Term-weighting approaches in automatic text retrieval
Information Processing and Management: an International Journal
Security-control methods for statistical databases: a comparative study
ACM Computing Surveys (CSUR)
Federated database systems for managing distributed, heterogeneous, and autonomous databases
ACM Computing Surveys (CSUR) - Special issue on heterogeneous databases
Automated learning of decision rules for text categorization
ACM Transactions on Information Systems (TOIS)
Towards language independent automated learning of text categorization models
SIGIR '94 Proceedings of the 17th annual international ACM SIGIR conference on Research and development in information retrieval
The official PGP user's guide
The nature of statistical learning theory
The nature of statistical learning theory
The innovator's dilemma: when new technologies cause great firms to fail
The innovator's dilemma: when new technologies cause great firms to fail
On the Optimality of the Simple Bayesian Classifier under Zero-One Loss
Machine Learning - Special issue on learning with probabilistic representations
Privacy-preserving data mining
SIGMOD '00 Proceedings of the 2000 ACM SIGMOD international conference on Management of data
Distributed credential chain discovery in trust management: extended abstract
CCS '01 Proceedings of the 8th ACM conference on Computer and Communications Security
Secure multi-party computation problems and their applications: a review and open problems
Proceedings of the 2001 workshop on New security paradigms
Quantitative Models for Supply Chain Management
Quantitative Models for Supply Chain Management
Reverse Engineering and Design Recovery: A Taxonomy
IEEE Software
Watermarking, tamper-proffing, and obfuscation: tools for software protection
IEEE Transactions on Software Engineering
Text Categorization with Suport Vector Machines: Learning with Many Relevant Features
ECML '98 Proceedings of the 10th European Conference on Machine Learning
An Approach for Building Secure Database Federations
VLDB '94 Proceedings of the 20th International Conference on Very Large Data Bases
Effective Methods for Improving Naive Bayes Text Classifiers
PRICAI '02 Proceedings of the 7th Pacific Rim International Conference on Artificial Intelligence: Trends in Artificial Intelligence
A security model for distributed product data management system
Computers in Industry - Advanced web technologies for industrial applications
Tools for privacy preserving distributed data mining
ACM SIGKDD Explorations Newsletter
Privacy preserving association rule mining in vertically partitioned data
Proceedings of the eighth ACM SIGKDD international conference on Knowledge discovery and data mining
HPDC '03 Proceedings of the 12th IEEE International Symposium on High Performance Distributed Computing
ICPR '02 Proceedings of the 16 th International Conference on Pattern Recognition (ICPR'02) Volume 4 - Volume 4
Subject switching algorithms for access control in federated databases
Das'01 Proceedings of the fifteenth annual working conference on Database and application security
Information Sharing in a Supply Chain with Horizontal Competition
Management Science
Location Based Services
Privacy preserving regression modelling via distributed computation
Proceedings of the tenth ACM SIGKDD international conference on Knowledge discovery and data mining
Privacy-Preserving Distributed Mining of Association Rules on Horizontally Partitioned Data
IEEE Transactions on Knowledge and Data Engineering
Hardware assisted control flow obfuscation for embedded processors
Proceedings of the 2004 international conference on Compilers, architecture, and synthesis for embedded systems
An ontology of trust: formal semantics and transitivity
ICEC '06 Proceedings of the 8th international conference on Electronic commerce: The new e-commerce: innovations for conquering current barriers, obstacles and limitations to conducting successful business on the internet
Some Effective Techniques for Naive Bayes Text Classification
IEEE Transactions on Knowledge and Data Engineering
Axiomatic Theory Of Design Modeling
Journal of Integrated Design & Process Science
Document Classification Based on Support Vector Machine Using a Concept Vector Model
WI '06 Proceedings of the 2006 IEEE/WIC/ACM International Conference on Web Intelligence
Environment-Based Formulation Of Design Problem
Journal of Integrated Design & Process Science
Maintaining data privacy in association rule mining
VLDB '02 Proceedings of the 28th international conference on Very Large Data Bases
A distributed change control workflow for collaborative design network
Computers in Industry
A TTP-free protocol for location privacy in location-based services
Computer Communications
Collaborative planning, forecasting and replenishment: demand planning in supply chain management
International Journal of Information Technology and Management
Recursive object model (ROM)-Modelling of linguistic information in engineering design
Computers in Industry
How to generate and exchange secrets
SFCS '86 Proceedings of the 27th Annual Symposium on Foundations of Computer Science
Computer supported collaborative design: Retrospective and perspective
Computers in Industry
Latent semantic analysis for text categorization using neural network
Knowledge-Based Systems
Research of Text Classification Technology based on Genetic Annealing Algorithm
ISCID '08 Proceedings of the 2008 International Symposium on Computational Intelligence and Design - Volume 01
Contracting and Information Sharing Under Supply Chain Competition
Management Science
Strategic Information Management Under Leakage in a Supply Chain
Management Science
Multi-Level modeling and access control for data sharing in collaborative design
Advanced Engineering Informatics
Collaborative computer-aided design-research and development status
Computer-Aided Design
Knowledge web-based system architecture for collaborative product development
Computers in Industry
Classification of aeronautics system health and safety documents
IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews
Private location-based information retrieval through user collaboration
Computer Communications
Privacy-preserving data publishing: A survey of recent developments
ACM Computing Surveys (CSUR)
Text classification using graph mining-based feature extraction
Knowledge-Based Systems
A Formal-Semantics-Based Calculus of Trust
IEEE Internet Computing
Modeling and evaluating information leakage caused by inferences in supply chains
Computers in Industry
Privacy Preserving Decision Tree Learning Using Unrealized Data Sets
IEEE Transactions on Knowledge and Data Engineering
Noise-Robust watermarking for numerical datasets
MDAI'05 Proceedings of the Second international conference on Modeling Decisions for Artificial Intelligence
iTrust'05 Proceedings of the Third international conference on Trust Management
Secure knowledge management: confidentiality, trust, and privacy
IEEE Transactions on Systems, Man, and Cybernetics, Part A: Systems and Humans
SecTTS: A secure track & trace system for RFID-enabled supply chains
Computers in Industry
Journal of Intelligent Manufacturing
Advanced Engineering Informatics
A model based transformation paradigm for cross-language collaborations
Advanced Engineering Informatics
Association rule hiding in risk management for retail supply chain collaboration
Computers in Industry
The Evolution of Management Information Systems: A Literature Review
Journal of Integrated Design & Process Science
Hi-index | 0.00 |
Increasing global competition has led to massive outsourcing of manufacturing businesses. Such outsourcing practices require effective collaborations between focal manufacturers and their suppliers by sharing a large amount of information. In the meantime, since some of the suppliers are also potential competitors, protection of confidential information, particularly intellectual properties, during the collaboration is becoming an important issue. Therefore, secure collaboration is of critical significance in the global design and supply chain management. This paper aims to collect and analyze systematically the existing scattered research of secure collaboration in global design and supply chain environment, and to give a comprehensive literature review to summarize the problems and the corresponding solutions. By applying the Environment-based Design (EBD) methodology, the existing methods and technologies are classified into four levels: infrastructure, information, agreement, and confidence. Four corresponding research problems are then formulated: information access control, information partitioning, legal information sharing, and partner trust management. As such, research papers scattered in different areas are integrated into this multi-disciplinary field. Future trends and challenges are also discussed in this paper.