https://doi.org/10.1007/s10845-011-0527-3
Journal: Journal of Intelligent Manufacturing, 2011, №4, p.1351-1364
Publisher: Springer Science and Business Media LLC
Authors: Da Yong Zhang, Xinlin Cao, Lingyu Wang, Yong Zeng
List of references
- Aissaoui N., Haouari M., Hassini E. (2007) Supplier selection and order lot sizing modeling: A review. Computers & Operations Research 34(12): 3516–3540
https://doi.org/10.1016/j.cor.2006.01.016 - Anand K. S., Goyal M. (2009) Strategic information management under leakage in a supply chain. Management Science 55(3): 438–452
https://doi.org/10.1287/mnsc.1080.0930 - Atallah, M. J., Elmongui, H. G., Deshpande, V., & Schwarz, L. B. (2003). Secure supply-chain protocols. In: Proceedings of IEEE international conference on E-commerce 2003 (pp. 293–302).
- Barnhart C., Johnson E. L., Nemhauser G. L., Savelsbergh M. W. P., Vance P. H. (1998) Branch-and-price: Column generation for solving huge integer programs. Operations Research 46(3): 316–329. doi: 10.1287/opre.46.3.316
https://doi.org/10.1287/opre.46.3.316 - Carrera D., Mayorga R. (2008) Supply chain management: A modular fuzzy inference system approach in supplier selection for new product development. Journal of Intelligent Manufacturing 19(1): 1–12
https://doi.org/10.1007/s10845-007-0041-9 - Cera C. D., Braude I., Kim T., Han J., Regli W. C. (2006) Hierarchical role-based viewing for multi-level information security in collaborative CAD. Journal of Computing and Information Science in Engineering 6(1): 2–10
https://doi.org/10.1115/1.2161226 - Cera C. D., Kim T., Han J., Regli W. C. (2004) Role-based viewing envelopes for information protection in collaborative modeling. Computer-Aided Design 36(9): 873–886
https://doi.org/10.1016/j.cad.2003.09.014 - Chen L., Song Z., Feng L. (2004) Internet-enabled real-time collaborative assembly modeling via an e-assembly system: Status and promise. Computer-Aided Design 36(9): 835–847
https://doi.org/10.1016/j.cad.2003.09.010 - Chen S. J. G., Huang E. (2007) A systematic approach for supply chain improvement using design structure matrix. Journal of Intelligent Manufacturing 18(2): 285–299
https://doi.org/10.1007/s10845-007-0022-z - Chen T. Y., Chen Y. M., Chu H. C. (2008) Developing a trust evaluation method between co-workers in virtual project team for enabling resource sharing and collaboration. Computers in Industry 59(6): 565–579
https://doi.org/10.1016/j.compind.2008.01.001 - Christopher M., Lee H. (2004) Mitigating supply chain risk through improved confidence. International Journal of Physical Distribution & Logistics Management 34(5): 388–396
https://doi.org/10.1108/09600030410545436 - de Boer L., Labro E., Morlacchi P. (2001) A review of methods supporting supplier selection. European Journal of Purchasing & Supply Management 7(2): 75–89
https://doi.org/10.1016/S0969-7012(00)00028-9 - Demirtas E. A., Ustun O. (2008) An integrated multiobjective decision making process for supplier selection and order allocation. Omega 36(1): 76–90
https://doi.org/10.1016/j.omega.2005.11.003 - Demirtas E. A., Ustun O. (2009) Analytic network process and multi-period goal programming integration in purchasing decisions. Computers & Industrial Engineering 56(2): 677–690
https://doi.org/10.1016/j.cie.2006.12.006 - Dickson G. W. (1966) An analysis of vendor selection systems and decisions. Journal of Purchasing 2(1): 5–17
https://doi.org/10.1111/j.1745-493X.1966.tb00818.x - Ferraiolo D. F., Kuhn R., Sandhu R. S. (2007) RBAC standard rationale: Comments on a critique of the ANSI standard on role based access control. IEEE Security & Privacy 5(6): 51–53
https://doi.org/10.1109/MSP.2007.173 - Giunipero L. C., Eltantawy R. A. (2004) Securing the upstream supply chain: A risk management approach. International Journal of Physical Distribution & Logistics Management 34(9): 698–713
https://doi.org/10.1108/09600030410567478 - Goldreich, O., Micali, S., & Wigderson, A. (1987). How to play any mental game. In: Proceedings of the 19th annual ACM conference on theory of computing (pp. 218–229).
- Hoecht A., Trott P. (2006) Outsourcing, information leakage and the risk of losing technology-based competencies. European Business Review 18(5): 395–412
https://doi.org/10.1108/09555340610686967 - Huang G. Q., Lau J. S. K., Mak K. L. (2003) The impacts of sharing production information on supply chain dynamics: A review of the literature. International Journal of Production Research 41(7): 1483–1517
https://doi.org/10.1080/0020754031000069625 - Huang S. H., Keskar H. (2007) Comprehensive and configurable metrics for supplier selection. International Journal of Production Economics 105(2): 510–523
https://doi.org/10.1016/j.ijpe.2006.04.020 - Juttner U. (2005) Supply chain risk management: Understanding the business requirements from a practitioner perspective. The International Journal of Logistics Management 16(1): 120–141
https://doi.org/10.1108/09574090510617385 - Juttner U., Peck H., Christopher M. (2003) Supply chain risk management: Outlining an agenda for future research. International Journal of Logistics: Research and Applications 6(4): 197–210
https://doi.org/10.1080/13675560310001627016 - Kahraman C., Cebeci U., Ulukan Z. (2003) Multi-criteria supplier selection using fuzzy AHP. Logistics Information Management 16(6): 382–394
https://doi.org/10.1108/09576050310503367 - Khan O., Christopher M., Burnes B. (2008) The impact of product design on supply chain risk: A case study. International Journal of Physical Distribution & Logistics Management 38(5): 412–432
https://doi.org/10.1108/09600030810882834 - Kim K. Y., Wang Y., Muogboh O. S., Nnaji B. O. (2004) Design formalism for collaborative assembly design. Computer-Aided Design 36(9): 849–871
https://doi.org/10.1016/j.cad.2003.09.011 - Kim T., Cera C. D., Regli W. C., Choo H., Han J. (2006) Multi-level modeling and access control for data sharing in collaborative design. Advanced Engineering Informatics 20(1): 47–57
https://doi.org/10.1016/j.aei.2005.05.016 - Kubat, C., & Yuce, B. (2010). A hybrid intelligent approach for supply chain management system. Journal of Intelligent Manufacturing (in press).
- Lee A. H. I. (2009) A fuzzy supplier selection model with the consideration of benefits, opportunities, costs and risks. Expert Systems with Applications 36(2, Part 2): 2879–2893
https://doi.org/10.1016/j.eswa.2008.01.045 - Lee H. L., Whang S. (2000) Information sharing in a supply chain. International Journal of Manufacturing Technology and Management 1(1): 79–93
https://doi.org/10.1504/IJMTM.2000.001329 - Leong K. K., Yu K. M., Lee W. B. (2003) A security model for distributed product data management system. Computers in Industry 50(2): 179–193
https://doi.org/10.1016/S0166-3615(02)00119-7 - Li L. (2002) Information sharing in a supply chain with horizontal competition. Management Science 48(9): 1196–1212
https://doi.org/10.1287/mnsc.48.9.1196.177 - Li, H., & Geng, Y. (2008). Confidential information protection for industry design. Technical report, Concordia Institute for Information Systems Engineering, Concordia University, Montreal.
- Li, J., Xiong, N., Park, J., Liu, C., Ma, S., & Cho, S. (2009). Intelligent model design of cluster supply chain with horizontal cooperation. Journal of Intelligent Manufacturing, 1–15.
- Lindell Y., Pinkas B. (2002) Privacy preserving data mining. Journal of Cryptology 15(3): 177–206
https://doi.org/10.1007/s00145-001-0019-2 - Lockamy A. III, McCormack K. (2010) Analysing risks in supply networks to facilitate outsouring decisions. International Journal of Production Research 48(2): 593–611
https://doi.org/10.1080/00207540903175152 - Mason-Jones R., Towill D. R. (1998) Shrinking the supply chain uncertainty circle. Control 24(7): 17–22
- McCauley-Bell P. (1999) Intelligent agent characterization and uncertainty management with fuzzy set theory: A tool to support early supplier integration. Journal of Intelligent Manufacturing 10(2): 135–147
https://doi.org/10.1023/A:1008968419061 - Mun D., Hwang J., Han S. (2009) Protection of intellectual property based on a skeleton model in product design collaboration. Computer-Aided Design 41(9): 641–648
https://doi.org/10.1016/j.cad.2009.04.007 - Neiger D., Rotaru K., Churilov L. (2009) Supply chain risk identification with value-focused process engineering. Journal of Operations Management 27(2): 154–168
https://doi.org/10.1016/j.jom.2007.11.003 - Saaty T. L. (2004) Fundamentals of the analytic network process-multiple networks with benefits, opportunities, costs and risks. Journal of Systems Science and Systems Engineering 13(3): 348–379
https://doi.org/10.1007/s11518-006-0171-1 - Sandhu R. S., Coyne E. J., Feinstein H. L., Youman C. E. (1996) Role-based access control models. IEEE Computer 29(2): 38–47
https://doi.org/10.1109/2.485845 - Shyamsundar N., Gadh R. (2002) Collaborative virtual prototyping of product assemblies over the Internet. Computer-Aided Design 34(10): 755–768
https://doi.org/10.1016/S0010-4485(01)00204-4 - Sun, X., Zeng, Y., & Liu, W. (2010). Formalization of design chain management using environment-based design (EBD) theory. Journal of Intelligent Manufacturing (accepted).
- Svensson G. (2000) A conceptual framework for the analysis of vulnerability in supply chains. International Journal of Physical Distribution & Logistics Management 30(9): 731–750
https://doi.org/10.1108/09600030010351444 - Svensson G. (2002) A conceptual framework of vulnerability in firms’ inbound and outbound logistics flows. International Journal of Physical Distribution & Logistics Management 32(2): 110–134
https://doi.org/10.1108/09600030210421723 - Tolone W., Ahn G. J., Pai T., Hong S. P. (2005) Access control in collaborative systems. ACM Computing Surveys 37(1): 29–41
https://doi.org/10.1145/1057977.1057979 - Wang Y., Ajoku P. N., Brustoloni J. C., Nnaji B. O. (2006) Intellectual property protection in collaborative design through lean information modeling and sharing. Journal of Computing and Information Science in Engineering 6(2): 149–159
https://doi.org/10.1115/1.2190235 - Yao, A. (1986). How to generate and exchange secrete. In: Proceedings of the 27th annual symposium on foundations of computer science (pp. 162–167).
- Zeng Y., Gu P. (1999) A science-based approach to product design theory part II: Formulation of design requirements and products. Robotics and Computer-Integrated Manufacturing 15(4): 341–352
https://doi.org/10.1016/S0736-5845(99)00029-0 - Zhang H. (2002) Vertical information exchange in a supply chain with duopoly retailers. Production and Operations Management 11(4): 531–546
https://doi.org/10.1111/j.1937-5956.2002.tb00476.x - Zhang D.Y., Zeng Y., Wang L., Li H., Geng Y. (2011) Modeling and evaluating information leakage caused by inferences in supply chains. Computer in Industry 62(3): 351–363
https://doi.org/10.1016/j.compind.2010.10.002 - Zsidisin G. A., Ellram L. M., Carter J. R., Cavinato J. L. (2004) An analysis of supply risk assessment techniques. International Journal of Physical Distribution & Logistics Management 34(5): 397–413
https://doi.org/10.1108/09600030410545445 - Zsidisin G. A., Smith M. E. (2005) Managing supply risk with early supplier involvement: A case study and research propositions. Journal of Supply Chain Management 41(4): 44–57
https://doi.org/10.1111/j.1745-493X.2005.04104005.x
Publications that cite this publication
Risk assessment in supply chains: a state-of-the-art review of methodologies and their applications
Nishat Alam Choudhary, Shalabh Singh, Tobias Schoenherr, M. Ramkumar
https://doi.org/10.1007/s10479-022-04700-9 ·
2022, Annals of Operations Research, №2, p.565-607
Scopus
WoS
Crossref citations:2
Dark Side of Digitalisation: Discussion on Digital Assets Leakage and Its Protection Mechanisms in Operations and Supply Chain Research
Ying Chen, Fangli Zeng
https://doi.org/10.1007/978-981-19-4480-2_4
2022, Responsible Innovation Management Responsible Innovation in Industry, p.65-78
Crossref citations:0
A new newsvendor policy model for dual-sourcing supply chains by considering disruption risk and special order
Ashkan Mohsenzadeh Ledari, Seyed Hamid Reza Pasandideh, Mehrdad Nouri Koupaei
https://doi.org/10.1007/s10845-015-1104-y
2015, Journal of Intelligent Manufacturing, №1, p.237-244
Scopus
WoS
Crossref citations:4
Intelligent information sharing among manufacturers in supply networks: supplier selection case
Hyesung Seok, Shimon Y. Nof
https://doi.org/10.1007/s10845-015-1159-9
2015, Journal of Intelligent Manufacturing, №5, p.1097-1113
Scopus
WoS
Crossref citations:3
GA–SA/CPM/Markov based dynamic risk-management planning for virtual enterprises
Guanjie Jiang, Min Huang, Chunhui Xu, Xingwei Wang
https://doi.org/10.1007/s10845-014-0905-8 · Full text
2014, Journal of Intelligent Manufacturing, №5, p.899-910
Scopus
WoS
Crossref citations:1
Ubiquitous-City Integrated Authentication System (UCIAS)
Jae-Soo Jang, Hyung-Min Lim
https://doi.org/10.1007/s10845-014-0877-8
2014, Journal of Intelligent Manufacturing, №2, p.347-355
Scopus
WoS
Crossref citations:0
Information and Knowledge Leakage in Supply Chain
Kim Hua Tan, W. P. Wong, Leanne Chung
https://doi.org/10.1007/s10796-015-9553-6 · Full text
2015, Information Systems Frontiers, №3, p.621-638
Scopus
WoS
Crossref citations:55
Applying the concept of exponential approach to enhance the assessment capability of FMEA
Kuei-Hu Chang, Yung-Chia Chang, Pei-Ting Lai
https://doi.org/10.1007/s10845-013-0747-9
2013, Journal of Intelligent Manufacturing, №6, p.1413-1427
Scopus
WoS
Crossref citations:20
Security in Cyber-Enabled Design and Manufacturing: A Survey
Siva Chaitanya Chaduvula, Adam Dachowicz, Mikhail J. Atallah, Jitesh H. Panchal
https://doi.org/10.1115/1.4040341
2018, Journal of Computing and Information Science in Engineering, №4
Scopus
WoS
Crossref citations:16
Optimization of a supply portfolio in the context of supply chain risk management: literature review
Faiza Hamdi, Ahmed Ghorbel, Faouzi Masmoudi, Lionel Dupont
https://doi.org/10.1007/s10845-015-1128-3
2015, Journal of Intelligent Manufacturing, №4, p.763-788
Scopus
WoS
Crossref citations:13
Find all citations of the publication
About this publication
Publication type | Журнальна стаття |
Number of citations | 23 |
Number of works in the list of references | 54 |
Journal indexed in Scopus | Yes |
Journal indexed in Web of Science | Yes |