Data Protection in Collaborative Business Applications

Data Protection in Collaborative Business Applications

Florian Kerschbaum
Copyright: © 2010 |Pages: 30
ISBN13: 9781605664149|ISBN10: 1605664146|ISBN13 Softcover: 9781616922191|EISBN13: 9781605664156
DOI: 10.4018/978-1-60566-414-9.ch005
Cite Chapter Cite Chapter

MLA

Kerschbaum, Florian. "Data Protection in Collaborative Business Applications." Collaborative Computer Security and Trust Management, edited by Jean-Marc Seigneur and Adam Slagell, IGI Global, 2010, pp. 81-110. https://doi.org/10.4018/978-1-60566-414-9.ch005

APA

Kerschbaum, F. (2010). Data Protection in Collaborative Business Applications. In J. Seigneur & A. Slagell (Eds.), Collaborative Computer Security and Trust Management (pp. 81-110). IGI Global. https://doi.org/10.4018/978-1-60566-414-9.ch005

Chicago

Kerschbaum, Florian. "Data Protection in Collaborative Business Applications." In Collaborative Computer Security and Trust Management, edited by Jean-Marc Seigneur and Adam Slagell, 81-110. Hershey, PA: IGI Global, 2010. https://doi.org/10.4018/978-1-60566-414-9.ch005

Export Reference

Mendeley
Favorite

Abstract

Collaborative business applications are an active field of research and an emerging practice in industry. This chapter will focus on data protection in b2b applications which offer a wide range of business models and architecture, since often equal partners are involved in the transactions. It will present three distinct applications, their business models, security requirements and the newest solutions for solving these problems. The three applications are collaborative benchmarking, fraud detection and supply chain management. Many of these applications will not be realized if no appropriate measure for protecting the collaborating parties’ data are taken. This chapter focuses on the strongest form of data protection. The business secrets are kept entirely secret from other parties (or at least to the degree possible). This also corresponds to the strongest form of privacy protection in many instances. The private information does not leave the producing system, (i.e., data protection), such that the information producer remains its sole owner. In case of B2B application, the sensitive data are usually business secrets, and not personally identifiable data as in privacy protection.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.