-
2
-
-
84896400561
-
Information security strategies: Towards an organizational multi-strategy perspective
-
doi: 10.1007/s10845-012-0683-0
-
Ahmad, A.; Maynard, S. B.; & Park, S. (2012). Information security strategies: Towards an organizational multi-strategy perspective. Journal of Intelligent Manufacturing, doi: 10.1007/s10845-012-0683-0.
-
(2012)
Journal of Intelligent Manufacturing
-
-
Ahmad, A.1
Maynard, S.B.2
Park, S.3
-
4
-
-
0031074857
-
Fast planning through planning graph analysis
-
10.1016/S0004-3702(96)00047-1
-
Blum A.; Furst M. L. (1997) Fast planning through planning graph analysis. Artificial Intelligence 90(1-2): 281-300
-
(1997)
Artificial Intelligence
, vol.90
, Issue.1-2
, pp. 281-300
-
-
Blum, A.1
Furst, M.L.2
-
5
-
-
40849116532
-
Distributed access control architecture and model for supporting collaboration and concurrency in dynamic virtual enterprises
-
10.1080/09511920701196950
-
Chen T. Y.; Chen Y. M.; Chu H. C. et al (2008) Distributed access control architecture and model for supporting collaboration and concurrency in dynamic virtual enterprises. International Journal of Computer Integrated Manufacturing 21(3): 301-324
-
(2008)
International Journal of Computer Integrated Manufacturing
, vol.21
, Issue.3
, pp. 301-324
-
-
Chen, T.Y.1
Chen, Y.M.2
Chu, H.C.3
-
6
-
-
33947603006
-
Secure resource sharing on cross-organization collaborationusing a novel trust method
-
10.1016/j.rcim.2006.04.005
-
Chen T. Y.; Chen Y. M.; Wang C. B. et al (2007) Secure resource sharing on cross-organization collaborationusing a novel trust method. Robotics and Computer-Integrated Manufacturing 23(4): 421-435
-
(2007)
Robotics and Computer-Integrated Manufacturing
, vol.23
, Issue.4
, pp. 421-435
-
-
Chen, T.Y.1
Chen, Y.M.2
Wang, C.B.3
-
9
-
-
78249256998
-
Permission to speak: A logic for access control and conformance
-
10.1016/j.jlap.2009.12.002
-
Dinesh N.; Joshi A.; Lee I. et al (2011) Permission to speak: A logic for access control and conformance. Journal of Logic and Algebraic Programming 80(1): 50-74
-
(2011)
Journal of Logic and Algebraic Programming
, vol.80
, Issue.1
, pp. 50-74
-
-
Dinesh, N.1
Joshi, A.2
Lee, I.3
-
10
-
-
24644445703
-
Conformance checking of RBAC policyand its implementation
-
Frode H.; Vladimir O. (2005) Conformance checking of RBAC policyand its implementation. Lecture Notes in Computer Science 34(39): 144-155
-
(2005)
Lecture Notes in Computer Science
, vol.34
, Issue.39
, pp. 144-155
-
-
Frode, H.1
Vladimir, O.2
-
11
-
-
0032665038
-
Value of information in capacitated supply chains
-
10.1287/mnsc.45.1.16
-
Gavirneni S.; Kapuscinski R.; Tayur S. (1999) Value of information in capacitated supply chains. Management Science 45(1): 16-24
-
(1999)
Management Science
, vol.45
, Issue.1
, pp. 16-24
-
-
Gavirneni, S.1
Kapuscinski, R.2
Tayur, S.3
-
14
-
-
49049107518
-
Extending analytical target cascading for optimal configuration of supply chains with alternative autonomous suppliers
-
10.1016/j.ijpe.2008.04.008
-
Huang G. Q.; Qu T. (2008) Extending analytical target cascading for optimal configuration of supply chains with alternative autonomous suppliers. International Journal of Production Economics 115: 39-54
-
(2008)
International Journal of Production Economics
, vol.115
, pp. 39-54
-
-
Huang, G.Q.1
Qu, T.2
-
17
-
-
11044223672
-
Access control language for multidomain environments
-
10.1109/MIC.2004.53
-
Joshi J. B. D.; Bhatti R.; Bertino E. et al (2004) Access control language for multidomain environments. IEEE Internet Computing 8(6): 40-50
-
(2004)
IEEE Internet Computing
, vol.8
, Issue.6
, pp. 40-50
-
-
Joshi, J.B.D.1
Bhatti, R.2
Bertino, E.3
-
18
-
-
67349151773
-
Towards secure dynamic collaborations with group-based RBAC model
-
10.1016/j.cose.2008.12.004
-
Li Q.; Zhang X. W.; Xu M. W. et al (2009) Towards secure dynamic collaborations with group-based RBAC model. Computers & Security 28(5): 260-275
-
(2009)
Computers & Security
, vol.28
, Issue.5
, pp. 260-275
-
-
Li, Q.1
Zhang, X.W.2
Xu, M.W.3
-
19
-
-
67349089965
-
Task-activity based access control for process collaboration environments
-
10.1016/j.compind.2009.02.009
-
Lu Y. H.; Zhang L.; Sun J. G. (2009) Task-activity based access control for process collaboration environments. Computers in Industry 60(6): 403-415
-
(2009)
Computers in Industry
, vol.60
, Issue.6
, pp. 403-415
-
-
Lu, Y.H.1
Zhang, L.2
Sun, J.G.3
-
20
-
-
79955750095
-
Annotation-based access control for collaborative information spaces
-
10.1016/j.chb.2010.07.030
-
Nasirifard P.; Peristeras V.; Decker S. (2011) Annotation-based access control for collaborative information spaces. Computers in Human Behavior 27(4): 1352-1364
-
(2011)
Computers in Human Behavior
, vol.27
, Issue.4
, pp. 1352-1364
-
-
Nasirifard, P.1
Peristeras, V.2
Decker, S.3
-
21
-
-
0342995810
-
Reliable and secure communications infrastructure for virtual enterprises
-
10.1023/A:1011204627577
-
Osório L.; Barata Manuel M. (2001) Reliable and secure communications infrastructure for virtual enterprises. Journal of Intelligent Manufacturing 12: 171-183
-
(2001)
Journal of Intelligent Manufacturing
, vol.12
, pp. 171-183
-
-
Osório, L.1
Barata Manuel, M.2
-
22
-
-
77956058829
-
A generic analytical target cascading optimization system for decentralized supply chain configuration over supply chain grid
-
10.1016/j.ijpe.2009.08.008
-
Qu T.; Huang G. Q.; Zhang Y. F. et al (2009) A generic analytical target cascading optimization system for decentralized supply chain configuration over supply chain grid. International Journal of Production Economics 127: 262-277
-
(2009)
International Journal of Production Economics
, vol.127
, pp. 262-277
-
-
Qu, T.1
Huang, G.Q.2
Zhang, Y.F.3
-
24
-
-
84870947362
-
A case of implementing RFID-based real-time shop-floor material management for household electrical appliance manufacturers
-
doi: 10.1007/s10845-010-0476-2
-
Qu, T.; Yang, H. D.; Huang, G. Q.; Zhang, Y. F.; Luo, H.; & Qin, W. (2011). A case of implementing RFID-based real-time shop-floor material management for household electrical appliance manufacturers. Journal of Intelligent Manufacturing, doi: 10.1007/s10845-010-0476-2.
-
(2011)
Journal of Intelligent Manufacturing
-
-
Qu, T.1
Yang, H.D.2
Huang, G.Q.3
Zhang, Y.F.4
Luo, H.5
Qin, W.6
-
27
-
-
0030086382
-
Role-based access control models
-
Sandhu, R.; Coyne, E. J. Feinstein, et al. (1996). Role-based access control models. IEEE Computer, 29(2), 38-47.
-
(1996)
IEEE Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.1
Coyne, E.J.2
Feinstein, E.3
-
28
-
-
78650069752
-
New role-based access control in ubiquitous e-business environment
-
10.1007/s10845-008-0208-z
-
Sejong O. H. (2010) New role-based access control in ubiquitous e-business environment. Journal of Intelligent Manufacturing 21: 607-612
-
(2010)
Journal of Intelligent Manufacturing
, vol.21
, pp. 607-612
-
-
Sejong, O.H.1
-
29
-
-
28244460211
-
Secure interoperation in a multi-domain environment employing RBAC policies
-
10.1109/TKDE.2005.185
-
Shafiq B.; Joshi J. B. D.; Bertino E. et al (2005) Secure interoperation in a multi-domain environment employing RBAC policies. IEEE Transactions on Knowledge and Data Engineering 17(11): 1557-1577
-
(2005)
IEEE Transactions on Knowledge and Data Engineering
, vol.17
, Issue.11
, pp. 1557-1577
-
-
Shafiq, B.1
Joshi, J.B.D.2
Bertino, E.3
-
30
-
-
78650047658
-
A telebiometric system mechanism model and biometric network protocol for the security of networked manufacturing
-
10.1007/s10845-009-0242-5
-
Shin Y.; Shin W. (2010) A telebiometric system mechanism model and biometric network protocol for the security of networked manufacturing. Journal of Intelligent Manufacturing 21: 595-605
-
(2010)
Journal of Intelligent Manufacturing
, vol.21
, pp. 595-605
-
-
Shin, Y.1
Shin, W.2
-
31
-
-
67349124845
-
Specification and enforcement of flexible security policy for active cooperation
-
10.1016/j.ins.2009.01.040
-
Sun Y. Q.; Gong B.; Meng X. X. et al (2009) Specification and enforcement of flexible security policy for active cooperation. Information Sciences 179(15): 2629-2642
-
(2009)
Information Sciences
, vol.179
, Issue.15
, pp. 2629-2642
-
-
Sun, Y.Q.1
Gong, B.2
Meng, X.X.3
-
32
-
-
84896390800
-
The industrial security management model for SMBs in smart work
-
doi: 10.1007/s10845-012-0651-8
-
Yanghoon, K. I. M.; & Hangbae, C. (2012). The industrial security management model for SMBs in smart work. Journal of Intelligent Manufacturing. doi: 10.1007/s10845-012-0651-8.
-
(2012)
Journal of Intelligent Manufacturing
-
-
Yanghoon, K.I.M.1
Hangbae, C.2
|