Factors in the Adoption of Third-Party B2B Portals in the Textile Industry
暂无分享,去创建一个
[1] Steven B. Lyman,et al. Supply chain management: a strategic perspective , 2002 .
[2] Robert E. Spekman,et al. An empirical investigation into supply chain management: a perspective on partnerships , 1998 .
[3] Gail-Joon Ahn,et al. Role-based access control on the web , 2001, TSEC.
[4] Sabrina De Capitani di Vimercati,et al. Maximizing Sharing of Protected Information , 2002, J. Comput. Syst. Sci..
[5] Ronald L. Rivest,et al. The blocker tag: selective blocking of RFID tags for consumer privacy , 2003, CCS '03.
[6] Stephen A. Weis. Security and Privacy in Radio-Frequency Identification Devices , 2003 .
[7] David Hillier,et al. Radio frequency identification in the UK: opportunities and challenges , 2004 .
[8] Chinho Lin,et al. A Knowledge Management Architecture in Collaborative Supply Chain , 2002, J. Comput. Inf. Syst..
[9] Yossi Aviv,et al. The Effect of Collaborative Forecasting on Supply Chain Performance , 2001, Manag. Sci..
[10] Chang Nian Zhang,et al. Designing secure e-commerce with role-based access control , 2003, EEE International Conference on E-Commerce, 2003. CEC 2003..
[11] John E. Anderson,et al. Security in the Information Systems Curriculum: Identification & Status of Relevant Issues , 2002, J. Comput. Inf. Syst..
[12] István Vajda,et al. Lightweight Authentication Protocols for Low-Cost RFID Tags , 2003 .
[13] R. Gaonkar,et al. Collaboration and information sharing in global contract manufacturing networks , 2001 .
[14] Karen A. Forcht,et al. Developing a Computer Security Policy for Organizational Use and Implementation , 2001, J. Comput. Inf. Syst..
[15] John R. Kros,et al. Assessing & Quantifying the Loss of Network Intrusion , 2005, J. Comput. Inf. Syst..
[16] Gail-Joon Ahn,et al. Role-based Access Control on the Web Using LDAP , 2001, DBSec.
[17] Vijayalakshmi Atluri,et al. Role-based Access Control , 1992 .
[18] Gail-Joon Ahn. Role-based access control in DCOM , 2000, J. Syst. Archit..
[19] Ronald L. Rivest,et al. Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems , 2003, SPC.
[20] Joni da Silva Fraga,et al. Role-based access control for CORBA distributed object systems , 2002, Proceedings of the Seventh IEEE International Workshop on Object-Oriented Real-Time Dependable Systems. (WORDS 2002).
[21] Keng Siau,et al. Gaining Competitive Advantages through a Functionality Grid for Website Evaluation , 2004, J. Comput. Inf. Syst..
[22] Bob D. Cutler,et al. Identifying antecedents of information exchange within supply chains , 2002 .
[23] Ralph O’Brien,et al. Privacy and security , 2016 .
[24] I. J. Petrick,et al. Technology choice and pooled investment among networks: supply chain roadmaps , 2002, IEEE International Engineering Management Conference.
[25] Julia H. Allen. The CERT Guide to System and Network Security Practices , 2001 .
[26] Denis Royston Towill,et al. Simplified material flow holds the key to supply chain integration , 2003 .
[27] Marshall L. Fisher,et al. Supply Chain Inventory Management and the Value of Shared Information , 2000 .
[28] Chris Clifton,et al. SECURITY AND PRIVACY IMPLICATIONS OF DATA MINING , 1996 .
[29] David C. Yen,et al. The New Spectrum of the Cross-Enterprise Solution: The Integration of Supply Chain Management and Enterprise Resources Planning Systems , 2000, J. Comput. Inf. Syst..
[30] Ari Juels,et al. Minimalist Cryptography for Low-Cost RFID Tags , 2004, SCN.
[31] H.L. Lee,et al. Aligning Supply Chain Strategies with Product Uncertainties , 2002, IEEE Engineering Management Review.
[32] Fu-Ren Lin,et al. Effects of information sharing on supply chain performance in electronic commerce , 2002, IEEE Trans. Engineering Management.
[33] J. Jayaram,et al. Supply Chain Management: A Strategic Perspective , 1997 .
[34] M. Warren,et al. Cyber attacks against supply chain management systems: A short note , 2000 .