Sciweavers

3638 search results - page 51 / 728
» Distribution chain security
Sort
View
EAAI
2008
115views more  EAAI 2008»
13 years 9 months ago
Supply chain coordination: A game-theory approach
In a supply chain organized as a network of autonomous enterprises, the main objective of each partner is to optimize his production and supply policy with respect to his own econ...
Jean-Claude Hennet, Yasemin Arda
ICDCSW
2007
IEEE
14 years 3 months ago
Survey of Six Myths and Oversights about Distributed Hash Tables' Security
Distributed Hash Tables (DHT) was not designed to be secure against malicious users. But some secure systems like trust and reputation management algorithms trust DHT with their d...
Sylvain Dahan, Mitsuhisa Sato
DSRT
1999
IEEE
14 years 1 months ago
Design and Implementation of a Distributed Interactive Simulation Security Architecture
The paper describes the design and implementation of a security architecture for a HLA/RTI prototype developed at ONERA/CERT. The major security objective is to protect the intell...
Pierre Bieber, Pierre Siron
CCS
2006
ACM
14 years 22 days ago
Puppetnets: misusing web browsers as a distributed attack infrastructure
Most of the recent work on Web security focuses on preventing attacks that directly harm the browser's host machine and user. In this paper we attempt to quantify the threat ...
V. T. Lam, Spyros Antonatos, Periklis Akritidis, K...
EOR
2008
69views more  EOR 2008»
13 years 9 months ago
Coordinating the supply chain in the agricultural seed industry
This paper examines contract practices between suppliers and retailers in the agricultural seed industry. We construct and analyze single-retailer models of various contract types...
Samuel Burer, Philip C. Jones, Timothy J. Lowe