Mitigating the risk of information leakage in a two-level supply chain through optimal supplier selection
暂无分享,去创建一个
[1] Silvio Micali,et al. How to play ANY mental game , 1987, STOC.
[2] Seng-Phil Hong,et al. Access control in collaborative systems , 2005, CSUR.
[3] JungHyun Han,et al. Hierarchical Role-Based Viewing for Multilevel Information Security in Collaborative CAD , 2006, J. Comput. Inf. Sci. Eng..
[4] P. Trott,et al. Outsourcing, information leakage and the risk of losing technology based competencies , 2006 .
[5] Lode Li. Information Sharing in a Supply Chain with Horizontal Competition , 2002, Manag. Sci..
[6] Shi-Jie Chen,et al. A systematic approach for supply chain improvement using design structure matrix , 2007, J. Intell. Manuf..
[7] Li Chen,et al. Internet-enabled real-time collaborative assembly modeling via an e-Assembly system: status and promise , 2004, Comput. Aided Des..
[8] George Q. Huang,et al. The impacts of sharing production information on supply chain dynamics: A review of the literature , 2003 .
[9] Thomas L. Saaty,et al. Fundamentals of the analytic network process — multiple networks with benefits, costs, opportunities and risks , 2004 .
[10] Samuel H. Huang,et al. Comprehensive and configurable metrics for supplier selection , 2007 .
[11] A. Yao,et al. Fair exchange with a semi-trusted third party (extended abstract) , 1997, CCS '97.
[12] Cemalettin Kubat,et al. A hybrid intelligent approach for supply chain management system , 2012, J. Intell. Manuf..
[13] Soonhung Han,et al. Protection of intellectual property based on a skeleton model in product design collaboration , 2009, Comput. Aided Des..
[14] Yuh-Min Chen,et al. Developing a trust evaluation method between co-workers in virtual project team for enabling resource sharing and collaboration , 2008, Comput. Ind..
[15] Göran Svensson,et al. A conceptual framework for the analysis of vulnerability in supply chains , 2000 .
[16] Uta Jüttner. Supply chain risk management: Understanding the business requirements from a practitioner perspective , 2005 .
[17] Wei Liu,et al. Formalization of design chain management using environment-based design (EBD) theory , 2013, J. Intell. Manuf..
[18] JungHyun Han,et al. Role-based viewing envelopes for information protection in collaborative modeling , 2004, Comput. Aided Des..
[19] Yan Wang,et al. Design formalism for collaborative assembly design , 2004, Comput. Aided Des..
[20] Manu Goyal,et al. Strategic Information Management Under Leakage in a Supply Chain , 2009, Manag. Sci..
[21] Gary W. Dickson,et al. AN ANALYSIS OF VENDOR SELECTION SYSTEMS AND DECISIONS , 1966 .
[22] Hau L. Lee,et al. Information sharing in a supply chain , 2000, Int. J. Manuf. Technol. Manag..
[23] Hongtao Li,et al. Modeling and evaluating information leakage caused by inferences in supply chains , 2011, Comput. Ind..
[24] Yehuda Lindell,et al. Privacy Preserving Data Mining , 2000, Journal of Cryptology.
[25] PAMELA MCCAULEY-BELL. Intelligent agent characterization and uncertainty management with fuzzy set theory: a tool to support early supplier integration , 1999 .
[26] C. Kahraman,et al. Multi‐criteria supplier selection using fuzzy AHP , 2003 .
[27] Rajit Gadh,et al. Collaborative virtual prototyping of product assemblies over the Internet , 2002, Comput. Aided Des..
[28] José Carlos Brustoloni,et al. Intellectual Property Protection in Collaborative Design through Lean Information Modeling and Sharing , 2006, J. Comput. Inf. Sci. Eng..
[29] Naixue Xiong,et al. Intelligent model design of cluster supply chain with horizontal cooperation , 2012, J. Intell. Manuf..
[30] M. Christopher,et al. Supply chain risk management: outlining an agenda for future research , 2003 .
[31] D. Neiger,et al. Supply chain risk identification with value-focused process engineering , 2009 .
[32] Andrew Chi-Chih Yao,et al. How to generate and exchange secrets , 1986, 27th Annual Symposium on Foundations of Computer Science (sfcs 1986).
[33] L. D. Boer,et al. A review of methods supporting supplier selection , 2001 .
[34] G. Zsidisin,et al. Managing Supply Risk with Early Supplier Involvement: A Case Study and Research Propositions , 2005 .
[35] Yong Zeng,et al. A science-based approach to product design theory Part II: formulation of design requirements and products , 1999 .
[36] Kevin McCormack,et al. Analysing risks in supply networks to facilitate outsourcing decisions , 2010 .
[37] Hicham G. Elmongui,et al. Secure supply-chain protocols , 2003, EEE International Conference on E-Commerce, 2003. CEC 2003..
[38] René V. Mayorga,et al. Supply chain management: a modular Fuzzy Inference System approach in supplier selection for new product development , 2008, J. Intell. Manuf..
[39] R. Eltantawy,et al. Securing the upstream supply chain: a risk management approach , 2004 .
[40] Martin W. P. Savelsbergh,et al. Branch-and-Price: Column Generation for Solving Huge Integer Programs , 1998, Oper. Res..
[41] Najla Aissaoui,et al. Supplier selection and order lot sizing modeling: A review , 2007, Comput. Oper. Res..
[42] Ozden Ustun,et al. Analytic network process and multi-period goal programming integration in purchasing decisions , 2009, Comput. Ind. Eng..
[43] Hongtao Zhang. VERTICAL INFORMATION EXCHANGE IN A SUPPLY CHAIN WITH DUOPOLY RETAILERS , 2002 .
[44] Hyunseung Choo,et al. Multi-Level modeling and access control for data sharing in collaborative design , 2006, Adv. Eng. Informatics.
[45] W. B. Lee,et al. A security model for distributed product data management system , 2003, Comput. Ind..
[46] J. R. Carter,et al. An analysis of supply risk assessment techniques , 2004 .
[47] Hau L. Lee,et al. Mitigating supply chain risk through improved confidence , 2004 .
[48] G. Svensson. A conceptual framework of vulnerability in firms’ inbound and outbound logistics flows , 2002 .
[49] Ezgi Aktar Demirtaş,et al. An integrated multiobjective decision making process for supplier selection and order allocation , 2008 .
[50] Ravi S. Sandhu,et al. RBAC Standard Rationale: Comments on "A Critique of the ANSI Standard on Role-Based Access Control" , 2007, IEEE Security & Privacy.
[51] Amy Hsin-I Lee,et al. A fuzzy supplier selection model with the consideration of benefits, opportunities, costs and risks , 2009, Expert Syst. Appl..
[52] Ravi S. Sandhu,et al. Role-Based Access Control Models , 1996, Computer.
[53] M. Christopher,et al. The impact of product design on supply chain risk: A case study , 2008 .