Federated Data Sharing Models for Privacy-Preserving Collaboration and Interoperability in Distributed Supply Chain Ecosystems
Keywords:
Federated Learning, Federated Data Sharing, Supply Chain, Privacy-Preserving, Secure Multi-Party Computation, Differential Privacy, Interoperability, Data Governance, Decentralized SystemsSynopsis
References
(1) Yao, A. C. (1986). How to Generate and Exchange Secrets. Proceedings of the 27th IEEE Symposium on Foundations of Computer Science (FOCS), 162-167.
(2) Gundaboina, A. (2024). DevSecOps in Healthcare: Building Secure and Compliant Patient Engagement Applications. Journal of Artificial Intelligence, Machine Learning & Data Science, 2(4), 3052–3059. https://doi.org/10.51219/JAIMLD/anjan-gundaboina/62
(3) Goldreich, O. (2004). Foundations of Cryptography, Vol. 2: Basic Applications. Cambridge University Press.
(4) Gundaboina, A. (2024). Automated patch management for endpoints: Ensuring compliance in healthcare and education sectors. International Journal of Computer Science and Information Technology Research, 5(2), 114–134. https://doi.org/10.63530/IJCSITR_2024_05_02_010
(5) Ben-Or, M., Goldwasser, S., & Wigderson, A. (1988). Completeness Theorems for Non-Cryptographic Fault-Tolerant Distributed Computation. Proceedings of STOC, 1-10.
(6) Uppuluri, V. (2024). Real-Time Monitoring of Patient Adherence Using AI. Frontiers in Computer Science and Artificial Intelligence, 3(1), 59–68. https://doi.org/10.32996/fcsai.2024.3.1.7
(7) Dwork, C. (2006). Differential Privacy. Proceedings of the 33rd International Colloquium on Automata, Languages and Programming (ICALP 2006), 1-12.
(8) Bonawitz, K., et al. (2017). (included for continuity) Practical Secure Aggregation for Privacy-Preserving Machine Learning. ACM CCS 2017
(9) Shokri, R., & Shmatikov, V. (2015). (bridge reference) Privacy-Preserving Deep Learning. ACM CCS 2015.
(10) Kargupta, H., Datta, S., Wang, Q., & Sivakumar, K. (2005). On the Privacy Preserving Properties of Random Data Perturbation Techniques. Proceedings of ICDM 2005, 99-106.
(11) Potla, R.B. (2023). Supplier Collaboration Portals for Component Manufacturers: Procure-to-Pay Automation and Working-Capital Outcomes. International Journal of Artificial Intelligence (ISCSITR-IJAI), 4(1), 16–40. https://doi.org/10.63397/ISCSITR-IJAI_04_01_002
(12) Kargupta, H., & Park, B. H. (2004). A Fourier Spectrum-Based Approach to Random Projection for Privacy Preserving Distributed Data Mining. Proceedings of SIAM International Conference on Data Mining (SDM 2004).
(13) Clifton, C., Kantarcioglu, M., Vaidya, J., Lin, X., & Zhu, M. (2002). Tools for Privacy Preserving Distributed Data Mining. SIGKDD Explorations, 4(2), 28-34.
(14) Vallemoni, R. Canonical Payment Data Models for Merchant Acquiring: Merchants, Terminals, Transactions, Fees, and Chargebacks. Int. J. Comput. Sci. Eng. (ISCSITR-IJCSE) 3(1), 42–66 (2022). https://doi.org/10.63397/ISCSITR-IJCSE_03_01_006
(15) Golle, P. (2006). Machine Learning Attacks Against the Differentially Private Mechanism. Proceedings of PET 2006.
Published
Series
Categories
License

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.