메뉴 건너뛰기




Volumn 28, Issue 1, 2014, Pages 243-268

A survey of privacy-aware supply chain collaboration: From theory to applications

Author keywords

Optimization; Privacy; Supply chain management

Indexed keywords


EID: 84903184001     PISSN: 08887985     EISSN: 15587959     Source Type: Journal    
DOI: 10.2308/isys-50692     Document Type: Article
Times cited : (32)

References (104)
  • 5
    • 0002591736 scopus 로고
    • Local optimization of global objectives: Competitive distributed deadlock resolution and resource allocation
    • In Available at
    • Awerbuch, B., and Y. Azar. 1994. Local optimization of global objectives: Competitive distributed deadlock resolution and resource allocation. In Proceedings of IEEE Symposium on Foundations of Computer Science, 240-249. Available at: http://www.cs.tau.ac.il/;azar/conc.pdf
    • (1994) Proceedings of IEEE Symposium on Foundations of Computer Science , pp. 240-249
    • Awerbuch, B.1    Azar, Y.2
  • 7
    • 77949293665 scopus 로고    scopus 로고
    • Information security in networked supply chains: Impact of network vulnerability and supply chain integration on incentives to invest
    • Bandyopadhyay, T., V. S. Jacob, and S. Raghunathan. 2010. Information security in networked supply chains: Impact of network vulnerability and supply chain integration on incentives to invest. Information Technology and Management 11 (1): 7-23.
    • (2010) Information Technology and Management , vol.11 , Issue.1 , pp. 7-23
    • Bandyopadhyay, T.1    Jacob, V.S.2    Raghunathan, S.3
  • 8
    • 0001415601 scopus 로고
    • Fair distribution protocols or how the players replace fortune
    • Barany, I. 1992. Fair distribution protocols or how the players replace fortune. Mathematics of Operations Research 17 (2): 327-340.
    • (1992) Mathematics of Operations Research , vol.17 , Issue.2 , pp. 327-340
    • Barany, I.1
  • 9
    • 11144283310 scopus 로고    scopus 로고
    • Fast, distributed approximation algorithms for positive linear programming with applications to flow control
    • Bartal, Y., J. W. Byers, and D. Raz. 2004. Fast, distributed approximation algorithms for positive linear programming with applications to flow control. SIAM Journal on Computing 33 (6): 1261-1279.
    • (2004) SIAM Journal on Computing , vol.33 , Issue.6 , pp. 1261-1279
    • Bartal, Y.1    Byers, J.W.2    Raz, D.3
  • 13
    • 84898960610 scopus 로고    scopus 로고
    • Completeness theorems for non-cryptographic faulttolerant distributed computation
    • In Available at
    • Ben-Or, M., S. Goldwasser, and A. Wigderson. 1998. Completeness theorems for non-cryptographic faulttolerant distributed computation. In Proceedings of the 20th Annual ACM Symposium on Theory of Computing, 1-10. Available at: http://www.researchgate.net/publication/221590203_Completeness_ Theorems_for_Non-Cryptographic_Fault-Tolerant_Distributed_Computation_%28Extended_ Abstract%29
    • (1998) Proceedings of the 20th Annual ACM Symposium on Theory of Computing , pp. 1-10
    • Ben-Or, M.1    Goldwasser, S.2    Wigderson, A.3
  • 14
    • 0000621526 scopus 로고    scopus 로고
    • Correlation without mediation: Expanding the set of equilibrium outcomes by "cheap" pre-play procedures
    • Ben-Porath, E. 1998. Correlation without mediation: Expanding the set of equilibrium outcomes by "cheap" pre-play procedures. Journal of Economic Theory 80 (1): 108-122.
    • (1998) Journal of Economic Theory , vol.80 , Issue.1 , pp. 108-122
    • Ben-Porath, E.1
  • 18
    • 33744793469 scopus 로고    scopus 로고
    • Procuring fast delivery: Sole sourcing with information asymmetry
    • Cachon, G. P., and F. Zhang. 2006. Procuring fast delivery: Sole sourcing with information asymmetry. Management Science 52 (6): 881-896.
    • (2006) Management Science , vol.52 , Issue.6 , pp. 881-896
    • Cachon, G.P.1    Zhang, F.2
  • 21
    • 32844458303 scopus 로고    scopus 로고
    • On the limitations of universally composable two-party computation without set-up assumptions
    • An extended abstract appeared in Eurocrypt 2003. New York, NY: Springer-Verlag (LNCS 2656), 68-86
    • Canetti, R., E. Kushilevitz, and Y. Lindell. 2006. On the limitations of universally composable two-party computation without set-up assumptions. Journal of Cryptology 19 (2): 135-167. An extended abstract appeared in Eurocrypt 2003. New York, NY: Springer-Verlag (LNCS 2656), 68-86.
    • (2006) Journal of Cryptology , vol.19 , Issue.2 , pp. 135-167
    • Canetti, R.1    Kushilevitz, E.2    Lindell, Y.3
  • 27
    • 33751092054 scopus 로고    scopus 로고
    • Competition and confidentiality: Signaling quality in a duopoly when there is universal private information
    • Daughety, A., and J. Reinganum. 2007. Competition and confidentiality: Signaling quality in a duopoly when there is universal private information. Games and Economic Behavior 58 (1): 94-120.
    • (2007) Games and Economic Behavior , vol.58 , Issue.1 , pp. 94-120
    • Daughety, A.1    Reinganum, J.2
  • 36
    • 30344462995 scopus 로고    scopus 로고
    • The economic incentives for sharing security information
    • Gal-Or, E., and A. Ghose. 2005. The economic incentives for sharing security information. Information Systems Research 16 (2): 186-208.
    • (2005) Information Systems Research , vol.16 , Issue.2 , pp. 186-208
    • Gal-Or, E.1    Ghose, A.2
  • 37
    • 0347662287 scopus 로고    scopus 로고
    • Unmediated communication in games with complete and incomplete information
    • Gerardi, D. 2004. Unmediated communication in games with complete and incomplete information. Journal of Economic Theory 114 (1): 104-131.
    • (2004) Journal of Economic Theory , vol.114 , Issue.1 , pp. 104-131
    • Gerardi, D.1
  • 38
    • 0023545076 scopus 로고
    • How to play any mental game or a completeness theorem for protocols with honest majority
    • In Available at
    • Goldreich, O., S. Micali, and A. Wigderson. 1987. How to play any mental game or a completeness theorem for protocols with honest majority. In Proceedings of the 19th ACM Symposium on Theory of Computing, 218-229. Available at: http://www.bibsonomy.org/bibtex/211382b846bc9c7535d 37daf703a9a00f/danfunky
    • (1987) Proceedings of the 19th ACM Symposium on Theory of Computing , pp. 218-229
    • Goldreich, O.1    Micali, S.2    Wigderson, A.3
  • 39
    • 84903187785 scopus 로고    scopus 로고
    • Chapter 5: Encryption schemes
    • In Cambridge, MA: Cambridge University Press
    • Goldreich, O. 2004. Chapter 5: Encryption schemes. In The Foundations of Cryptography, Volume 2. Cambridge, MA: Cambridge University Press.
    • (2004) The Foundations of Cryptography , vol.2
    • Goldreich, O.1
  • 40
    • 84955564077 scopus 로고
    • Fair computation of general functions in presence of immoral majority
    • In New York, NY: Springer-Verlag. Available at
    • Goldwasser, S., and L. A. Levin. 1991. Fair computation of general functions in presence of immoral majority. In CRYPTO '90: Proceedings of the 10th Annual International Cryptology Conference on Advances in Cryptology, 77-93. New York, NY: Springer-Verlag. Available at: http://www. researchgate.net/publication/221355525_Fair_Computation_of_General_Functions_in_Presence_of_ Immoral_Majority
    • (1991) CRYPTO '90: Proceedings of the 10th Annual International Cryptology Conference on Advances in Cryptology , pp. 77-93
    • Goldwasser, S.1    Levin, L.A.2
  • 45
    • 84872255959 scopus 로고    scopus 로고
    • Secure and efficient distributed linear programming
    • Hong, Y., J. Vaidya, and H. Lu. 2012a. Secure and efficient distributed linear programming. Journal of Computer Security 20 (5): 583-634.
    • (2012) Journal of Computer Security , vol.20 , Issue.5 , pp. 583-634
    • Hong, Y.1    Vaidya, J.2    Lu, H.3
  • 48
    • 84892875548 scopus 로고    scopus 로고
    • An inference-proof approach to privacy-preserving horizontally partitioned linear programs
    • Hong, Y., and J. Vaidya. 2013a. An inference-proof approach to privacy-preserving horizontally partitioned linear programs. Optimization Letters 8 (1): 267-277.
    • (2013) Optimization Letters , vol.8 , Issue.1 , pp. 267-277
    • Hong, Y.1    Vaidya, J.2
  • 49
    • 84903194529 scopus 로고    scopus 로고
    • Secure transformation for multiparty linear programming
    • Available at
    • Hong, Y., and J. Vaidya. 2013b. Secure transformation for multiparty linear programming. Rutgers Technical Report. Available at: http://www.albany.edu/faculty/hong/pub/SecTran.pdf
    • (2013) Rutgers Technical Report
    • Hong, Y.1    Vaidya, J.2
  • 51
    • 84875272475 scopus 로고    scopus 로고
    • Delegation vs. control of component procurement under asymmetric cost information and simple contracts
    • Kayis, E., F. Erhun, and E. L. Plambeck. 2013. Delegation vs. control of component procurement under asymmetric cost information and simple contracts. Manufacturing and Service Operations Management 15 (1): 45-56.
    • (2013) Manufacturing and Service Operations Management , vol.15 , Issue.1 , pp. 45-56
    • Kayis, E.1    Erhun, F.2    Plambeck, E.L.3
  • 52
    • 84874161687 scopus 로고    scopus 로고
    • Collaborative cost reduction and component procurement under information asymmetry
    • Kim, S. H., and S. Netessine. 2013. Collaborative cost reduction and component procurement under information asymmetry. Management Science 59 (1): 189-206.
    • (2013) Management Science , vol.59 , Issue.1 , pp. 189-206
    • Kim, S.H.1    Netessine, S.2
  • 53
    • 26444479778 scopus 로고
    • Optimization by simulated annealing
    • Kirkpatrick, S., C. D. Gelatt, and M. P. Vecchi. 1983. Optimization by simulated annealing. Science 220 (4598): 671-680.
    • (1983) Science , vol.220 , Issue.4598 , pp. 671-680
    • Kirkpatrick, S.1    Gelatt, C.D.2    Vecchi, M.P.3
  • 56
    • 68349114917 scopus 로고    scopus 로고
    • Second sourcing vs. sole sourcing with capacity investment and asymmetric information
    • Li, C., and L. G. Debo. 2009. Second sourcing vs. sole sourcing with capacity investment and asymmetric information. Manufacturing & Service Operations Management 11 (3): 448-470.
    • (2009) Manufacturing & Service Operations Management , vol.11 , Issue.3 , pp. 448-470
    • Li, C.1    Debo, L.G.2
  • 58
    • 61849158326 scopus 로고    scopus 로고
    • Confidentiality and information sharing in supply chain coordination
    • Li, L., and H. Zhang. 2008. Confidentiality and information sharing in supply chain coordination. Management Science 54 (8): 1467-1481.
    • (2008) Management Science , vol.54 , Issue.8 , pp. 1467-1481
    • Li, L.1    Zhang, H.2
  • 59
    • 84872266260 scopus 로고    scopus 로고
    • Privacy-preserving horizontally partitioned linear programs with inequality constraints
    • Li, W., H. Li, and C. Deng. 2013. Privacy-preserving horizontally partitioned linear programs with inequality constraints. Optimization Letters 7 (1): 137-144.
    • (2013) Optimization Letters , vol.7 , Issue.1 , pp. 137-144
    • Li, W.1    Li, H.2    Deng, C.3
  • 60
    • 0035351881 scopus 로고    scopus 로고
    • Producer-supplier contracts with incomplete information
    • Lim, W. S. 2001. Producer-supplier contracts with incomplete information. Management Science 47 (5): 709-715.
    • (2001) Management Science , vol.47 , Issue.5 , pp. 709-715
    • Lim, W.S.1
  • 61
    • 19744365747 scopus 로고    scopus 로고
    • Privacy preserving clustering with distributed EM mixture modeling
    • Lin, X., C. Clifton, and M. Zhu. 2005. Privacy preserving clustering with distributed EM mixture modeling. Knowledge and Information Systems 8 (1): 68-81.
    • (2005) Knowledge and Information Systems , vol.8 , Issue.1 , pp. 68-81
    • Lin, X.1    Clifton, C.2    Zhu, M.3
  • 64
    • 0345412673 scopus 로고    scopus 로고
    • General composition and universal composability in secure multiparty computation
    • In Available at
    • Lindell, Y. 2003b. General composition and universal composability in secure multiparty computation. In Proceedings of the 44th Symposium on Foundations of Computer Science, 394-403. Available at: http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=1238213
    • (2003) Proceedings of the 44th Symposium on Foundations of Computer Science , pp. 394-403
    • Lindell, Y.1
  • 66
    • 78650750065 scopus 로고    scopus 로고
    • Privacy-preserving linear programming
    • Mangasarian, O. L. 2011. Privacy-preserving linear programming. Optimization Letters 5 (1): 165-172.
    • (2011) Optimization Letters , vol.5 , Issue.1 , pp. 165-172
    • Mangasarian, O.L.1
  • 67
    • 84857650296 scopus 로고    scopus 로고
    • Privacy-preserving horizontally partitioned linear programs
    • Mangasarian, O. L. 2012. Privacy-preserving horizontally partitioned linear programs. Optimization Letters 6 (3): 431-436.
    • (2012) Optimization Letters , vol.6 , Issue.3 , pp. 431-436
    • Mangasarian, O.L.1
  • 68
    • 84898169962 scopus 로고    scopus 로고
    • Information security and economics in computer networks: An interdisciplinary survey and a proposal of integrated optimization of investment
    • In Available at
    • Matsuura, K. 2003. Information security and economics in computer networks: An interdisciplinary survey and a proposal of integrated optimization of investment. In Proceedings of the 9th International Conference of Computing in Economics and Finance. Available at: http://depts.washington.edu/ sce2003/Papers/48.pdf
    • (2003) Proceedings of the 9th International Conference of Computing in Economics and Finance
    • Matsuura, K.1
  • 69
    • 84865091365 scopus 로고    scopus 로고
    • Integrating carrier selection with supplier selection decisions to improve supply chain security
    • Meixell, M. J., and M. Norbis. 2012. Integrating carrier selection with supplier selection decisions to improve supply chain security. International Transactions in Operations Research 19 (5): 711-732.
    • (2012) International Transactions in Operations Research , vol.19 , Issue.5 , pp. 711-732
    • Meixell, M.J.1    Norbis, M.2
  • 71
    • 68349095250 scopus 로고    scopus 로고
    • Privacy protection and technology diffusion: The case of electronic medical records
    • Miller, A. R., and C. Tucker. 2009. Privacy protection and technology diffusion: The case of electronic medical records. Management Science 55 (7): 1077-1093.
    • (2009) Management Science , vol.55 , Issue.7 , pp. 1077-1093
    • Miller, A.R.1    Tucker, C.2
  • 74
    • 58849111529 scopus 로고    scopus 로고
    • Allocating costs in a collaborative transportation procurement network
    • Özener, Ö., and Ö. Ergun 2008. Allocating costs in a collaborative transportation procurement network. Transportation Science 42 (2): 146-165.
    • (2008) Transportation Science , vol.42 , Issue.2 , pp. 146-165
    • Özener, O.1    Ergun, O.2
  • 79
    • 72949124366 scopus 로고    scopus 로고
    • An efficient constraint optimization method for large multiagent systems
    • In Available at
    • Petcu, A., and B. Faltings. 2005b. An efficient constraint optimization method for large multiagent systems. In Proceedings of AAMAS05-LSMAS Workshop. Available at: http://citeseerx.ist.psu.edu/viewdoc/ summary?doi=10.1.1.385.5116
    • (2005) Proceedings of AAMAS05-LSMAS Workshop
    • Petcu, A.1    Faltings, B.2
  • 80
    • 84903133680 scopus 로고    scopus 로고
    • Incentive compatible multiagent constraint optimization
    • In Available at
    • Petcu, A., and B. Faltings. 2005c. Incentive compatible multiagent constraint optimization. In Proceedings of WINE'05: Workshop on Internet and Network Economics. Available at: http://citeseer.ist.psu.edu/ viewdoc/summary;jsessionid=BBADCA8B49538E3E4BE6244CEDC970D8?doi=10.1.1.385.9181
    • (2005) Proceedings of WINE'05: Workshop on Internet and Network Economics
    • Petcu, A.1    Faltings, B.2
  • 81
    • 84903172262 scopus 로고    scopus 로고
    • Optimal solution stability in continuous time optimization
    • In (DCR05). Available at
    • Petcu, A., and B. Faltings. 2005d. Optimal solution stability in continuous time optimization. In Proceedings of IJCAI05-Distributed Constraint Reasoning Workshop (DCR05). Available at: http:// citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.108.5650
    • (2005) Proceedings of IJCAI05-Distributed Constraint Reasoning Workshop
    • Petcu, A.1    Faltings, B.2
  • 83
    • 29344456460 scopus 로고    scopus 로고
    • Superstabilizing, fault-containing multiagent combinatorial optimization
    • In (AAAI-05), Available at
    • Petcu, A., and B. Faltings. 2005f. Superstabilizing, fault-containing multiagent combinatorial optimization. In Proceedings of the National Conference on Artificial Intelligence (AAAI-05), 449-454. Available at: https://www.aaai.org/Papers/AAAI/2005/AAAI05-071.pdf
    • (2005) Proceedings of the National Conference on Artificial Intelligence , pp. 449-454
    • Petcu, A.1    Faltings, B.2
  • 85
    • 77249136766 scopus 로고    scopus 로고
    • Information sharing in a long-term supply chain relationship: The role of customer review strategy
    • Ren, Z. J., M. A. Cohen, T. H. Ho, and C. Terwiesch. 2010. Information sharing in a long-term supply chain relationship: The role of customer review strategy. Operations Research 58 (1): 81-93.
    • (2010) Operations Research , vol.58 , Issue.1 , pp. 81-93
    • Ren, Z.J.1    Cohen, M.A.2    Ho, T.H.3    Terwiesch, C.4
  • 86
    • 34548084042 scopus 로고    scopus 로고
    • A genetic algorithm for privacy preserving combinatorial optimization
    • In Available at
    • Sakuma, J., and S. Kobayashi. 2007. A genetic algorithm for privacy preserving combinatorial optimization. In Proceedings of 2007 Genetic and Evolutionary Computation Conference, 1372-1379. Available at: http://dl.acm.org/citation.cfm?doid=1276958.1277214
    • (2007) Proceedings of 2007 Genetic and Evolutionary Computation Conference , pp. 1372-1379
    • Sakuma, J.1    Kobayashi, S.2
  • 91
    • 35248879821 scopus 로고    scopus 로고
    • Secure generalized Vickrey auction using homomorphic encryption
    • Suzuki, K., and M. Yokoo. 2003. Secure generalized Vickrey auction using homomorphic encryption. Financial Cryptography 2742: 239-249.
    • (2003) Financial Cryptography , vol.2742 , pp. 239-249
    • Suzuki, K.1    Yokoo, M.2
  • 93
    • 33750068376 scopus 로고    scopus 로고
    • Selecting correlated random actions
    • In Available at
    • Teague, V. 2004. Selecting correlated random actions. In Proceedings of Financial Cryptography, 181-195. Available at: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.11.1791
    • (2004) Proceedings of Financial Cryptography , pp. 181-195
    • Teague, V.1
  • 94
    • 0003497109 scopus 로고    scopus 로고
    • Chapter 2: Information technologies: Concepts and management
    • In 3rd Edition. New York, NY: John Wiley and Sons
    • Turban, E., R. K. Rainer, and R. E. Potter. 2005. Chapter 2: Information technologies: Concepts and management. In Introduction to Information Technology. 3rd Edition. New York, NY: John Wiley and Sons.
    • (2005) Introduction to Information Technology
    • Turban, E.1    Rainer, R.K.2    Potter, R.E.3
  • 96
    • 69249243704 scopus 로고    scopus 로고
    • Privacy-preserving linear programming
    • In Available at
    • Vaidya, J. 2009a. Privacy-preserving linear programming. In Proceedings of the 24th Annual ACM Symposium on Applied Computing, 2002-2007. Available at: http://dl.acm.org/citation.cfm? id=1529729&CFID=403945105&CFTOKEN=15350398
    • (2009) Proceedings of the 24th Annual ACM Symposium on Applied Computing , pp. 2002-2007
    • Vaidya, J.1
  • 100
    • 0002818660 scopus 로고
    • Distributed breakout algorithm for solving distributed constraint satisfaction problems
    • In edited by Lesser, V. Cambridge, MA: MIT Press
    • Yokoo, M., and K. Hirayama. 1995. Distributed breakout algorithm for solving distributed constraint satisfaction problems. In Proceedings of the First International Conference on Multi-Agent Systems, edited by Lesser, V. Cambridge, MA: MIT Press.
    • (1995) Proceedings of the First International Conference on Multi-Agent Systems
    • Yokoo, M.1    Hirayama, K.2
  • 101
    • 84957005324 scopus 로고    scopus 로고
    • Secure distributed constraint satisfaction: Reaching agreement without revealing private information
    • In (CP-2002), Available at
    • Yokoo, M., K. Suzuki, and K. Hirayama. 2002. Secure distributed constraint satisfaction: Reaching agreement without revealing private information. In Proceedings of the Eighth International Conference on Principles and Practice of Constraint Programming (CP-2002), 387-401. Available at: http://www.researchgate.net/publication/221633421_Secure_Distributed_Constraint_ Satisfaction_Reaching_Agreement_without_Revealing_Private_Information
    • (2002) Proceedings of the Eighth International Conference on Principles and Practice of Constraint Programming , pp. 387-401
    • Yokoo, M.1    Suzuki, K.2    Hirayama, K.3
  • 102
    • 84862294667 scopus 로고    scopus 로고
    • Secure collaboration in global design and supply chain environment: Problem analysis and literature review
    • Zeng, Y., L. Wang, X. Deng, X. Cao, and N. Khundker. 2012. Secure collaboration in global design and supply chain environment: Problem analysis and literature review. Computers in Industry 63 (6): 545-556.
    • (2012) Computers in Industry , vol.63 , Issue.6 , pp. 545-556
    • Zeng, Y.1    Wang, L.2    Deng, X.3    Cao, X.4    Khundker, N.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.