메뉴 건너뛰기




Volumn 25, Issue 3, 2014, Pages 413-425

The resource access authorization route problem in a collaborative manufacturing system

Author keywords

Access control; Authorization route problem; Collaborative manufacturing system; Intelligent planning

Indexed keywords

ACCESS CONTROL; ACCIDENT PREVENTION; COMPUTER AIDED MANUFACTURING; INFORMATION SYSTEMS; SECURITY SYSTEMS; SEMANTICS;

EID: 84901399247     PISSN: 09565515     EISSN: 15728145     Source Type: Journal    
DOI: 10.1007/s10845-012-0690-1     Document Type: Article
Times cited : (3)

References (33)
  • 2
    • 84896400561 scopus 로고    scopus 로고
    • Information security strategies: Towards an organizational multi-strategy perspective
    • doi: 10.1007/s10845-012-0683-0
    • Ahmad, A.; Maynard, S. B.; & Park, S. (2012). Information security strategies: Towards an organizational multi-strategy perspective. Journal of Intelligent Manufacturing, doi: 10.1007/s10845-012-0683-0.
    • (2012) Journal of Intelligent Manufacturing
    • Ahmad, A.1    Maynard, S.B.2    Park, S.3
  • 4
    • 0031074857 scopus 로고    scopus 로고
    • Fast planning through planning graph analysis
    • 10.1016/S0004-3702(96)00047-1
    • Blum A.; Furst M. L. (1997) Fast planning through planning graph analysis. Artificial Intelligence 90(1-2): 281-300
    • (1997) Artificial Intelligence , vol.90 , Issue.1-2 , pp. 281-300
    • Blum, A.1    Furst, M.L.2
  • 5
    • 40849116532 scopus 로고    scopus 로고
    • Distributed access control architecture and model for supporting collaboration and concurrency in dynamic virtual enterprises
    • 10.1080/09511920701196950
    • Chen T. Y.; Chen Y. M.; Chu H. C. et al (2008) Distributed access control architecture and model for supporting collaboration and concurrency in dynamic virtual enterprises. International Journal of Computer Integrated Manufacturing 21(3): 301-324
    • (2008) International Journal of Computer Integrated Manufacturing , vol.21 , Issue.3 , pp. 301-324
    • Chen, T.Y.1    Chen, Y.M.2    Chu, H.C.3
  • 6
    • 33947603006 scopus 로고    scopus 로고
    • Secure resource sharing on cross-organization collaborationusing a novel trust method
    • 10.1016/j.rcim.2006.04.005
    • Chen T. Y.; Chen Y. M.; Wang C. B. et al (2007) Secure resource sharing on cross-organization collaborationusing a novel trust method. Robotics and Computer-Integrated Manufacturing 23(4): 421-435
    • (2007) Robotics and Computer-Integrated Manufacturing , vol.23 , Issue.4 , pp. 421-435
    • Chen, T.Y.1    Chen, Y.M.2    Wang, C.B.3
  • 9
    • 78249256998 scopus 로고    scopus 로고
    • Permission to speak: A logic for access control and conformance
    • 10.1016/j.jlap.2009.12.002
    • Dinesh N.; Joshi A.; Lee I. et al (2011) Permission to speak: A logic for access control and conformance. Journal of Logic and Algebraic Programming 80(1): 50-74
    • (2011) Journal of Logic and Algebraic Programming , vol.80 , Issue.1 , pp. 50-74
    • Dinesh, N.1    Joshi, A.2    Lee, I.3
  • 10
    • 24644445703 scopus 로고    scopus 로고
    • Conformance checking of RBAC policyand its implementation
    • Frode H.; Vladimir O. (2005) Conformance checking of RBAC policyand its implementation. Lecture Notes in Computer Science 34(39): 144-155
    • (2005) Lecture Notes in Computer Science , vol.34 , Issue.39 , pp. 144-155
    • Frode, H.1    Vladimir, O.2
  • 11
    • 0032665038 scopus 로고    scopus 로고
    • Value of information in capacitated supply chains
    • 10.1287/mnsc.45.1.16
    • Gavirneni S.; Kapuscinski R.; Tayur S. (1999) Value of information in capacitated supply chains. Management Science 45(1): 16-24
    • (1999) Management Science , vol.45 , Issue.1 , pp. 16-24
    • Gavirneni, S.1    Kapuscinski, R.2    Tayur, S.3
  • 14
    • 49049107518 scopus 로고    scopus 로고
    • Extending analytical target cascading for optimal configuration of supply chains with alternative autonomous suppliers
    • 10.1016/j.ijpe.2008.04.008
    • Huang G. Q.; Qu T. (2008) Extending analytical target cascading for optimal configuration of supply chains with alternative autonomous suppliers. International Journal of Production Economics 115: 39-54
    • (2008) International Journal of Production Economics , vol.115 , pp. 39-54
    • Huang, G.Q.1    Qu, T.2
  • 17
    • 11044223672 scopus 로고    scopus 로고
    • Access control language for multidomain environments
    • 10.1109/MIC.2004.53
    • Joshi J. B. D.; Bhatti R.; Bertino E. et al (2004) Access control language for multidomain environments. IEEE Internet Computing 8(6): 40-50
    • (2004) IEEE Internet Computing , vol.8 , Issue.6 , pp. 40-50
    • Joshi, J.B.D.1    Bhatti, R.2    Bertino, E.3
  • 18
    • 67349151773 scopus 로고    scopus 로고
    • Towards secure dynamic collaborations with group-based RBAC model
    • 10.1016/j.cose.2008.12.004
    • Li Q.; Zhang X. W.; Xu M. W. et al (2009) Towards secure dynamic collaborations with group-based RBAC model. Computers & Security 28(5): 260-275
    • (2009) Computers & Security , vol.28 , Issue.5 , pp. 260-275
    • Li, Q.1    Zhang, X.W.2    Xu, M.W.3
  • 19
    • 67349089965 scopus 로고    scopus 로고
    • Task-activity based access control for process collaboration environments
    • 10.1016/j.compind.2009.02.009
    • Lu Y. H.; Zhang L.; Sun J. G. (2009) Task-activity based access control for process collaboration environments. Computers in Industry 60(6): 403-415
    • (2009) Computers in Industry , vol.60 , Issue.6 , pp. 403-415
    • Lu, Y.H.1    Zhang, L.2    Sun, J.G.3
  • 20
    • 79955750095 scopus 로고    scopus 로고
    • Annotation-based access control for collaborative information spaces
    • 10.1016/j.chb.2010.07.030
    • Nasirifard P.; Peristeras V.; Decker S. (2011) Annotation-based access control for collaborative information spaces. Computers in Human Behavior 27(4): 1352-1364
    • (2011) Computers in Human Behavior , vol.27 , Issue.4 , pp. 1352-1364
    • Nasirifard, P.1    Peristeras, V.2    Decker, S.3
  • 21
    • 0342995810 scopus 로고    scopus 로고
    • Reliable and secure communications infrastructure for virtual enterprises
    • 10.1023/A:1011204627577
    • Osório L.; Barata Manuel M. (2001) Reliable and secure communications infrastructure for virtual enterprises. Journal of Intelligent Manufacturing 12: 171-183
    • (2001) Journal of Intelligent Manufacturing , vol.12 , pp. 171-183
    • Osório, L.1    Barata Manuel, M.2
  • 22
    • 77956058829 scopus 로고    scopus 로고
    • A generic analytical target cascading optimization system for decentralized supply chain configuration over supply chain grid
    • 10.1016/j.ijpe.2009.08.008
    • Qu T.; Huang G. Q.; Zhang Y. F. et al (2009) A generic analytical target cascading optimization system for decentralized supply chain configuration over supply chain grid. International Journal of Production Economics 127: 262-277
    • (2009) International Journal of Production Economics , vol.127 , pp. 262-277
    • Qu, T.1    Huang, G.Q.2    Zhang, Y.F.3
  • 23
    • 79551643917 scopus 로고    scopus 로고
    • Two-stage product platform development for mass customization
    • 10.1080/00207541003738881
    • Qu T.; Bin S.; Huang G. Q.; Yang H. D. (2010) Two-stage product platform development for mass customization. International Journal of Production Research 49(8): 2197-2219
    • (2010) International Journal of Production Research , vol.49 , Issue.8 , pp. 2197-2219
    • Qu, T.1    Bin, S.2    Huang, G.Q.3    Yang, H.D.4
  • 24
    • 84870947362 scopus 로고    scopus 로고
    • A case of implementing RFID-based real-time shop-floor material management for household electrical appliance manufacturers
    • doi: 10.1007/s10845-010-0476-2
    • Qu, T.; Yang, H. D.; Huang, G. Q.; Zhang, Y. F.; Luo, H.; & Qin, W. (2011). A case of implementing RFID-based real-time shop-floor material management for household electrical appliance manufacturers. Journal of Intelligent Manufacturing, doi: 10.1007/s10845-010-0476-2.
    • (2011) Journal of Intelligent Manufacturing
    • Qu, T.1    Yang, H.D.2    Huang, G.Q.3    Zhang, Y.F.4    Luo, H.5    Qin, W.6
  • 27
    • 0030086382 scopus 로고    scopus 로고
    • Role-based access control models
    • Sandhu, R.; Coyne, E. J. Feinstein, et al. (1996). Role-based access control models. IEEE Computer, 29(2), 38-47.
    • (1996) IEEE Computer , vol.29 , Issue.2 , pp. 38-47
    • Sandhu, R.1    Coyne, E.J.2    Feinstein, E.3
  • 28
    • 78650069752 scopus 로고    scopus 로고
    • New role-based access control in ubiquitous e-business environment
    • 10.1007/s10845-008-0208-z
    • Sejong O. H. (2010) New role-based access control in ubiquitous e-business environment. Journal of Intelligent Manufacturing 21: 607-612
    • (2010) Journal of Intelligent Manufacturing , vol.21 , pp. 607-612
    • Sejong, O.H.1
  • 29
    • 28244460211 scopus 로고    scopus 로고
    • Secure interoperation in a multi-domain environment employing RBAC policies
    • 10.1109/TKDE.2005.185
    • Shafiq B.; Joshi J. B. D.; Bertino E. et al (2005) Secure interoperation in a multi-domain environment employing RBAC policies. IEEE Transactions on Knowledge and Data Engineering 17(11): 1557-1577
    • (2005) IEEE Transactions on Knowledge and Data Engineering , vol.17 , Issue.11 , pp. 1557-1577
    • Shafiq, B.1    Joshi, J.B.D.2    Bertino, E.3
  • 30
    • 78650047658 scopus 로고    scopus 로고
    • A telebiometric system mechanism model and biometric network protocol for the security of networked manufacturing
    • 10.1007/s10845-009-0242-5
    • Shin Y.; Shin W. (2010) A telebiometric system mechanism model and biometric network protocol for the security of networked manufacturing. Journal of Intelligent Manufacturing 21: 595-605
    • (2010) Journal of Intelligent Manufacturing , vol.21 , pp. 595-605
    • Shin, Y.1    Shin, W.2
  • 31
    • 67349124845 scopus 로고    scopus 로고
    • Specification and enforcement of flexible security policy for active cooperation
    • 10.1016/j.ins.2009.01.040
    • Sun Y. Q.; Gong B.; Meng X. X. et al (2009) Specification and enforcement of flexible security policy for active cooperation. Information Sciences 179(15): 2629-2642
    • (2009) Information Sciences , vol.179 , Issue.15 , pp. 2629-2642
    • Sun, Y.Q.1    Gong, B.2    Meng, X.X.3
  • 32
    • 84896390800 scopus 로고    scopus 로고
    • The industrial security management model for SMBs in smart work
    • doi: 10.1007/s10845-012-0651-8
    • Yanghoon, K. I. M.; & Hangbae, C. (2012). The industrial security management model for SMBs in smart work. Journal of Intelligent Manufacturing. doi: 10.1007/s10845-012-0651-8.
    • (2012) Journal of Intelligent Manufacturing
    • Yanghoon, K.I.M.1    Hangbae, C.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.