-
1
-
-
84876622626
-
High performance enabled through radio frequency identification-accenture research on maufacturer perspectives
-
April accessed August 16, 2004
-
Accenture Report. "High Performance Enabled Through Radio Frequency Identification-Accenture Research on Maufacturer Perspectives," April 2004. http://www.accenture.com/xdoc/en/services/rfid/insights/rfid_ionsights_epc.pdf, accessed August 16, 2004.
-
(2004)
Accenture Report
-
-
-
2
-
-
0034324379
-
Role-based access control in DCOM
-
November Elsevier Science
-
Ahn, G.J. "Role-based Access Control in DCOM," Journal of Systems Architecture, 46:13, November 2000, Elsevier Science.
-
(2000)
Journal of Systems Architecture
, vol.46
, Issue.13
-
-
Ahn, G.J.1
-
4
-
-
0035995871
-
Security in the information systems curriculum - Identification & status of relevant issues
-
Anderson, J. and P. Schwager. "Security in the Information Systems Curriculum - Identification & Status of Relevant Issues," Journal of Computer Information Systems, 42:3, 2002, pp. 16-24.
-
(2002)
Journal of Computer Information Systems
, vol.42
, Issue.3
, pp. 16-24
-
-
Anderson, J.1
Schwager, P.2
-
5
-
-
33747491817
-
Who's driving the RFID market?
-
October
-
APICS. "Who's Driving the RFID Market?" Performance Advantage, October 2003, p. 10.
-
(2003)
Performance Advantage
, pp. 10
-
-
-
6
-
-
77954694081
-
Secure supply-chain protocols
-
June 24-27, Newport Beach, California, USA
-
Atallah, M.J., H.G. Elmongui, V. Deshpande, and L.B. Schwartz. "Secure Supply-Chain Protocols," Proceedings of the IEEE International Conference on E-commerce, June 24-27, 2003, Newport Beach, California, USA.
-
(2003)
Proceedings of the IEEE International Conference on E-commerce
-
-
Atallah, M.J.1
Elmongui, H.G.2
Deshpande, V.3
Schwartz, L.B.4
-
7
-
-
0035494018
-
The effect of collaborative forecasting on supply chain performance
-
Aviv, Y. "The Effect of Collaborative Forecasting on Supply Chain Performance," Management Science, 47:20, 2001, pp. 1326-1343.
-
(2001)
Management Science
, vol.47
, Issue.20
, pp. 1326-1343
-
-
Aviv, Y.1
-
8
-
-
0034249441
-
Supply chain inventory management and the value of shared information
-
Cachon, G.P. and M. Fisher. "Supply Chain Inventory Management and the Value of Shared Information," Management Science, 46:8, 2000, pp. 1032-1048.
-
(2000)
Management Science
, vol.46
, Issue.8
, pp. 1032-1048
-
-
Cachon, G.P.1
Fisher, M.2
-
9
-
-
84876647414
-
-
CNet Asia, May 22, accessed August 2004
-
Chai, W. "Euro Notes May be Radio Tagged," CNet Asia, May 22, 2003. http://news.zdnet.co.uk/business/0,39020645,2135074,00.htm, accessed August 2004.
-
(2003)
Euro Notes May Be Radio Tagged
-
-
Chai, W.1
-
13
-
-
0037308577
-
Simplified material flow holds the key to supply chain integration
-
Childhouse, P. and D.R. Towill. "Simplified Material Flow Holds the Key to Supply Chain Integration," International Journal of Management Science, 31:1, 2003, pp. 17-27.
-
(2003)
International Journal of Management Science
, vol.31
, Issue.1
, pp. 17-27
-
-
Childhouse, P.1
Towill, D.R.2
-
14
-
-
0003504808
-
Security and privacy implications of data mining
-
Montreal, Canada. accessed August 2004
-
Clifton, C. and D. Marks. "Security and Privacy Implications of Data Mining," ACM SIGMOD Workshop on Data Mining and Knowledge Discovery, Montreal, Canada. http://www.cs.purdue.edu/homes/clifton/document/dmkd.pdf., accessed August 2004.
-
ACM SIGMOD Workshop on Data Mining and Knowledge Discovery
-
-
Clifton, C.1
Marks, D.2
-
15
-
-
3042717763
-
Maximizing sharing of protected information
-
Dawson, S., S. VImercati, P. Lincoln, and P. Samarati. "Maximizing Sharing of Protected Information," Journal of Computer and System Sciences, 64, 2002, pp. 496-541.
-
(2002)
Journal of Computer and System Sciences
, vol.64
, pp. 496-541
-
-
Dawson, S.1
Vimercati, S.2
Lincoln, P.3
Samarati, P.4
-
16
-
-
33745586603
-
IT execs prepare for an RFID revolution
-
June 29, accessed August 2004
-
Emery, G.R. "IT Execs Prepare for an RFID Revolution," Washington Technology, June 29, 2004. http://www.washingtontechnology.com/news/1_1/industry/23875-1.html, accessed August 2004.
-
(2004)
Washington Technology
-
-
Emery, G.R.1
-
19
-
-
0347871399
-
Developing a computer security policy for organizational use and implementation
-
Forcht, K. and W. Ayers. "Developing a Computer Security Policy for Organizational Use and Implementation," Journal of Computer Information Systems, 41:2, 2001, pp. 52-57.
-
(2001)
Journal of Computer Information Systems
, vol.41
, Issue.2
, pp. 52-57
-
-
Forcht, K.1
Ayers, W.2
-
20
-
-
0035737655
-
Collaboration and information sharing in global contract manufacturing networks
-
Gaonkar, R. and N. Viswanadham. "Collaboration and Information Sharing in Global Contract Manufacturing Networks," IEEE/ACM Transactions on Mechatronics, 6:4, 2001, pp. 366-376.
-
(2001)
IEEE/ACM Transactions on Mechatronics
, vol.6
, Issue.4
, pp. 366-376
-
-
Gaonkar, R.1
Viswanadham, N.2
-
21
-
-
0009081366
-
Supply chain economics
-
Jarrell, J.L. "Supply Chain Economics," World Trade, 11:11, 1998, pp. 58-61.
-
(1998)
World Trade
, vol.11
, Issue.11
, pp. 58-61
-
-
Jarrell, J.L.1
-
22
-
-
84986177822
-
Radio frequency identification in the UK: Opportunities and challenges
-
Jones, P., C. Clarke-Hill, P. Shears, D. Comfort, and D. Hillier. "Radio Frequency Identification in the UK: Opportunities and Challenges," International Journal of Retail & Distribution Management, 32:3, 2004, pp. 164-171.
-
(2004)
International Journal of Retail & Distribution Management
, vol.32
, Issue.3
, pp. 164-171
-
-
Jones, P.1
Clarke-Hill, C.2
Shears, P.3
Comfort, D.4
Hillier, D.5
-
23
-
-
84876606082
-
RSA laboratories
-
submission, retrieved August
-
Juels, A. "RSA Laboratories," In submission, "Minimalist Cryptography for Low-Cost RFID Tags. http://www.rsasecurity.com/rsalabs/staff/bios/ajuels/publications/minimalist/ Minimalist.pdf, retrieved August 2004.
-
(2004)
Minimalist Cryptography for Low-cost RFID Tags
-
-
Juels, A.1
-
24
-
-
18744409344
-
The blocker tag: Selective blocking of RFID tags for consumer privacy
-
October 27-31, Washington, DC, 2003
-
th ACM Conference on Computer and Communications Security, October 27-31, 2003, Washington, DC, 2003, pp. 103-111.
-
(2003)
th ACM Conference on Computer and Communications Security
, pp. 103-111
-
-
Juels, A.1
Rivest, R.2
Szydlo, M.3
-
25
-
-
33745595643
-
What's the next step for RFID?
-
March
-
Kay, E. "What's the Next Step for RFID?" Frontline Solutions, March 2003, pp. 21-25.
-
(2003)
Frontline Solutions
, pp. 21-25
-
-
Kay, E.1
-
26
-
-
13844275774
-
Assessing & quantifying the loss of network intrusion
-
Kros, J., C. Foltz, and C. Metcalf. "Assessing & Quantifying the Loss of Network Intrusion," Journal of Computer Information Systems, 45:2, 2005, pp. 36-43.
-
(2005)
Journal of Computer Information Systems
, vol.45
, Issue.2
, pp. 36-43
-
-
Kros, J.1
Foltz, C.2
Metcalf, C.3
-
27
-
-
0035998164
-
Aligning supply chain strategies with product uncertainties
-
Lee, H.L. "Aligning Supply Chain Strategies with Product Uncertainties," California Management Review, 44:3, 2002, pp. 105-119.
-
(2002)
California Management Review
, vol.44
, Issue.3
, pp. 105-119
-
-
Lee, H.L.1
-
28
-
-
0033277427
-
Effect of partnership quality on IS outsourcing: Conceptual framework and empirical validation
-
Lee, J., and Y. Kim. ''Effect of Partnership Quality on IS Outsourcing: Conceptual Framework and Empirical Validation," Journal of Management Information Systems, 15:4, 1999, pp. 26-61.
-
(1999)
Journal of Management Information Systems
, vol.15
, Issue.4
, pp. 26-61
-
-
Lee, J.1
Kim, Y.2
-
29
-
-
0003602617
-
Information sharing in a supply chain
-
Graduate School of Business, Stanford University
-
Lee, H.L. and S. Whang. "Information Sharing in a Supply Chain," Research Paper No. 1549, Graduate School of Business, Stanford University, 1998.
-
(1998)
Research Paper No. 1549
, vol.1549
-
-
Lee, H.L.1
Whang, S.2
-
30
-
-
0036377433
-
A knowledge management architecture in collaborative supply chain
-
Lin, C., H. Hung, J. Wu, and B. Lin. "A Knowledge Management Architecture in Collaborative Supply Chain," Journal of Computer Information Systems, 42:5, 2002, pp. 83-94.
-
(2002)
Journal of Computer Information Systems
, vol.42
, Issue.5
, pp. 83-94
-
-
Lin, C.1
Hung, H.2
Wu, J.3
Lin, B.4
-
31
-
-
0036704310
-
Effects of information sharing on supply chain performance in electronic commerce
-
Lin, F., S. Huang, and S. Lin. "Effects of Information Sharing on Supply Chain Performance in Electronic Commerce," IEEE Transactions on Engineering Management, 49:3, 2002, pp. 258-268.
-
(2002)
IEEE Transactions on Engineering Management
, vol.49
, Issue.3
, pp. 258-268
-
-
Lin, F.1
Huang, S.2
Lin, S.3
-
33
-
-
84876624529
-
-
accessed August 2004
-
Microsoft. "DCOM Security Enhancements," 2004. http://msdn.microsoft.com/security/productinfo/xpsp2/networkprotection/dcom. aspx, accessed August 2004.
-
(2004)
DCOM Security Enhancements
-
-
-
34
-
-
23344431570
-
Identifying antecedents of information exchange within supply chains
-
Moberg, C.R., B.D. Cutler, A. Gross, and T.W. Speh. "Identifying Antecedents of Information Exchange Within Supply Chains," International Journal of Physical Distribution and Logistics Management, 32:9, 2002, pp. 755-770.
-
(2002)
International Journal of Physical Distribution and Logistics Management
, vol.32
, Issue.9
, pp. 755-770
-
-
Moberg, C.R.1
Cutler, B.D.2
Gross, A.3
Speh, T.W.4
-
35
-
-
14844294769
-
Privacy and security in library RFID: Issues, practices, and architectures
-
October 25-29, Washington, DC, 004 accessed August 2004
-
Molnar, D. and D. Wagner. "Privacy and Security in Library RFID: Issues, Practices, and Architectures," ACM Conference on Computer and Communications Security, October 25-29, 2004, Washington, DC, 004. http://www.cs.berkeley.edu/~dmolnar/Iibrary.pdf, accessed August 2004.
-
(2004)
ACM Conference on Computer and Communications Security
-
-
Molnar, D.1
Wagner, D.2
-
37
-
-
84876612710
-
CORBA services security service v 1.2 specification
-
accessed August 2004
-
OMG. "CORBA Services Security Service v 1.2 Specification." Object Management Group formal document: formal/98-12-17, 1998. http://www.omg.org/cgi-bin/doc?formal/98-12-17, accessed August 2004.
-
(1998)
Object Management Group Formal Document: Formal/98-12-17
-
-
-
40
-
-
84876651239
-
Detecting inference attacks using association rules
-
Rutgers University, accessed August 2004
-
Raman, S. "Detecting Inference Attacks Using Association Rules," Research Paper, Rutgers University, 2001. http://www.glennshafer.com/courses/expertsys_students, html, accessed August 2004.
-
(2001)
Research Paper
-
-
Raman, S.1
-
41
-
-
33744907692
-
Low-cost RFID systems: Confronting security and privacy
-
accessed August 2004
-
Ranasinghe, D.C., D.W. Engels, and P.H. Cole. "Low-Cost RFID Systems: Confronting Security and Privacy," MIT Auto-ID Labs Research Workshop, 2004. http://lasecwww.epfl.ch/~gavoine/rfid/, accessed August 2004.
-
(2004)
MIT Auto-ID Labs Research Workshop
-
-
Ranasinghe, D.C.1
Engels, D.W.2
Cole, P.H.3
-
42
-
-
33747471981
-
The race for RFID
-
Seidman, T. "The Race for RFID," Journal of Commerce, 4:48, 2004, pp. 16-18.
-
(2004)
Journal of Commerce
, vol.4
, Issue.48
, pp. 16-18
-
-
Seidman, T.1
-
43
-
-
2142718461
-
Supply chain integration: Architecture and enabling technologies
-
Siau, K. and Y. Tian. "Supply Chain Integration: Architecture and Enabling Technologies," Journal of Computer Information Systems, 44:3, 2004, pp. 67-72.
-
(2004)
Journal of Computer Information Systems
, vol.44
, Issue.3
, pp. 67-72
-
-
Siau, K.1
Tian, Y.2
-
44
-
-
0010605996
-
An empirical investigation into supply chain management: A perspective on partnerships
-
Spekman, R.E., J.W. Kamauff, Jr. and N. Myhr. "An Empirical Investigation into Supply Chain Management: A Perspective on Partnerships, " Supply Chain Management, 3:2, 1998, pp. 53-67.
-
(1998)
Supply Chain Management
, vol.3
, Issue.2
, pp. 53-67
-
-
Spekman, R.E.1
Kamauff Jr., J.W.2
Myhr, N.3
-
45
-
-
0036017722
-
Supply chain management: A strategic perspective
-
Tan, K.C., S.B. Lyman, and J.D. Wisner. "Supply Chain Management: A Strategic Perspective," International Journal of Operations and Production Management, 22:6, 2002, pp. 614-631.
-
(2002)
International Journal of Operations and Production Management
, vol.22
, Issue.6
, pp. 614-631
-
-
Tan, K.C.1
Lyman, S.B.2
Wisner, J.D.3
-
46
-
-
33745757157
-
Lightweight authentication protocols for low-cost RFID tags
-
Seattle, Washington, USA, October 12
-
nd Workshop on Security in Ubiquitous Computing, Seattle, Washington, USA, October 12, 2003.
-
(2003)
nd Workshop on Security in Ubiquitous Computing
-
-
Vajda, I.1
Buttyán, L.2
-
48
-
-
4644373110
-
Cyber attacks against supply chain management systems: A short note
-
Warren, W. and W. Hutchinson. "Cyber Attacks Against Supply Chain Management Systems: A Short Note," International Journal of Physical Distribution and Logistics Management, 20:7/8, 2000, pp. 710-716.
-
(2000)
International Journal of Physical Distribution and Logistics Management
, vol.20
, Issue.7-8
, pp. 710-716
-
-
Warren, W.1
Hutchinson, W.2
-
50
-
-
35048876270
-
Security and privacy aspects of low-cost radio frequency identification systems
-
Lecture Notes in Computer Science, Accessed August 2004
-
Weis, S.A., S.E. Sarma, R.L. Rivest, and D.W. Engels. "Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems," Security in Pervasive Computing, Lecture Notes in Computer Science, 2802, 2003, pp. 201-212. http://theory.les.mit/edu/~sweis/spc-rfid.pdf. Accessed August 2004.
-
(2003)
Security in Pervasive Computing
, vol.2802
, pp. 201-212
-
-
Weis, S.A.1
Sarma, S.E.2
Rivest, R.L.3
Engels, D.W.4
-
51
-
-
33747514677
-
Designing secure E-commerce with role-based access control
-
Newport Beach, California, USA
-
Yang, C. and C.N. Zhang. "Designing Secure E-commerce with Role-based Access Control," IEEE International Conference on E-commerce, Newport Beach, California, USA, 2003, p. 313.
-
(2003)
IEEE International Conference on E-commerce
, pp. 313
-
-
Yang, C.1
Zhang, C.N.2
-
52
-
-
3242695872
-
The impact of information sharing and order-coordination on supply chain performance
-
Zhao, X., J. Xie, and W.J. Zhang. "The Impact of Information Sharing and Order-Coordination on Supply Chain Performance," Supply Chain Management: An International Journal, 7:1, 2002, pp. 24-24.
-
(2002)
Supply Chain Management: An International Journal
, vol.7
, Issue.1
, pp. 24-24
-
-
Zhao, X.1
Xie, J.2
Zhang, W.J.3
-
53
-
-
0034364079
-
The new spectrum of the cross-enterprise solution: The integration of supply chain management and enterprise resources planning systems
-
Zheng, S., D. Yen, and J. Tarn. "The New Spectrum of the Cross-enterprise Solution: The Integration of Supply Chain Management and Enterprise Resources Planning Systems," Journal of Computer Information Systems, 41:1, 2000, pp. 84-93.
-
(2000)
Journal of Computer Information Systems
, vol.41
, Issue.1
, pp. 84-93
-
-
Zheng, S.1
Yen, D.2
Tarn, J.3
|