Showing 1 - 10 of 35
Integrating environmental considerations into supply-chain management has become one of the major concerns to the industry and researchers. However, supply chains still have to deal with the challenges of effectiveness and cost efficiency. RFID is one of the contemporary technologies which have...
Persistent link: https://www.econbiz.de/10009484382
We are currently witnessing a convergence of several threads of technology and business imperatives. The idea of a virtual enterprise - a business built from both organisationally and geographically distributed units - is becoming an area of increasing interest to both computer scientists and...
Persistent link: https://www.econbiz.de/10009484365
The requirement for spontaneous interaction in ubiquitous computing creates security issues over and above those present in other areas of computing,deeming traditional approaches ineffective. As a result, to support secure collaborations entities must implement self-protective measures. Trust...
Persistent link: https://www.econbiz.de/10009484369
The amount of business taking place in online marketplaces such as eBay is growing rapidly. At the end of 2005 eBay Inc. reported annual growth rates of 42.5% [3] and in February 2006 received 3 million user feedback comments per day [1]. Now we are faced with the task of using the limited...
Persistent link: https://www.econbiz.de/10009484370
In a global computing environment in order for entities to collaborate, they should be able to make autonomous access control decisions with partial information about their potential collaborators. The SECURE project addresses this requirement by using trust as the mechanism for managing risks...
Persistent link: https://www.econbiz.de/10009484375
Over the last decade, system integration has grown in popularity as it allows organisations to streamline business processes. Traditionally, system integration has been conducted through point-to-point solutions – as a new integration scenario requirement arises, a custom solution is built...
Persistent link: https://www.econbiz.de/10009437872
Each year, large amounts of money and labor are spent on patching the vulnerabilities in operating systems and various popular software to prevent exploitation by worms. Modeling the propagation process can help us to devise effective strategies against those worms' spreading. This paper...
Persistent link: https://www.econbiz.de/10009483723
Security and privacy have been the major concern when people build computer networks and systems. Any computer network or system must be trustworthy to avoid the risk of losing control and retain confidence that it will not fail [1] Jun Ho Huh, John Lyle, Cornelius Namiluko and Andrew Martin,...
Persistent link: https://www.econbiz.de/10009483724
Security and privacy have been the major concern when people build computer networks and systems. Any computer network or system must be trustworthy to avoid the risk of losing control and retain confidence that it will not fail [1] Jun Ho Huh, John Lyle, Cornelius Namiluko and Andrew Martin,...
Persistent link: https://www.econbiz.de/10009483795
RFID is a revolutionary remote technology which has many useful implications. Large scale implementation of RFID is seeking 100% information privacy and untraceability, for users and organizations, which is suitable for low cost RFID tag (Class1). To protect users and organization we are...
Persistent link: https://www.econbiz.de/10009483920