organization for the Advancement of Structured Information Standards, http://www.oasis-open.orghttp://www.oasis-open.org
42.
World Wide Web Consortium, http://www.w3.orghttp://www.w3.org
46.
Wang
,
Y.
, and
Nnaji
,
B. O.
, 2004, “
UL-PML: Constraint-Enabled Distributed Product Data Model
,”
Int. J. Prod. Res.
0020-7543,
42
(
17
), pp.
3743
3763
.
47.
Lubell
,
J.
, and
Frechett
,
S.
, 2002, “
XML Representation of STEP Schemas and Data
,”
ASME J. Comput. Inf. Sci. Eng.
1530-9827,
2
(
1
), pp.
69
71
.
48.
Lubell
,
J.
, 2002, “
From Model to Markup
,”
Proceedings of the 2002 XML Conference
,
Baltimore
, MD, http://www.mel.nist.gov/msidlibrary/doc/m2m.pdfhttp://www.mel.nist.gov/msidlibrary/doc/m2m.pdf
You do not currently have access to this content.