The document summarizes a presentation given at the 44th Hawai’i International Conference on System Sciences about enabling RFID technology in pharmaceutical supply chains. It describes a formal model for representing supply chain entities and roles, presents a quantitative analysis of network traffic for a sample US supply chain, and evaluates security considerations for different roles. The model accounts for relationships between business entities and handling units from individual items to transport vehicles. Network traffic is estimated at 234.92TB annually for a supply chain with 15 billion goods and 7 links. Security is addressed through authentication, on-tag mechanisms, and a proposed "service provider for anti-counterfeiting" role.
Why do some patents get licensed while others do not?Ian McCarthy
To understand why some patents get licensed and others do not, we estimate a portfolio of firm- and patent-level determinants for why a particular licensor’s patent was licensed over all technologically similar patents held by other licensors. Using data for licensed biopharmaceutical patents, we build a set of alternate patents that could have been licensed-in using topic modeling techniques. This provides a more sophisticated way of controlling for patent characteristics and analyzing the attractiveness of a licensor and the characteristics of the patent itself. We find that patents owned by licensors with technological prestige, experience at licensing, and combined technological depth and breadth have a greater chance at being chosen by licensees. This suggests that a licensor’s standing and organizational learning rather than the quality of its patent alone influence the success of outward licensing.
Why do some patents get licensed while others do not?Ian McCarthy
To understand why some patents get licensed and others do not, we estimate a portfolio of firm- and patent-level determinants for why a particular licensor’s patent was licensed over all technologically similar patents held by other licensors. Using data for licensed biopharmaceutical patents, we build a set of alternate patents that could have been licensed-in using topic modeling techniques. This provides a more sophisticated way of controlling for patent characteristics and analyzing the attractiveness of a licensor and the characteristics of the patent itself. We find that patents owned by licensors with technological prestige, experience at licensing, and combined technological depth and breadth have a greater chance at being chosen by licensees. This suggests that a licensor’s standing and organizational learning rather than the quality of its patent alone influence the success of outward licensing.
Problema 1: Dibujar una superficie reglada de tres directrices, siendo la velocidad de avance en la directriz central constante.
Problema 2: Dibujar un hiperboloide elíptico.
The existing and future role of RFID technology in Dairy Supply Chain from Fa...Shuhab Tariq
The aim of the project is to focus on the existing and future role of radio frequency identification (RFID) technology in the food supply chain from farm to fork, i.e. tracing the journey of food products right from the farm to the consumer’s plate.
Since the topic is so broad, for the purpose of clarity and in-depth discussion, this project will narrow it down to “Dairy Supply Chain”, wherein the entire supply chain for dairy products will be studied and analyzed.
Interestingly, not much research has been done in this area, and thus, it provides a good scope for research and analysis.
During the tranSMART Annual Meeting 2015, Kees van Bochove, chair of the tranSMART Foundation Architecture Working Group, presented on the future roadmap for the tranSMART platform in a co-presentation with Keith Elliston, CEO of tranSMART Foundation.
The Pistoia Alliance Biology Domain Strategy April 2011Pistoia Alliance
Michael Braxenthaler (Roche and external liaison officer for Pistoia) describes the Pistoia Alliance biology domain strategy at the first Pistoia Alliance Conference in April 2011.
Building Reference Architectures for the Industrial IoTCapgemini
Building Reference Architectures for the Industrial IoT - Alina Chircu, Bentley University; Eldar Sultanow, Capgemini Germany
Workshop on Smart Manufacturing in Aerospace and Automotive Industries
AIS Special Interest Group for Big Data Application in Processes (SIGBD), AMCIS 2017, Boston, USA
Problema 1: Dibujar una superficie reglada de tres directrices, siendo la velocidad de avance en la directriz central constante.
Problema 2: Dibujar un hiperboloide elíptico.
The existing and future role of RFID technology in Dairy Supply Chain from Fa...Shuhab Tariq
The aim of the project is to focus on the existing and future role of radio frequency identification (RFID) technology in the food supply chain from farm to fork, i.e. tracing the journey of food products right from the farm to the consumer’s plate.
Since the topic is so broad, for the purpose of clarity and in-depth discussion, this project will narrow it down to “Dairy Supply Chain”, wherein the entire supply chain for dairy products will be studied and analyzed.
Interestingly, not much research has been done in this area, and thus, it provides a good scope for research and analysis.
During the tranSMART Annual Meeting 2015, Kees van Bochove, chair of the tranSMART Foundation Architecture Working Group, presented on the future roadmap for the tranSMART platform in a co-presentation with Keith Elliston, CEO of tranSMART Foundation.
The Pistoia Alliance Biology Domain Strategy April 2011Pistoia Alliance
Michael Braxenthaler (Roche and external liaison officer for Pistoia) describes the Pistoia Alliance biology domain strategy at the first Pistoia Alliance Conference in April 2011.
Building Reference Architectures for the Industrial IoTCapgemini
Building Reference Architectures for the Industrial IoT - Alina Chircu, Bentley University; Eldar Sultanow, Capgemini Germany
Workshop on Smart Manufacturing in Aerospace and Automotive Industries
AIS Special Interest Group for Big Data Application in Processes (SIGBD), AMCIS 2017, Boston, USA
Review of the Introduction and Use of RFIDEditor IJCATR
We live in an age where technology is an integral part of human daily life. The aim of the technology is secure, accurate,
correct use of time for mankind and nature brings it may also have disadvantages and challenges. In this paper we describe the RFID
technology. Today, this technology in hospitals, shops, airports, tracking birds are used. It can be used in hospital intensive care unit
for monitoring and remote patient care, which causes it to print patients and physicians are not required to comply with very close
distance, the result of which can cause safety Patients and physicians should be. The security technology implementation is a
challenge. This paper introduces the applications, the challenges we have this technology.
Review of the Introduction and Use of RFIDEditor IJCATR
We live in an age where technology is an integral part of human daily life. The aim of the technology is secure, accurate, correct use of time for mankind and nature brings it may also have disadvantages and challenges. In this paper we describe the RFID technology. Today, this technology in hospitals, shops, airports, tracking birds are used. It can be used in hospital intensive care unit for monitoring and remote patient care, which causes it to print patients and physicians are not required to comply with very close distance, the result of which can cause safety Patients and physicians should be. The security technology implementation is a challenge. This paper introduces the applications, the challenges we have this technology.
Review of the Introduction and Use of RFIDEditor IJCATR
We live in an age where technology is an integral part of human daily life. The aim of the technology is secure, accurate, correct use of time for mankind and nature brings it may also have disadvantages and challenges. In this paper we describe the RFID technology. Today, this technology in hospitals, shops, airports, tracking birds are used. It can be used in hospital intensive care unit for monitoring and remote patient care, which causes it to print patients and physicians are not required to comply with very close distance, the result of which can cause safety Patients and physicians should be. The security technology implementation is a challenge. This paper introduces the applications, the challenges we have this technology.
Review of the Introduction and Use of RFIDEditor IJCATR
We live in an age where technology is an integral part of human daily life. The aim of the technology is secure, accurate,
correct use of time for mankind and nature brings it may also have disadvantages and challenges. In this paper we describe the RFID
technology. Today, this technology in hospitals, shops, airports, tracking birds are used. It can be used in hospital intensive care unit
for monitoring and remote patient care, which causes it to print patients and physicians are not required to comply with very close
distance, the result of which can cause safety Patients and physicians should be. The security technology implementation is a
challenge. This paper introduces the applications, the challenges we have this technology.
Patient Journey in Oncology 2025: Molecular Tumour Boards in PracticeMatthieu Schapranow
The slide deck was presented at the Bio Data World Congress in Basel on Dec. 04, 2019. It shares first results from the work in the HiGHmed consortium on the use case oncology.
The given presentation showcases examples of how artificial intelligence technology can be used to improve the patient journey in the specific medical field of oncology.
The given presentations share a specific use case from the medical field of oncology and outlines the potentials of applying artificial intelligence to it.
AnalyzeGenomes.com: A Federated In-Memory Database Platform for Digital HealthMatthieu Schapranow
The slide deck of the presentation "AnalyzeGenomes.com: A Federated In-Memory Database Platform for Digital Health" of the 2017 BMBF All Hands Meeting in Karlsruhe are online available now.
A Federated In-Memory Database Computing Platform Enabling Real-Time Analysis...Matthieu Schapranow
The slide deck "A Federated In-Memory Database Computing Platform Enabling Real-time Analysis of Big Medical Data" presented on May 17, 2017 at Intel Tech Talks hosted by SAPPHIRE 2017 in Orlando, FL is online available now.
The given presentation was presented at SAPPHIRE 2017 in Orlando, FL on May 18, 2017. It highlights latest research results focusing on user-centered in-memory applications for precision medicine.
The given slide deck was presented on the 2017 Festival of Genomics in London, UK. It depicts how latest in-memory database technology supports clinicians in finding the best treatment options incorporating genetic data.
ICT Platform to Enable Consortium Work for Systems Medicine of Heart FailureMatthieu Schapranow
The slide deck "ICT Platform to Enable Consortium Work for Systems Medicine of Heart Failure" was presented on Oct 5, 2016 at the 2016 e:Med Meeting on Systems Medicine in Kiel, Germany.
The given presentation outlines services of the cloud platform "Analyze Genomes" enabling precision medicine. It was presented on the mHealth meets Diagnostics symposium in Berlin on Jun 21, 2016.
This presentation provides a brief overview of how in-memory database technology can be applied to support systems medicine approaches. For that, it shares real-world experiences, e.g. from the SMART project consortium funded by the German Federal Ministry of Education and Research.
This presentation shows application examples of the analyzegenomes.com service for precision medicine. It was presented at 2016 HIMSS conference in Las Vegas, NV
Festival of Genomics 2016 London: Mining and Processing of Unstructured Medic...Matthieu Schapranow
This presentation covers the "Mining and Processing of Unstructured Medical Data" presentation of the 2016 Festival of Genomics workshop "Big Medical Data in Precision Medicine: Challenges or Opportunities?" on Jan 19, 2016 in London.
Festival of Genomics 2016 London: Analyze Genomes: Modeling and Executing Gen...Matthieu Schapranow
This presentation covers the "Analyze Genomes: Modeling and Executing Genome Data Processing Pipelines" presentation of the 2016 Festival of Genomics workshop "Big Medical Data in Precision Medicine: Challenges or Opportunities?" on Jan 19, 2016 in London.
Festival of Genomics 2016 London: Analyze Genomes: A Federated In-Memory Comp...Matthieu Schapranow
This presentation covers the "Analyze Genomes: A Federated In-Memory Computing Platform for Life Sciences" presentation of the 2016 Festival of Genomics workshop "Big Medical Data in Precision Medicine: Challenges or Opportunities?" on Jan 19, 2016 in London.
In the rapidly evolving landscape of technologies, XML continues to play a vital role in structuring, storing, and transporting data across diverse systems. The recent advancements in artificial intelligence (AI) present new methodologies for enhancing XML development workflows, introducing efficiency, automation, and intelligent capabilities. This presentation will outline the scope and perspective of utilizing AI in XML development. The potential benefits and the possible pitfalls will be highlighted, providing a balanced view of the subject.
We will explore the capabilities of AI in understanding XML markup languages and autonomously creating structured XML content. Additionally, we will examine the capacity of AI to enrich plain text with appropriate XML markup. Practical examples and methodological guidelines will be provided to elucidate how AI can be effectively prompted to interpret and generate accurate XML markup.
Further emphasis will be placed on the role of AI in developing XSLT, or schemas such as XSD and Schematron. We will address the techniques and strategies adopted to create prompts for generating code, explaining code, or refactoring the code, and the results achieved.
The discussion will extend to how AI can be used to transform XML content. In particular, the focus will be on the use of AI XPath extension functions in XSLT, Schematron, Schematron Quick Fixes, or for XML content refactoring.
The presentation aims to deliver a comprehensive overview of AI usage in XML development, providing attendees with the necessary knowledge to make informed decisions. Whether you’re at the early stages of adopting AI or considering integrating it in advanced XML development, this presentation will cover all levels of expertise.
By highlighting the potential advantages and challenges of integrating AI with XML development tools and languages, the presentation seeks to inspire thoughtful conversation around the future of XML development. We’ll not only delve into the technical aspects of AI-powered XML development but also discuss practical implications and possible future directions.
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!SOFTTECHHUB
As the digital landscape continually evolves, operating systems play a critical role in shaping user experiences and productivity. The launch of Nitrux Linux 3.5.0 marks a significant milestone, offering a robust alternative to traditional systems such as Windows 11. This article delves into the essence of Nitrux Linux 3.5.0, exploring its unique features, advantages, and how it stands as a compelling choice for both casual users and tech enthusiasts.
GridMate - End to end testing is a critical piece to ensure quality and avoid...ThomasParaiso2
End to end testing is a critical piece to ensure quality and avoid regressions. In this session, we share our journey building an E2E testing pipeline for GridMate components (LWC and Aura) using Cypress, JSForce, FakerJS…
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...Neo4j
Leonard Jayamohan, Partner & Generative AI Lead, Deloitte
This keynote will reveal how Deloitte leverages Neo4j’s graph power for groundbreaking digital twin solutions, achieving a staggering 100x performance boost. Discover the essential role knowledge graphs play in successful generative AI implementations. Plus, get an exclusive look at an innovative Neo4j + Generative AI solution Deloitte is developing in-house.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024Neo4j
Neha Bajwa, Vice President of Product Marketing, Neo4j
Join us as we explore breakthrough innovations enabled by interconnected data and AI. Discover firsthand how organizations use relationships in data to uncover contextual insights and solve our most pressing challenges – from optimizing supply chains, detecting fraud, and improving customer experiences to accelerating drug discoveries.
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
Essentials of Automations: The Art of Triggers and Actions in FME
A Formal Model for Enabling RFID in Pharmaceutical Supply Chains
1. A Formal Model for Enabling RFIDin Pharmaceutical Supply Chains 44th Hawai’i Int’l Conference on System Sciences 4-7 Jan, 2011 – Koloa, Kauai, Hawaii Matthieu-P. Schapranow Hasso Plattner Institute
2. Agenda Key Facts about the Hasso Plattner Institute European Pharmaceutical Supply Chain Formal Model Quantitative Analysis of Service Provider Contributions HICSS11, Enabling RFID in Pharmaceutical Supply Chains, Schapranow, Jan 6, 2011 2
3. Key Facts about the Hasso Plattner InstituteInternals Founded as a public-private partnershipin 1998 in Potsdam near Berlin, Germany Institute belongs to theUniversity of Potsdam Ranked 1st in CHE 2009 and 2010 500 B.Sc. and M.Sc. students 10 professors, 92 PhD students Course of study: IT Systems Engineering HICSS11, Enabling RFID in Pharmaceutical Supply Chains, Schapranow, Jan 6, 2011 3
4. Key Facts about the Hasso Plattner Institute Research Group Hasso Plattner / Alexander Zeier Research focus: real customer data for enterprisesoftware and design of complex applications In-Memory Data Management for Enterprise Applications Human-Centered Software Design and Engineering Maintenance and Evolution of SOA Systems Integration of RFID Technology in Enterprise Platforms Cooperations Academic: Stanford, MIT, etc. Industry: SAP, Siemens, Audi, etc. HICSS11, Enabling RFID in Pharmaceutical Supply Chains, Schapranow, Jan 6, 2011 4
5. Key Facts about the Hasso Plattner InstituteWhat can we do for you? Network between industry and academia,e.g. European section of the Curriculum RFID seminars for graduate / undergraduate students Trends & concepts lecture (Prof. Hasso Plattner) Enterprise Application Architecture Laboratory Enterprise software, e.g. SAP, Microsoft, etc. Equipped RFID Lab, e.g. deister electronic, noFilis, etc. Concrete sizing and simulation of customer supply chains HICSS11, Enabling RFID in Pharmaceutical Supply Chains, Schapranow, Jan 6, 2011 5
6. European Pharma Supply ChainManufacturing HICSS11, Enabling RFID in Pharmaceutical Supply Chains, Schapranow, Jan 6, 2011 6
7. European Pharma Supply ChainCounterfeits HICSS11, Enabling RFID in Pharmaceutical Supply Chains, Schapranow, Jan 6, 2011 7
8. Formal ModelBusiness Entities Belongs-To Relationship: soft relationship between business entities b for identification purposes, e.g. bi Coupling/Decoupling: tight relationship,e.g. epci +authi= tagi Degree: Number of boxing operations k Handling Unit: possible degrees k=0: atomic business entity bi k=1: product package holding bi k=2: transport package, e.g. paper box k=3: re-usable transport package, e.g. pallet or skeleton k=4: transport container, e.g. for transportation on ships k=5: freight vehicle, e.g. ship HICSS11, Enabling RFID in Pharmaceutical Supply Chains, Schapranow, Jan 6, 2011 8
9. Formal ModelBusiness Entities (cont’d) Boxing/Unboxing: merge/splitset of items Events: virtual product history stored in EPCIS repositories HICSS11, Enabling RFID in Pharmaceutical Supply Chains, Schapranow, Jan 6, 2011 9
10. Formal ModelRoles (Europe) Main Roles [1] A: Manufacturer: ~2.2k B: Center of Distribution: ~50k E: Licensed Dealer: ~140k D: Service Provider forAnti-Counterfeiting Other Roles C: Logistics Provider F: End Consumer HICSS11, Enabling RFID in Pharmaceutical Supply Chains, Schapranow, Jan 6, 2011 10
11. Formal ModelRoles (Europe) Main Roles [1] A: Manufacturer: ~2.2k B: Center of Distribution: ~50k E: Licensed Dealer: ~140k D: Service Provider forAnti-Counterfeiting Other Roles C: Logistics Provider F: End Consumer HICSS11, Enabling RFID in Pharmaceutical Supply Chains, Schapranow, Jan 6, 2011 11
12. Quantitative Analysis of Service ProviderSupply Chain Configuration for U.S. 1 Pharmaceutical Manufacturer 1 Center of Distribution 3 Logistics Provider 2 Wholesale Distributors HICSS11, Enabling RFID in Pharmaceutical Supply Chains, Schapranow, Jan 6, 2011 12
13. Quantitative Analysis of Service ProviderData Flow for U.S. Pharma Supply Chain Retailer sends product check request to service provider(12 Byte EPC) Service provider contacts involved EPCIS repositories(12 Byte EPC) EPCIS repositories return event sets to service provider(728 Byte / 4 events in avg., i.e. 1x in, 2x observe, 1x out) Service provider(12 Byte EPC + 4 Byte authentication details) Protocol overhead IP: 20 Byte UDP: 8 Byte HICSS11, Enabling RFID in Pharmaceutical Supply Chains, Schapranow, Jan 6, 2011 13
14. Quantitative Analysis of Service ProviderNetwork Traffic Network traffic c, p pharmaceutical goods, supply chain length l For p=15 billion and l=7: c=234.92TB / 32,475USD per year[2] Costs are adequate and can be handled by supply chain roles [3] HICSS11, Enabling RFID in Pharmaceutical Supply Chains, Schapranow, Jan 6, 2011 14
15. Quantitative Analysis of Service ProviderSecurity Evaluation Manufacturer: prevent unrecognized EPC reading, e.g. by mutual authentication schemes [4] Center of distribution: on-tag security implementations, e.g. physically unclonable functions [5] or predefined passwords [6] Logistics provider: kill command [7], service providers for anti-counterfeiting Wholesale Distributors: tracking and tracing via reader gates End consumers: digital advice letter, service provider [8] HICSS11, Enabling RFID in Pharmaceutical Supply Chains, Schapranow, Jan 6, 2011 15
16. Our Contributions Developed a formal model for RFID-aided supply chains Validated in context of the pharmaceutical supply chain roles Introduced separate role “service provider for anti-counterfeiting” Performed a quantitative analysis for the service provider Monetary impact for concrete supply chain sizing evaluated Security evaluation per supply chain role HICSS11, Enabling RFID in Pharmaceutical Supply Chains, Schapranow, Jan 6, 2011 16
17. References [1] J. Müller, C. Pöpke, M. Urbat, A. Zeier, and H. Plattner, “A Simulation of the Pharmaceutical Supply Chain to Provide Realistic Test Data,” in Proceedings of the International Conference on Advances in System Simulation, 2009 [2] Assuming Amazon EC2 mean network traffic costs per GB approx. 0.135 USD [3] M.-P. Schapranow, M. Nagora, and A. Zeier, “CoMoSeR: Cost Model for Security-Enhanced RFID-Aided Supply Chains,” in Proceedings of the 18th International Conference on Software, Telecommunication and Computer Networks, 2010 [4] M.-P. Schapranow, A. Zeier, and H. Plattner, “A Dynamic Mutual RFID Authentication Model Preventing Unauthorized Third Party Access,” in Proceedings of the 4th International Conference on Network and System Security, 2010. [5] P. Tuyls and L. Batina, “RFID-Tags for Anti-Counterfeiting,” in Proceedings of the RSA Conference, 2006, pp. 115–131. [6] M.-P. Schapranow, J. Müller, S. Enderlein, M. Helmich, and A. Zeier, “Low-Cost Mutual RFID Authentication Model Using Predefined Password Lists,” in Proceedings of the 16th International Conference on Industrial Engineering and Engineering Management, 2009. [7] A. Mitrokotsa, M. R. Rieback, and A. S. Tanenbaum, “Classifi- cation of RFID Attacks,” in Proceedings of the 2nd International Workshop on RFID Technology, 2008, pp. 73–86. [8] M.-P. Schapranow, J. Müller, A. Zeier, and H. Plattner, “RFID Event Data Processing – An Architecture for Storing and Searching,” in Proceedings of the 4th International Workshop on RFID Technology - Concepts, Applications, Challenges, 2010. HICSS11, Enabling RFID in Pharmaceutical Supply Chains, Schapranow, Jan 6, 2011 17
18. Thank you for your interest!Keep in contact with us. Responsible: Deputy Prof. of Prof. Hasso PlattnerDr. Alexander Zeierzeier@hpi.uni-potsdam.de Matthieu-P. Schapranow, M.Sc. matthieu.schapranow@hpi.uni-potsdam.de Hasso Plattner InstituteEnterprise Platform & Integration ConceptsMatthieu-P. SchapranowAugust-Bebel-Str. 8814482 Potsdam, Germany HICSS11, Enabling RFID in Pharmaceutical Supply Chains, Schapranow, Jan 6, 2011 18