Secure collaboration in global design and supply chain environment: Problem analysis and literature review
暂无分享,去创建一个
Yong Zeng | Lingyu Wang | Xiaoguang Deng | Xinlin Cao | Nafisa Khundker | Lingyu Wang | Yong Zeng | X. Deng | Nafisa Khundker | Xinlin Cao
[1] Josep Domingo-Ferrer,et al. Noise-Robust Watermarking for Numerical Datasets , 2005, MDAI.
[2] Catherine Roussey,et al. Technical documents classification , 2011, CSCWD.
[3] Klaus R. Dittrich,et al. An Approach for Building Secure Database Federations , 1994, VLDB.
[4] Manu Goyal,et al. Strategic Information Management Under Leakage in a Supply Chain , 2009, Manag. Sci..
[5] Lode Li. Information Sharing in a Supply Chain with Horizontal Competition , 2002, Manag. Sci..
[6] Mark S. Fox,et al. An ontology of trust: formal semantics and transitivity , 2006, ICEC '06.
[7] Hae-Chang Rim,et al. Some Effective Techniques for Naive Bayes Text Classification , 2006, IEEE Transactions on Knowledge and Data Engineering.
[8] Tao Yu,et al. The Research on Decision Model of Supply Chain Collaboration Management , 2008, 2008 4th International Conference on Wireless Communications, Networking and Mobile Computing.
[9] Ninghui Li,et al. Distributed Credential Chain Discovery in Trust Management , 2003, J. Comput. Secur..
[10] Clayton M. Christensen. The Innovator's Dilemma: When New Technologies Cause Great Firms to Fail , 2013 .
[11] Reinhilde Veugelers,et al. In Search of Complementarity in Innovation Strategy: Internal R&D and External Knowledge Acquisition , 2006, Manag. Sci..
[12] R E Miles,et al. Organizational strategy, structure, and process. , 1978, Academy of management review. Academy of Management.
[13] Pedro M. Domingos,et al. On the Optimality of the Simple Bayesian Classifier under Zero-One Loss , 1997, Machine Learning.
[14] Yingjiu Li,et al. SecTTS: A secure track & trace system for RFID-enabled supply chains , 2012, Comput. Ind..
[15] James H. Cross,et al. Reverse engineering and design recovery: a taxonomy , 1990, IEEE Software.
[16] Chen Ming,et al. A Shared Multi-Media Design Environment for Concurrent Engineering over the Internet , 2001, Concurr. Eng. Res. Appl..
[17] Rudy Setiono,et al. A comparative study of centroid-based, neighborhood-based and statistical approaches for effective document categorization , 2002, Object recognition supported by user interaction for service robots.
[18] Thomas J. Watson,et al. An empirical study of the naive Bayes classifier , 2001 .
[19] Wenliang Du,et al. Secure multi-party computation problems and their applications: a review and open problems , 2001, NSPW '01.
[20] Tao Zhang,et al. Hardware assisted control flow obfuscation for embedded processors , 2004, CASES '04.
[21] Hong Peng,et al. Document Classification Based on Support Vector Machine Using a Concept Vector Model , 2006, 2006 IEEE/WIC/ACM International Conference on Web Intelligence (WI 2006 Main Conference Proceedings)(WI'06).
[22] Wei Liu,et al. Formalization of design chain management using environment-based design (EBD) theory , 2013, J. Intell. Manuf..
[23] Kyoung-Yun Kim,et al. Ontology-based assembly design and information sharing for collaborative product development , 2006, Comput. Aided Des..
[24] M. Christopher,et al. The impact of product design on supply chain risk: A case study , 2008 .
[25] Younghwan Choi,et al. A design chain collaboration framework using reference models , 2005 .
[26] Andrew McCallum,et al. A comparison of event models for naive bayes text classification , 1998, AAAI 1998.
[27] Kyle J. Mayer,et al. Designing Effective Contracts: Exploring the Influence of Framing and Expectations , 2011 .
[28] Sholom M. Weiss,et al. Towards language independent automated learning of text categorization models , 1994, SIGIR '94.
[29] Vincent Tam,et al. A Comparative Study of Centroid-Based, Neighborhood-Based and Statistical Approaches for Effective Document Categorization , 2002, ICPR.
[30] Xiaodong Lin,et al. Privacy preserving regression modelling via distributed computation , 2004, KDD.
[31] Khairullah Khan,et al. A Review of Machine Learning Algorithms for Text-Documents Classification , 2010 .
[32] Ortwin Renn,et al. A New Approach to Risk Evaluation and Management: Risk‐Based, Precaution‐Based, and Discourse‐Based Strategies 1 , 2002, Risk analysis : an official publication of the Society for Risk Analysis.
[33] Ninghui Li,et al. Distributed credential chain discovery in trust management: extended abstract , 2001, CCS '01.
[34] Reinhilde Veugelers,et al. Complementarity in the Innovation Strategy: Internal R&D, External Technology Acquisition, and Cooperation in R&D , 2002 .
[35] Nasir D. Memon,et al. Preventing Piracy, Reverse Engineering, and Tampering , 2003, Computer.
[36] Frans Coenen,et al. Text classification using graph mining-based feature extraction , 2010 .
[37] Janez Kopac,et al. RE (reverse engineering) as necessary phase by rapid product development , 2006 .
[38] Yuh-Min Chen,et al. Developing a trust evaluation method between co-workers in virtual project team for enabling resource sharing and collaboration , 2008, Comput. Ind..
[39] M. Christopher,et al. Supply chain risk management: outlining an agenda for future research , 2003 .
[40] Germaine H. Saad,et al. Managing Disruption Risks in Supply Chains , 2005 .
[41] D. Neiger,et al. Supply chain risk identification with value-focused process engineering , 2009 .
[42] Christian S. Collberg,et al. Watermarking, Tamper-Proofing, and Obfuscation-Tools for Software Protection , 2002, IEEE Trans. Software Eng..
[44] Chris Clifton,et al. Privacy-preserving distributed mining of association rules on horizontally partitioned data , 2004, IEEE Transactions on Knowledge and Data Engineering.
[45] Henry Tirri,et al. Bayesian case-based reasoning with neural networks , 1993, IEEE International Conference on Neural Networks.
[46] Vladimir N. Vapnik,et al. The Nature of Statistical Learning Theory , 2000, Statistics for Engineering and Information Science.
[47] Gina Colarelli O'Connor,et al. Major Innovation as a Dynamic Capability: A Systems Approach* , 2008 .
[48] Yong Zeng,et al. ENVIRONMENT-BASED DESIGN (EBD) , 2011 .
[49] Mark Strom,et al. Model of Co-Development Emerges , 2002 .
[50] Xianyi Zeng,et al. Intelligent decision support tools for multicriteria product design , 2010, 2010 IEEE International Conference on Systems, Man and Cybernetics.
[51] Anna Sankowska,et al. Trust management in virtual work environments : a human factors perspective , 2008 .
[52] John C. Stutz,et al. Classification of Aeronautics System Health and Safety Documents , 2009, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).
[53] Ian Vince McLoughlin. Secure Embedded Systems: The Threat of Reverse Engineering , 2008, 2008 14th IEEE International Conference on Parallel and Distributed Systems.
[54] Williams Sh. Collaborative planning, forecasting, and replenishment. , 1999 .
[55] Daniel Markovits,et al. Contract and Collaboration , 2004 .
[56] L. Toledo-Pereyra. Trust , 2006, Mediation Behaviour.
[57] Elisa Bertino,et al. Secure knowledge management: confidentiality, trust, and privacy , 2006, IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans.
[58] Lea Kutvonen,et al. Trust Management Survey , 2005, iTrust.
[59] James D. Thompson. Organizations in Action: Social Science Bases of Administrative Theory , 1967 .
[60] Hongtao Li,et al. Modeling and evaluating information leakage caused by inferences in supply chains , 2011, Comput. Ind..
[61] M. Attaran. RFID: an enabler of supply chain operations , 2007 .
[62] J. J. Rocchio,et al. Relevance feedback in information retrieval , 1971 .
[63] Philip R. Zimmermann,et al. The official PGP user's guide , 1996 .
[64] R. Handfield,et al. Knowledge Sharing in Interorganizational Product Development Teams: The Effect of Formal and Informal Socialization Mechanisms* , 2009 .
[65] Yong Zeng,et al. Design Conflict: Conceptual Structure and Mathematical Representation , 2011, Trans. SDPS.
[66] Hokey Min,et al. Collaborative Planning, Forecasting and Replenishment: Demand Planning in Suppply Chain Management , 2007, ICEB.
[67] B. Hillebrand,et al. Trust, Contract and Relationship Development , 2005 .
[68] J. R. Carter,et al. An analysis of supply risk assessment techniques , 2004 .
[69] Gregory M. Magnan,et al. A Three-Stage Implementation Model for Supply Chain Collaboration , 2008 .
[70] Stephen E. Robertson,et al. Understanding inverse document frequency: on theoretical arguments for IDF , 2004, J. Documentation.
[71] Hyunseung Choo,et al. Multi-Level modeling and access control for data sharing in collaborative design , 2006, Adv. Eng. Informatics.
[72] W. B. Lee,et al. A security model for distributed product data management system , 2003, Comput. Ind..
[73] Yehuda Lindell,et al. Privacy Preserving Data Mining , 2002, Journal of Cryptology.
[74] D RyallMichael,et al. Formal Contracts in the Presence of Relational Enforcement Mechanisms , 2009 .
[75] Albert Y. Ha,et al. Contracting and Information Sharing Under Supply Chain Competition , 2008, Manag. Sci..
[76] Yunghsiang Sam Han,et al. Privacy-Preserving Multivariate Statistical Analysis: Linear Regression and Classification , 2004, SDM.
[77] Soo Beng Khoh,et al. Deploying design for Six Sigma™ in new product development , 2008, 2008 4th IEEE International Conference on Management of Innovation and Technology.
[78] Jens H. Weber,et al. Privacy Preserving Decision Tree Learning Using Unrealized Data Sets , 2012, IEEE Transactions on Knowledge and Data Engineering.
[79] Adrian Bilski,et al. A Review of Artificial Intelligence Algorithms in Document Classification , 2011 .
[80] Bo Yu,et al. Latent semantic analysis for text categorization using neural network , 2008, Knowl. Based Syst..
[81] Jayant R. Haritsa,et al. Maintaining Data Privacy in Association Rule Mining , 2002, VLDB.
[82] Sushil Jajodia,et al. Subject Switching Algorithms for Access Control in Federated Databases , 2001, DBSec.
[83] Yong Zeng,et al. Recursive object model (ROM) - Modelling of linguistic information in engineering design , 2008, Comput. Ind..
[84] Yong Zeng,et al. Mitigating the risk of information leakage in a two-level supply chain through optimal supplier selection , 2011, Journal of Intelligent Manufacturing.
[85] Yolanda Gil,et al. A survey of trust in computer science and the Semantic Web , 2007, J. Web Semant..
[86] Yoke San Wong,et al. Collaborative computer-aided design - research and development status , 2005, Comput. Aided Des..
[87] Weidong Li,et al. Collaborative Computer-Aided Design - Research and Development Status , 2004 .
[88] Hau L. Lee,et al. Mitigating supply chain risk through improved confidence , 2004 .
[89] Yong Zeng,et al. Axiomatic Theory of Design Modeling , 2002, Trans. SDPS.
[90] Philip S. Yu,et al. Privacy-preserving data publishing: A survey of recent developments , 2010, CSUR.
[91] S H Williams. Collaborative planning, forecasting, and replenishment. , 1999, Hospital materiel management quarterly.
[92] Ian T. Foster,et al. Security for Grid services , 2003, High Performance Distributed Computing, 2003. Proceedings. 12th IEEE International Symposium on.
[93] Jie Ji,et al. Clustering Large Sparse Text Data: A Comparative Advantage Approach , 2010, J. Inf. Process..
[94] Uta Jüttner. Supply chain risk management: Understanding the business requirements from a practitioner perspective , 2005 .
[95] Ram D. Sriram,et al. An object-oriented representation for product and design processes , 1998, Comput. Aided Des..
[96] Weiming Shen,et al. Collaborative conceptual design - state of the art and future trends , 2002, Comput. Aided Des..
[97] Yong Zeng,et al. Environment-Based formulation of Design Problem , 2004, Trans. SDPS.
[98] Jordi Forné,et al. Private location-based information retrieval through user collaboration , 2010, Comput. Commun..
[99] Hongtao Zhang. VERTICAL INFORMATION EXCHANGE IN A SUPPLY CHAIN WITH DUOPOLY RETAILERS , 2002 .
[100] Weiming Shen,et al. Computer supported collaborative design: Retrospective and perspective , 2008, Comput. Ind..
[101] Wei Liu,et al. Conceptual Modeling of Design Chain Management towards Product Lifecycle Management , 2009 .
[102] Agusti Solanas,et al. A TTP-free protocol for location privacy in location-based services , 2008, Comput. Commun..
[103] Michael D. Ryall,et al. Formal Contracts in the Presence of Relational Enforcement Mechanisms: Evidence from Technology Development Projects , 2009, Manag. Sci..
[104] Hui-Ming Wee,et al. A distributed change control workflow for collaborative design network , 2008, Comput. Ind..
[105] Amydee M. Fawcett,et al. Supply chain trust: The catalyst for collaborative innovation , 2012 .
[106] Mark S. Fox,et al. Proceedings of the 8th international conference on Electronic commerce: The new e-commerce: innovations for conquering current barriers, obstacles and limitations to conducting successful business on the internet , 2006 .
[107] Cheryl T. Druehl,et al. When Is a Disruptive Innovation Disruptive , 2008 .
[108] Zhu Zhen-fang,et al. Research of Text Classification Technology based on Genetic Annealing Algorithm , 2008, 2008 International Symposium on Computational Intelligence and Design.
[109] Ahmed Al-Ashaab,et al. Knowledge web-based system architecture for collaborative product development , 2005, Comput. Ind..
[110] Radmila Juric,et al. Semantic Support for Dynamic Changes in Enterprise Business Models , 2010, Trans. SDPS.
[111] Heloisa A. Camargo,et al. On the use of fuzzy rules to text document classification , 2010, 2010 10th International Conference on Hybrid Intelligent Systems.
[112] JungHyun Han,et al. Hierarchical Role-Based Viewing for Multilevel Information Security in Collaborative CAD , 2006, J. Comput. Inf. Sci. Eng..
[113] James D. Thompson. Organizations in Action , 1967 .
[114] Nabil R. Adam,et al. Security-control methods for statistical databases: a comparative study , 1989, ACM Comput. Surv..
[115] Wen-Chieh Chuang,et al. Design Chain Collaboration - A Strategic View , 2004, Int. J. Electron. Bus. Manag..
[116] E. Moradi,et al. Quantitative Models in Supply Chain Management , 2012 .
[117] Sang-Bum Kim,et al. Effective Methods for Improving Naive Bayes Text Classifiers , 2002, PRICAI.
[118] Richard A. Harshman,et al. Indexing by Latent Semantic Analysis , 1990, J. Am. Soc. Inf. Sci..
[119] Sholom M. Weiss,et al. Automated learning of decision rules for text categorization , 1994, TOIS.
[120] James D. Herbsleb,et al. A Fine-grain Measure of Coordination: Implications for the Design of Collaboration and Awareness Tools , 2006 .
[121] Hicham G. Elmongui,et al. Secure supply-chain protocols , 2003, EEE International Conference on E-Commerce, 2003. CEC 2003..
[122] Tzi-cker Chiueh,et al. Enforcing Mandatory Access Control in Commodity OS to Disable Malware , 2012, IEEE Transactions on Dependable and Secure Computing.
[123] E. Munoko,et al. Computers in Industry , 1963, Nature.
[124] Todd J. Arnold,et al. The effects of customer acquisition and retention orientations on a firm’s radical and incremental innovation performance , 2011 .
[125] Thorsten Joachims,et al. Text Categorization with Support Vector Machines: Learning with Many Relevant Features , 1998, ECML.
[126] David M. Nicol,et al. A Formal-Semantics-Based Calculus of Trust , 2010, IEEE Internet Computing.
[127] Chris Clifton,et al. Tools for privacy preserving distributed data mining , 2002, SKDD.
[128] Chun Wang,et al. Adsche: Design of an Auction-Based Framework for Decentralized Scheduling , 2011, Trans. SDPS.
[129] A. Yao,et al. Fair exchange with a semi-trusted third party (extended abstract) , 1997, CCS '97.
[130] Hau L. Lee,et al. Information sharing in a supply chain , 2000, Int. J. Manuf. Technol. Manag..
[131] Gerard Salton,et al. Term-Weighting Approaches in Automatic Text Retrieval , 1988, Inf. Process. Manag..
[132] Padmini Srinivasan,et al. Automatic Text Categorization Using Neural Networks , 1997 .
[133] R. Margerum. Collaborative Planning , 2002 .
[134] Kevin McCormack,et al. Analysing risks in supply networks to facilitate outsourcing decisions , 2010 .
[135] Namchul Do,et al. An object-oriented conceptual model of a collaborative product development management (CPDM) system , 2006 .
[136] Gu Si-yang,et al. Privacy preserving association rule mining in vertically partitioned data , 2006 .
[137] P ShethAmit,et al. Federated database systems for managing distributed, heterogeneous, and autonomous databases , 1990 .
[138] José Carlos Brustoloni,et al. Intellectual Property Protection in Collaborative Design through Lean Information Modeling and Sharing , 2006, J. Comput. Inf. Sci. Eng..
[139] D. Malhotra,et al. The Effects of Contracts on Interpersonal Trust , 2002 .