메뉴 건너뛰기




Volumn 1, Issue , 2007, Pages 459-466

The dual ownership model: Using organizational relationships for access control in safety supply chains

Author keywords

[No Author keywords available]

Indexed keywords

CONSUMER PRODUCTS; DRUG PRODUCTS; ELECTRONIC DATA INTERCHANGE; MATHEMATICAL MODELS; SUPPLY CHAINS;

EID: 35248883492     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/AINAW.2007.351     Document Type: Conference Paper
Times cited : (6)

References (13)
  • 1
    • 35248831886 scopus 로고    scopus 로고
    • Development of an access control model, system architecture and approaches for resource sharing in virtual enterprise
    • T.-Y. Chen et al., "Development of an access control model, system architecture and approaches for resource sharing in virtual enterprise," Computers in Industry, 2006
    • (2006) Computers in Industry
    • Chen, T.-Y.1
  • 2
    • 35248859968 scopus 로고    scopus 로고
    • World Health Organization
    • World Health Organization, "Fact sheet No. 275," 2006; http://www.who.int/mediacentre/factsheets/fs275/en/index.html
    • (2006) Fact sheet , Issue.275
  • 5
    • 79955130588 scopus 로고    scopus 로고
    • H, Afsarmanesh, C, Garita, and H. L.O., Virtual Enterprises and Federated Information Sharing, Proc. of the 9th Int. Conf. Database and Expert Systems Applications (DEXA 1998), 1998, Springer, pp. 374-383.
    • H, Afsarmanesh, C, Garita, and H. L.O., "Virtual Enterprises and Federated Information Sharing," Proc. of the 9th Int. Conf. Database and Expert Systems Applications (DEXA 1998), 1998, Springer, pp. 374-383.
  • 6
    • 0033677904 scopus 로고    scopus 로고
    • Information sharing in a supply chain
    • Inderscience, pp
    • H.L, Lee, and W. S., "Information sharing in a supply chain," International Journal of Technology Management, 20(3), 2000, Inderscience, pp. 373-387.
    • (2000) International Journal of Technology Management , vol.20 , Issue.3 , pp. 373-387
    • Lee, H.L.1    S., W.2
  • 8
    • 33746560721 scopus 로고    scopus 로고
    • Exploiting information relationships for access control in pervasive computing, Pervasive and Mobile
    • U. Hengartner, and P. Steenkiste, "Exploiting information relationships for access control in pervasive computing," Pervasive and Mobile Computing, 2(3), 2006, pp. 344-367.
    • (2006) Computing , vol.2 , Issue.3 , pp. 344-367
    • Hengartner, U.1    Steenkiste, P.2
  • 10
  • 11
    • 35248871333 scopus 로고    scopus 로고
    • K, Traub, G, Allgair, and B. H, The EPCglobal Architecture Framework, EPCglobal Final Version, 2005,
    • K, Traub, G, Allgair, and B. H, "The EPCglobal Architecture Framework," EPCglobal Final Version, 2005,
  • 13
    • 0037661197 scopus 로고    scopus 로고
    • An approach to secure information flow on Object Oriented Role-based Access Control model
    • ACM Press, pp
    • C. Yang, and C. N. Zhang, "An approach to secure information flow on Object Oriented Role-based Access Control model," SAC '03: Proceedings of the 2003 ACM symposium on Applied computing, 2003, ACM Press, pp. 302-306.
    • (2003) SAC '03: Proceedings of the 2003 ACM symposium on Applied computing , pp. 302-306
    • Yang, C.1    Zhang, C.N.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.