메뉴 건너뛰기




Volumn , Issue , 2007, Pages 337-341

Dual ownership: Access management for shared item information in RFID-enabled supply chains

Author keywords

[No Author keywords available]

Indexed keywords

CODES (SYMBOLS); DATA TRANSFER; ELECTRONIC DOCUMENT IDENTIFICATION SYSTEMS; LIFE CYCLE; SUPPLY CHAINS;

EID: 34547700556     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/PERCOMW.2007.40     Document Type: Conference Paper
Times cited : (11)

References (11)
  • 1
    • 23344436675 scopus 로고    scopus 로고
    • Information sharing and coordination in make-to-order supply chains
    • F. Sahin, and J. Robinson, E. Powell, "Information sharing and coordination in make-to-order supply chains," Journal of Operations Management, 23, 2005, pp. 579-598.
    • (2005) Journal of Operations Management , vol.23 , pp. 579-598
    • Sahin, F.1    Robinson, J.2    Powell, E.3
  • 2
    • 0033686633 scopus 로고    scopus 로고
    • H.L, Lee, K.C, So, and T. C.S., The Value of Information Sharing in a Two-Level Supply Chain, Management Science, 46, 2000, INFORMS, pp. 626-643.
    • H.L, Lee, K.C, So, and T. C.S., "The Value of Information Sharing in a Two-Level Supply Chain," Management Science, 46, 2000, INFORMS, pp. 626-643.
  • 3
    • 25144440407 scopus 로고    scopus 로고
    • B, Huang, and I. S.M.R., Production Control Policies in Supply Chains with Selective-Information Sharing, Operations Research, 53, 2005, pp. 662-674.
    • B, Huang, and I. S.M.R., "Production Control Policies in Supply Chains with Selective-Information Sharing," Operations Research, 53, 2005, pp. 662-674.
  • 6
    • 35248831886 scopus 로고    scopus 로고
    • Development of an access control model, system architecture and approaches for resource sharing in virtual enterprise
    • T.-Y. Chen et al., "Development of an access control model, system architecture and approaches for resource sharing in virtual enterprise," Computers in Industry, In Press, Corrected Proof, 2006,
    • (2006) Computers in Industry, In Press, Corrected Proof
    • Chen, T.-Y.1
  • 7
    • 79955130588 scopus 로고    scopus 로고
    • H, Afsarmanesh, C, Garita, and H. L.O., Virtual Enterprises and Federated Information Sharing, Proc. of the 9th Int. Conf. Database and Expert Systems Applications (DEXA 1998), 1998, Springer, pp. 374-383.
    • H, Afsarmanesh, C, Garita, and H. L.O., "Virtual Enterprises and Federated Information Sharing," Proc. of the 9th Int. Conf. Database and Expert Systems Applications (DEXA 1998), 1998, Springer, pp. 374-383.
  • 9
    • 0037661197 scopus 로고    scopus 로고
    • An approach to secure information flow on Object Oriented Role-based Access Control model
    • ACM Press, pp
    • C. Yang, and C. N. Zhang, "An approach to secure information flow on Object Oriented Role-based Access Control model," SAC '03: Proceedings of the 2003 ACM symposium on Applied computing, 2003, ACM Press, pp. 302-306.
    • (2003) SAC '03: Proceedings of the 2003 ACM symposium on Applied computing , pp. 302-306
    • Yang, C.1    Zhang, C.N.2
  • 10
    • 33746560721 scopus 로고    scopus 로고
    • Exploiting information relationships for access control in pervasive computing
    • U. Hengartner, and P. Steenkiste, "Exploiting information relationships for access control in pervasive computing," Pervasive and Mobile Computing, 2, 2006, pp. 344-367.
    • (2006) Pervasive and Mobile Computing , vol.2 , pp. 344-367
    • Hengartner, U.1    Steenkiste, P.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.