메뉴 건너뛰기




Volumn 62, Issue 3, 2011, Pages 351-363

Modeling and evaluating information leakage caused by inferences in supply chains

Author keywords

Access control; Inference; Information sharing; Mitigation; Risk evaluation

Indexed keywords

ADVERSE EFFECT; AMOUNT OF INFORMATION; CONCEPTUAL MODEL; CONFIDENTIAL INFORMATION; INFERENCE; INFORMATION LEAKAGE; INFORMATION SHARING; MITIGATION; QUANTITATIVE APPROACH; RISK EVALUATION;

EID: 79952446777     PISSN: 01663615     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.compind.2010.10.002     Document Type: Article
Times cited : (51)

References (37)
  • 1
    • 0033686633 scopus 로고    scopus 로고
    • The value of information sharing in a two-level supply chain
    • H.L. Lee, K.C. So, and C.S. Tang The value of information sharing in a two-level supply chain Management Science 46 5 2000 626 643
    • (2000) Management Science , vol.46 , Issue.5 , pp. 626-643
    • Lee, H.L.1    So, K.C.2    Tang, C.S.3
  • 2
    • 0242364629 scopus 로고    scopus 로고
    • The impacts of sharing production information on supply chain dynamics: A review of the literature
    • G.Q. Huang, J.S.K. Lau, and K.L. Mak The impacts of sharing production information on supply chain dynamics: a review of the literature International Journal of Production Research 41 7 2003 1483 1517
    • (2003) International Journal of Production Research , vol.41 , Issue.7 , pp. 1483-1517
    • Huang, G.Q.1    Lau, J.S.K.2    Mak, K.L.3
  • 3
    • 15344344940 scopus 로고    scopus 로고
    • Information sharing in supply chains
    • DOI 10.1016/j.omega.2004.07.006, PII S030504830400101X, OR and its Applications
    • P. Fiala Information sharing in supply chains Omega 33 5 2005 419 423 (Pubitemid 40393376)
    • (2005) Omega , vol.33 , Issue.5 , pp. 419-423
    • Fiala, P.1
  • 4
    • 34547682716 scopus 로고    scopus 로고
    • Supply chain practice and information sharing
    • DOI 10.1016/j.jom.2007.01.009, PII S0272696307000113
    • H. Zhou, and W.C. Benton Jr. Supply chain practice and information sharing Journal of Operations Management 25 6 2007 1348 1365 (Pubitemid 47429820)
    • (2007) Journal of Operations Management , vol.25 , Issue.6 , pp. 1348-1365
    • Zhou, H.1    Benton Jr., W.C.2
  • 5
    • 0031108822 scopus 로고    scopus 로고
    • Information distortion in a supply chain: The bullwhip effect
    • H.L. Lee, V. Padmanabhan, and S. Whang Information distortion in a supply chain: the bullwhip effect Management Science 43 4 1997 546 558 (Pubitemid 127569855)
    • (1997) Management Science , vol.43 , Issue.4 , pp. 546-558
    • Lee, H.L.1    Padmanabhan, V.2    Whang, S.3
  • 7
    • 1542400297 scopus 로고    scopus 로고
    • A review of internet-based product information sharing and visualization
    • S. Zhang, W. Shen, and H. Ghenniwa A review of internet-based product information sharing and visualization Computers in Industry 54 1 2004 1 15
    • (2004) Computers in Industry , vol.54 , Issue.1 , pp. 1-15
    • Zhang, S.1    Shen, W.2    Ghenniwa, H.3
  • 8
    • 33744976579 scopus 로고    scopus 로고
    • State-of-the-art technologies and methodologies for collaborative product development systems
    • DOI 10.1080/00207540500422080, PII T5757306118790
    • W.D. Li, and Z.M. Qiu State-of-the-art technologies and methodologies for collaborative product development systems International Journal of Production Research 44 13 2006 2525 2559 (Pubitemid 43862195)
    • (2006) International Journal of Production Research , vol.44 , Issue.13 , pp. 2525-2559
    • Li, W.D.1    Qiu, Z.M.2
  • 10
    • 0036755349 scopus 로고    scopus 로고
    • Information sharing in a supply chain with horizontal competition
    • L. Li Information sharing in a supply chain with horizontal competition Management Science 48 9 2002 1196 1212 (Pubitemid 35327248)
    • (2002) Management Science , vol.48 , Issue.9 , pp. 1196-1212
    • Li, L.1
  • 11
    • 33747460356 scopus 로고    scopus 로고
    • Outsourcing, information leakage and the risk of losing technology-based competencies
    • DOI 10.1108/09555340610686967
    • A. Hoecht, and P. Trott Outsourcing, information leakage and the risk of losing technology-based competencies European Business Review 18 5 2006 395 412 (Pubitemid 44259719)
    • (2006) European Business Review , vol.18 , Issue.5 , pp. 395-412
    • Hoecht, A.1    Trott, P.2
  • 12
    • 33644985214 scopus 로고    scopus 로고
    • Innovation risks of strategic outsourcing
    • A. Hoecht, and P. Trott Innovation risks of strategic outsourcing Technovation 26 5-6 2006 672 681
    • (2006) Technovation , vol.26 , Issue.56 , pp. 672-681
    • Hoecht, A.1    Trott, P.2
  • 13
    • 67649990619 scopus 로고    scopus 로고
    • Strategic information management under leakage in a supply chain
    • K.S. Anand, and M. Goyal Strategic information management under leakage in a supply chain Management Science 55 3 2009 438 452
    • (2009) Management Science , vol.55 , Issue.3 , pp. 438-452
    • Anand, K.S.1    Goyal, M.2
  • 15
    • 84986173300 scopus 로고    scopus 로고
    • Supply chain risk management: understanding the business requirements from a practitioner perspective
    • U. Juttner Supply chain risk management: understanding the business requirements from a practitioner perspective The International Journal of Logistics Management 16 1 2005 120 141 (Pubitemid 41193892)
    • (2005) International Journal of Logistics Management , vol.16 , Issue.1 , pp. 120-141
    • Juttner, U.1
  • 16
    • 76249104323 scopus 로고    scopus 로고
    • Analysing risks in supply networks to facilitate outsourcing decisions
    • A. Lockamy, and K. McCormack Analysing risks in supply networks to facilitate outsourcing decisions International Journal of Production Research 48 2 2010 593 611
    • (2010) International Journal of Production Research , vol.48 , Issue.2 , pp. 593-611
    • Lockamy, A.1    McCormack, K.2
  • 17
    • 11244261098 scopus 로고    scopus 로고
    • Vertical information exchange in a supply chain with duopoly retailers
    • H. Zhang Vertical information exchange in a supply chain with duopoly retailers Production and Operations Management 11 4 2002 531 546
    • (2002) Production and Operations Management , vol.11 , Issue.4 , pp. 531-546
    • Zhang, H.1
  • 18
    • 0037318855 scopus 로고    scopus 로고
    • A security model for distributed product data management system
    • K.K. Leong, K.M. Yu, and W.B. Lee A security model for distributed product data management system Computers in Industry 50 2 2003 179 193
    • (2003) Computers in Industry , vol.50 , Issue.2 , pp. 179-193
    • Leong, K.K.1    Yu, K.M.2    Lee, W.B.3
  • 19
    • 2642517361 scopus 로고    scopus 로고
    • Role-based viewing envelopes for information protection in collaborative modeling
    • C.D. Cera, T. Kim, J. Han, and W.C. Regli Role-based viewing envelopes for information protection in collaborative modeling Computer-Aided Design 36 9 2004 873 886
    • (2004) Computer-Aided Design , vol.36 , Issue.9 , pp. 873-886
    • Cera, C.D.1    Kim, T.2    Han, J.3    Regli, W.C.4
  • 21
    • 33644679979 scopus 로고    scopus 로고
    • Multi-Level modeling and access control for data sharing in collaborative design
    • DOI 10.1016/j.aei.2005.05.016, PII S1474034605000571
    • T. Kim, C.D. Cera, W.C. Regli, H. Choo, and J. Han Multi-level modeling and access control for data sharing in collaborative design Advanced Engineering Informatics 20 1 2006 47 57 (Pubitemid 43332811)
    • (2006) Advanced Engineering Informatics , vol.20 , Issue.1 , pp. 47-57
    • Kim, T.1    Cera, C.D.2    Regli, W.C.3    Choo, H.4    Han, J.5
  • 23
    • 37249093004 scopus 로고    scopus 로고
    • RBAC standard rationale: Comments on a critique of the ANSI standard on role based access control
    • D.F. Ferraiolo, R. Kuhn, and R.S. Sandhu RBAC standard rationale: comments on a critique of the ANSI standard on role based access control IEEE Security & Privacy 5 6 2007 51 53
    • (2007) IEEE Security & Privacy , vol.5 , Issue.6 , pp. 51-53
    • Ferraiolo, D.F.1    Kuhn, R.2    Sandhu, R.S.3
  • 24
    • 33745879165 scopus 로고    scopus 로고
    • Intellectual property protection in collaborative design through lean information modeling and sharing
    • DOI 10.1115/1.2190235
    • Y. Wang, P.N. Ajoku, J.C. Brustoloni, and B.O. Nnaji Intellectual property protection in collaborative design through lean information modeling and sharing Journal of Computing and Information Science in Engineering 6 2 2006 149 159 (Pubitemid 44047042)
    • (2006) Journal of Computing and Information Science in Engineering , vol.6 , Issue.2 , pp. 149-159
    • Wang, Y.1    Ajoku, P.N.2    Brustoloni, J.C.3    Nnaji, B.O.4
  • 25
    • 43949093061 scopus 로고    scopus 로고
    • Developing a trust evaluation method between co-workers in virtual project team for enabling resource sharing and collaboration
    • T.-Y. Chen, Y.-M. Chen, and H.-C. Chu Developing a trust evaluation method between co-workers in virtual project team for enabling resource sharing and collaboration Computers in Industry 59 6 2008 565 579
    • (2008) Computers in Industry , vol.59 , Issue.6 , pp. 565-579
    • Chen, T.-Y.1    Chen, Y.-M.2    Chu, H.-C.3
  • 26
    • 0036811143 scopus 로고    scopus 로고
    • Achieving k-anonymity privacy protection using generalization and suppression
    • DOI 10.1142/S021848850200165X
    • L. Sweeney Achieving k-anonymity privacy protection using generalization and suppression International Journal on Uncertainty, Fuzziness and Knowledge-based Systems 10 5 2002 571 588 (Pubitemid 35384858)
    • (2002) International Journal of Uncertainty, Fuzziness and Knowlege-Based Systems , vol.10 , Issue.5 , pp. 571-588
    • Sweeney, L.1
  • 27
    • 0035427452 scopus 로고    scopus 로고
    • Internet-based collaborative product design with assembly features and virtual design spaces
    • DOI 10.1016/S0010-4485(01)00069-0, PII S0010448501000690
    • N. Shyamsundar, and R. Gadh Internet-based collaborative product design with assembly features and virtual design spaces Computer-Aided Design 33 9 2001 637 651 (Pubitemid 32535338)
    • (2001) CAD Computer Aided Design , vol.33 , Issue.9 , pp. 637-651
    • Shyamsundar, N.1    Gadh, R.2
  • 28
    • 0036722138 scopus 로고    scopus 로고
    • Collaborative virtual prototyping of product assemblies over the Internet
    • DOI 10.1016/S0010-4485(01)00204-4, PII S0010448501002044
    • N. Shyamsundar, and R. Gadh Collaborative virtual prototyping of product assemblies over the Internet Computer-Aided Design 34 10 2002 755 768 (Pubitemid 34544994)
    • (2002) CAD Computer Aided Design , vol.34 , Issue.10 , pp. 755-768
    • Shyamsundar, N.1    Gadh, R.2
  • 29
    • 2642575246 scopus 로고    scopus 로고
    • Internet-enabled real-time collaborative assembly modeling via an e-assembly system: Status and promise
    • L. Chen, Z. Song, and L. Feng Internet-enabled real-time collaborative assembly modeling via an e-assembly system: status and promise Computer-Aided Design 36 9 2004 835 847
    • (2004) Computer-Aided Design , vol.36 , Issue.9 , pp. 835-847
    • Chen, L.1    Song, Z.2    Feng, L.3
  • 31
    • 68749096972 scopus 로고    scopus 로고
    • Protection of intellectual property based on a skeleton model in product design c ollaboration
    • D. Mun, J. Hwang, and S. Han Protection of intellectual property based on a skeleton model in product design c ollaboration Computer-Aided Design 41 9 2009 641 648
    • (2009) Computer-Aided Design , vol.41 , Issue.9 , pp. 641-648
    • Mun, D.1    Hwang, J.2    Han, S.3
  • 34
    • 33746437508 scopus 로고    scopus 로고
    • Privacy preserving data mining
    • DOI 10.1007/s00145-001-0019-2
    • Y. Lindell, and B. Pinkas Privacy preserving data mining Journal of Cryptology 15 3 2002 177 206 (Pubitemid 44126466)
    • (2002) Journal of Cryptology , vol.15 , Issue.3 , pp. 177-206
    • Lindell, Y.1    Pinkas, B.2
  • 36
    • 0024914229 scopus 로고
    • Security-control methods for statistical databases. A comparative study
    • N. Adam, and J. Worthmann Security-control methods for statistical databases: a comparative study ACM Computing Surveys 21 4 1989 515 556 (Pubitemid 20658272)
    • (1989) Computing surveys , vol.21 , Issue.4 , pp. 515-556
    • Adam Nabil, R.1    Wortmann John, C.2
  • 37
    • 77951201056 scopus 로고    scopus 로고
    • Privacy-preserving data publishing: A survey on recent developments
    • B.C.M. Fung, K. Wang, R. Chen, and P.S. Yu Privacy-preserving data publishing: a survey on recent developments ACM Computing Surveys 42 4 2010 14:1 14:53
    • (2010) ACM Computing Surveys , vol.42 , Issue.4 , pp. 141-1453
    • Fung, B.C.M.1    Wang, K.2    Chen, R.3    Yu, P.S.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.