-
1
-
-
0033686633
-
The value of information sharing in a two-level supply chain
-
H.L. Lee, K.C. So, and C.S. Tang The value of information sharing in a two-level supply chain Management Science 46 5 2000 626 643
-
(2000)
Management Science
, vol.46
, Issue.5
, pp. 626-643
-
-
Lee, H.L.1
So, K.C.2
Tang, C.S.3
-
2
-
-
0242364629
-
The impacts of sharing production information on supply chain dynamics: A review of the literature
-
G.Q. Huang, J.S.K. Lau, and K.L. Mak The impacts of sharing production information on supply chain dynamics: a review of the literature International Journal of Production Research 41 7 2003 1483 1517
-
(2003)
International Journal of Production Research
, vol.41
, Issue.7
, pp. 1483-1517
-
-
Huang, G.Q.1
Lau, J.S.K.2
Mak, K.L.3
-
3
-
-
15344344940
-
Information sharing in supply chains
-
DOI 10.1016/j.omega.2004.07.006, PII S030504830400101X, OR and its Applications
-
P. Fiala Information sharing in supply chains Omega 33 5 2005 419 423 (Pubitemid 40393376)
-
(2005)
Omega
, vol.33
, Issue.5
, pp. 419-423
-
-
Fiala, P.1
-
4
-
-
34547682716
-
Supply chain practice and information sharing
-
DOI 10.1016/j.jom.2007.01.009, PII S0272696307000113
-
H. Zhou, and W.C. Benton Jr. Supply chain practice and information sharing Journal of Operations Management 25 6 2007 1348 1365 (Pubitemid 47429820)
-
(2007)
Journal of Operations Management
, vol.25
, Issue.6
, pp. 1348-1365
-
-
Zhou, H.1
Benton Jr., W.C.2
-
5
-
-
0031108822
-
Information distortion in a supply chain: The bullwhip effect
-
H.L. Lee, V. Padmanabhan, and S. Whang Information distortion in a supply chain: the bullwhip effect Management Science 43 4 1997 546 558 (Pubitemid 127569855)
-
(1997)
Management Science
, vol.43
, Issue.4
, pp. 546-558
-
-
Lee, H.L.1
Padmanabhan, V.2
Whang, S.3
-
6
-
-
34247280386
-
Information sharing as a coordination mechanism for reducing the bullwhip effect in a supply chain
-
DOI 10.1109/TSMCC.2006.887014
-
T. Moyaux, B. Chaib-draa, and S. D'Amours Information sharing as a coordination mechanism for reducing the bullwhip effect in a supply chain IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews 37 3 2007 396 409 (Pubitemid 46621542)
-
(2007)
IEEE Transactions on Systems, Man and Cybernetics Part C: Applications and Reviews
, vol.37
, Issue.3
, pp. 396-409
-
-
Moyaux, T.1
Chaib-Draa, B.2
D'Amours, S.3
-
7
-
-
1542400297
-
A review of internet-based product information sharing and visualization
-
S. Zhang, W. Shen, and H. Ghenniwa A review of internet-based product information sharing and visualization Computers in Industry 54 1 2004 1 15
-
(2004)
Computers in Industry
, vol.54
, Issue.1
, pp. 1-15
-
-
Zhang, S.1
Shen, W.2
Ghenniwa, H.3
-
8
-
-
33744976579
-
State-of-the-art technologies and methodologies for collaborative product development systems
-
DOI 10.1080/00207540500422080, PII T5757306118790
-
W.D. Li, and Z.M. Qiu State-of-the-art technologies and methodologies for collaborative product development systems International Journal of Production Research 44 13 2006 2525 2559 (Pubitemid 43862195)
-
(2006)
International Journal of Production Research
, vol.44
, Issue.13
, pp. 2525-2559
-
-
Li, W.D.1
Qiu, Z.M.2
-
10
-
-
0036755349
-
Information sharing in a supply chain with horizontal competition
-
L. Li Information sharing in a supply chain with horizontal competition Management Science 48 9 2002 1196 1212 (Pubitemid 35327248)
-
(2002)
Management Science
, vol.48
, Issue.9
, pp. 1196-1212
-
-
Li, L.1
-
11
-
-
33747460356
-
Outsourcing, information leakage and the risk of losing technology-based competencies
-
DOI 10.1108/09555340610686967
-
A. Hoecht, and P. Trott Outsourcing, information leakage and the risk of losing technology-based competencies European Business Review 18 5 2006 395 412 (Pubitemid 44259719)
-
(2006)
European Business Review
, vol.18
, Issue.5
, pp. 395-412
-
-
Hoecht, A.1
Trott, P.2
-
12
-
-
33644985214
-
Innovation risks of strategic outsourcing
-
A. Hoecht, and P. Trott Innovation risks of strategic outsourcing Technovation 26 5-6 2006 672 681
-
(2006)
Technovation
, vol.26
, Issue.56
, pp. 672-681
-
-
Hoecht, A.1
Trott, P.2
-
13
-
-
67649990619
-
Strategic information management under leakage in a supply chain
-
K.S. Anand, and M. Goyal Strategic information management under leakage in a supply chain Management Science 55 3 2009 438 452
-
(2009)
Management Science
, vol.55
, Issue.3
, pp. 438-452
-
-
Anand, K.S.1
Goyal, M.2
-
15
-
-
84986173300
-
Supply chain risk management: understanding the business requirements from a practitioner perspective
-
U. Juttner Supply chain risk management: understanding the business requirements from a practitioner perspective The International Journal of Logistics Management 16 1 2005 120 141 (Pubitemid 41193892)
-
(2005)
International Journal of Logistics Management
, vol.16
, Issue.1
, pp. 120-141
-
-
Juttner, U.1
-
16
-
-
76249104323
-
Analysing risks in supply networks to facilitate outsourcing decisions
-
A. Lockamy, and K. McCormack Analysing risks in supply networks to facilitate outsourcing decisions International Journal of Production Research 48 2 2010 593 611
-
(2010)
International Journal of Production Research
, vol.48
, Issue.2
, pp. 593-611
-
-
Lockamy, A.1
McCormack, K.2
-
17
-
-
11244261098
-
Vertical information exchange in a supply chain with duopoly retailers
-
H. Zhang Vertical information exchange in a supply chain with duopoly retailers Production and Operations Management 11 4 2002 531 546
-
(2002)
Production and Operations Management
, vol.11
, Issue.4
, pp. 531-546
-
-
Zhang, H.1
-
18
-
-
0037318855
-
A security model for distributed product data management system
-
K.K. Leong, K.M. Yu, and W.B. Lee A security model for distributed product data management system Computers in Industry 50 2 2003 179 193
-
(2003)
Computers in Industry
, vol.50
, Issue.2
, pp. 179-193
-
-
Leong, K.K.1
Yu, K.M.2
Lee, W.B.3
-
19
-
-
2642517361
-
Role-based viewing envelopes for information protection in collaborative modeling
-
C.D. Cera, T. Kim, J. Han, and W.C. Regli Role-based viewing envelopes for information protection in collaborative modeling Computer-Aided Design 36 9 2004 873 886
-
(2004)
Computer-Aided Design
, vol.36
, Issue.9
, pp. 873-886
-
-
Cera, C.D.1
Kim, T.2
Han, J.3
Regli, W.C.4
-
20
-
-
33645655842
-
Hierarchical role-based viewing for multi-level information security in collaborative CAD
-
C.D. Cera, I. Braude, T. Kim, J. Han, and W.C. Regli Hierarchical role-based viewing for multi-level information security in collaborative CAD Journal of Computing and Information Science in Engineering 6 1 2006 2 10
-
(2006)
Journal of Computing and Information Science in Engineering
, vol.6
, Issue.1
, pp. 2-10
-
-
Cera, C.D.1
Braude, I.2
Kim, T.3
Han, J.4
Regli, W.C.5
-
21
-
-
33644679979
-
Multi-Level modeling and access control for data sharing in collaborative design
-
DOI 10.1016/j.aei.2005.05.016, PII S1474034605000571
-
T. Kim, C.D. Cera, W.C. Regli, H. Choo, and J. Han Multi-level modeling and access control for data sharing in collaborative design Advanced Engineering Informatics 20 1 2006 47 57 (Pubitemid 43332811)
-
(2006)
Advanced Engineering Informatics
, vol.20
, Issue.1
, pp. 47-57
-
-
Kim, T.1
Cera, C.D.2
Regli, W.C.3
Choo, H.4
Han, J.5
-
22
-
-
0030086382
-
Role-based access control models
-
R.S. Sandhu, E.J. Coyne, H.L. Feinstein, and C.E. Youman Role-based access control models IEEE Computer 29 2 1996 38 47
-
(1996)
IEEE Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.S.1
Coyne, E.J.2
Feinstein, H.L.3
Youman, C.E.4
-
23
-
-
37249093004
-
RBAC standard rationale: Comments on a critique of the ANSI standard on role based access control
-
D.F. Ferraiolo, R. Kuhn, and R.S. Sandhu RBAC standard rationale: comments on a critique of the ANSI standard on role based access control IEEE Security & Privacy 5 6 2007 51 53
-
(2007)
IEEE Security & Privacy
, vol.5
, Issue.6
, pp. 51-53
-
-
Ferraiolo, D.F.1
Kuhn, R.2
Sandhu, R.S.3
-
24
-
-
33745879165
-
Intellectual property protection in collaborative design through lean information modeling and sharing
-
DOI 10.1115/1.2190235
-
Y. Wang, P.N. Ajoku, J.C. Brustoloni, and B.O. Nnaji Intellectual property protection in collaborative design through lean information modeling and sharing Journal of Computing and Information Science in Engineering 6 2 2006 149 159 (Pubitemid 44047042)
-
(2006)
Journal of Computing and Information Science in Engineering
, vol.6
, Issue.2
, pp. 149-159
-
-
Wang, Y.1
Ajoku, P.N.2
Brustoloni, J.C.3
Nnaji, B.O.4
-
25
-
-
43949093061
-
Developing a trust evaluation method between co-workers in virtual project team for enabling resource sharing and collaboration
-
T.-Y. Chen, Y.-M. Chen, and H.-C. Chu Developing a trust evaluation method between co-workers in virtual project team for enabling resource sharing and collaboration Computers in Industry 59 6 2008 565 579
-
(2008)
Computers in Industry
, vol.59
, Issue.6
, pp. 565-579
-
-
Chen, T.-Y.1
Chen, Y.-M.2
Chu, H.-C.3
-
26
-
-
0036811143
-
Achieving k-anonymity privacy protection using generalization and suppression
-
DOI 10.1142/S021848850200165X
-
L. Sweeney Achieving k-anonymity privacy protection using generalization and suppression International Journal on Uncertainty, Fuzziness and Knowledge-based Systems 10 5 2002 571 588 (Pubitemid 35384858)
-
(2002)
International Journal of Uncertainty, Fuzziness and Knowlege-Based Systems
, vol.10
, Issue.5
, pp. 571-588
-
-
Sweeney, L.1
-
27
-
-
0035427452
-
Internet-based collaborative product design with assembly features and virtual design spaces
-
DOI 10.1016/S0010-4485(01)00069-0, PII S0010448501000690
-
N. Shyamsundar, and R. Gadh Internet-based collaborative product design with assembly features and virtual design spaces Computer-Aided Design 33 9 2001 637 651 (Pubitemid 32535338)
-
(2001)
CAD Computer Aided Design
, vol.33
, Issue.9
, pp. 637-651
-
-
Shyamsundar, N.1
Gadh, R.2
-
28
-
-
0036722138
-
Collaborative virtual prototyping of product assemblies over the Internet
-
DOI 10.1016/S0010-4485(01)00204-4, PII S0010448501002044
-
N. Shyamsundar, and R. Gadh Collaborative virtual prototyping of product assemblies over the Internet Computer-Aided Design 34 10 2002 755 768 (Pubitemid 34544994)
-
(2002)
CAD Computer Aided Design
, vol.34
, Issue.10
, pp. 755-768
-
-
Shyamsundar, N.1
Gadh, R.2
-
29
-
-
2642575246
-
Internet-enabled real-time collaborative assembly modeling via an e-assembly system: Status and promise
-
L. Chen, Z. Song, and L. Feng Internet-enabled real-time collaborative assembly modeling via an e-assembly system: status and promise Computer-Aided Design 36 9 2004 835 847
-
(2004)
Computer-Aided Design
, vol.36
, Issue.9
, pp. 835-847
-
-
Chen, L.1
Song, Z.2
Feng, L.3
-
30
-
-
2642525497
-
Design formalism for collaborative assembly design
-
K.-Y. Kim, Y. Wang, O.S. Muogboh, and B.O. Nnaji Design formalism for collaborative assembly design Computer-Aided Design 36 9 2004 849 871
-
(2004)
Computer-Aided Design
, vol.36
, Issue.9
, pp. 849-871
-
-
Kim, K.-Y.1
Wang, Y.2
Muogboh, O.S.3
Nnaji, B.O.4
-
31
-
-
68749096972
-
Protection of intellectual property based on a skeleton model in product design c ollaboration
-
D. Mun, J. Hwang, and S. Han Protection of intellectual property based on a skeleton model in product design c ollaboration Computer-Aided Design 41 9 2009 641 648
-
(2009)
Computer-Aided Design
, vol.41
, Issue.9
, pp. 641-648
-
-
Mun, D.1
Hwang, J.2
Han, S.3
-
34
-
-
33746437508
-
Privacy preserving data mining
-
DOI 10.1007/s00145-001-0019-2
-
Y. Lindell, and B. Pinkas Privacy preserving data mining Journal of Cryptology 15 3 2002 177 206 (Pubitemid 44126466)
-
(2002)
Journal of Cryptology
, vol.15
, Issue.3
, pp. 177-206
-
-
Lindell, Y.1
Pinkas, B.2
-
36
-
-
0024914229
-
Security-control methods for statistical databases. A comparative study
-
N. Adam, and J. Worthmann Security-control methods for statistical databases: a comparative study ACM Computing Surveys 21 4 1989 515 556 (Pubitemid 20658272)
-
(1989)
Computing surveys
, vol.21
, Issue.4
, pp. 515-556
-
-
Adam Nabil, R.1
Wortmann John, C.2
-
37
-
-
77951201056
-
Privacy-preserving data publishing: A survey on recent developments
-
B.C.M. Fung, K. Wang, R. Chen, and P.S. Yu Privacy-preserving data publishing: a survey on recent developments ACM Computing Surveys 42 4 2010 14:1 14:53
-
(2010)
ACM Computing Surveys
, vol.42
, Issue.4
, pp. 141-1453
-
-
Fung, B.C.M.1
Wang, K.2
Chen, R.3
Yu, P.S.4
|