TY - JOUR
T1 - Incorporating security considerations into optimal product architecture and component sharing decision in product family design
AU - Rojas Arciniegas, Alvaro J.
AU - Kim, Harrison M.
N1 - Funding Information:
This material is based upon work supported by the National Science Foundation under CMMI 0726934. Any opinions, findings, conclusions or recommendations are those of the author(s) and do not necessarily reflect the views of the National Science Foundation.
PY - 2012/1/1
Y1 - 2012/1/1
N2 - Selecting the appropriate components to share in product family design is not a trivial decision; especially when a firm wants to protect the most sensitive information contained in their products from being exposed to users, third-party manufacturers, or undesirable agents. This article proposes tools to help designers identify sets of components containing sensitive information, as well as components that are candidates for sharing amongst the family. It also finds the most desirable component arrangement in each product that facilitates sharing while protecting the sensitive information that has been previously identified. The proposed framework is applied to three printers in which the architecture used for the ink cartridges and printheads are significantly different. Third-party manufacturers and remanufacturers offer their own alternatives for these subsystems (ink cartridges and printheads) since the customer for printer supplies is always looking for a cheaper alternative; meanwhile, the original equipment manufacturers attempt to secure their products and retain their customers with original supplies. The functional description of the system is analysed to identify the sensitive components for each printer; then, the optimal clustering strategy is found, as well as the set of components that are candidates for sharing, according to their connectivity and the security considerations.
AB - Selecting the appropriate components to share in product family design is not a trivial decision; especially when a firm wants to protect the most sensitive information contained in their products from being exposed to users, third-party manufacturers, or undesirable agents. This article proposes tools to help designers identify sets of components containing sensitive information, as well as components that are candidates for sharing amongst the family. It also finds the most desirable component arrangement in each product that facilitates sharing while protecting the sensitive information that has been previously identified. The proposed framework is applied to three printers in which the architecture used for the ink cartridges and printheads are significantly different. Third-party manufacturers and remanufacturers offer their own alternatives for these subsystems (ink cartridges and printheads) since the customer for printer supplies is always looking for a cheaper alternative; meanwhile, the original equipment manufacturers attempt to secure their products and retain their customers with original supplies. The functional description of the system is analysed to identify the sensitive components for each printer; then, the optimal clustering strategy is found, as well as the set of components that are candidates for sharing, according to their connectivity and the security considerations.
KW - component sharing
KW - information hiding
KW - product architecture
KW - product family design
KW - product security
UR - http://www.scopus.com/inward/record.url?scp=84863115652&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84863115652&partnerID=8YFLogxK
U2 - 10.1080/0305215X.2011.561842
DO - 10.1080/0305215X.2011.561842
M3 - Article
AN - SCOPUS:84863115652
SN - 0305-215X
VL - 44
SP - 55
EP - 74
JO - Engineering Optimization
JF - Engineering Optimization
IS - 1
ER -