Academic literature on the topic 'Software Supply Chain Security'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Software Supply Chain Security.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Software Supply Chain Security"
Morkūnas, Mangirdas, Elzė Rudienė, and Aleksander Ostenda. "CAN CLIMATE-SMART AGRICULTURE HELP TO ASSURE FOOD SECURITY THROUGH SHORT SUPPLY CHAINS? A SYSTEMATIC BIBLIOMETRIC AND BIBLIOGRAPHIC LITERATURE REVIEW." Journal Business, Management and Economics Engineering 20, no. 02 (July 14, 2022): 207–23. http://dx.doi.org/10.3846/bmee.2022.17101.
Full textP.N., Sindhuja. "The impact of information security initiatives on supply chain robustness and performance: an empirical study." Information & Computer Security 29, no. 2 (June 10, 2021): 365–91. http://dx.doi.org/10.1108/ics-07-2020-0128.
Full textKaczorowski, Maya, Falcon Momot, George V. Neville-Neil, and Chris McCubbin. "OSS Supply-chain Security: What Will It Take?" Queue 20, no. 5 (October 31, 2022): 86–102. http://dx.doi.org/10.1145/3570923.
Full textBarabanov, Alexander V., Alexey S. Markov, and Valentin L. Tsirlov. "Information security systematics of software supply chains." Bezopasnost informacionnyh tehnology 26, no. 3 (September 2019): 68–79. http://dx.doi.org/10.26583/bit.2019.3.06.
Full textTurjo, Manoshi Das, Mohammad Monirujjaman Khan, Manjit Kaur, and Atef Zaguia. "Smart Supply Chain Management Using the Blockchain and Smart Contract." Scientific Programming 2021 (September 28, 2021): 1–12. http://dx.doi.org/10.1155/2021/6092792.
Full textEhsan, Ibtisam, Muhammad Irfan Khalid, Laura Ricci, Jawaid Iqbal, Amerah Alabrah, Syed Sajid Ullah, and Taha M. Alfakih. "A Conceptual Model for Blockchain-Based Agriculture Food Supply Chain System." Scientific Programming 2022 (February 28, 2022): 1–15. http://dx.doi.org/10.1155/2022/7358354.
Full textWang, Lai-Wang, Chen-Chih Hung, and Ching-Tang Hsieh. "Security Strategy Optimization and Algorithm Based on 3D Economic Sustainable Supply Chain." Scientific Programming 2022 (September 10, 2022): 1–11. http://dx.doi.org/10.1155/2022/9972658.
Full textMarjanovic, Jelena, Nikola Dalcekovic, and Goran Sladic. "Blockchain-based model for tracking compliance with security requirements." Computer Science and Information Systems, no. 00 (2022): 60. http://dx.doi.org/10.2298/csis210923060m.
Full textKusumastuti, Ratna Yulia, Heti Mulyati, and Gendut Suprayitno. "Disclosure Integration of Lean Six Sigma Principles in Sustainable Supply Chain in Poultry Industry." Indonesian Interdisciplinary Journal of Sharia Economics (IIJSE) 4, no. 1 (October 6, 2021): 300–312. http://dx.doi.org/10.31538/iijse.v4i1.1706.
Full textКуликов, Сергей Сергеевич, Владимир Иванович Белоножкин, and Николай Алексеевич Ююкин. "ANALYSIS OF INFORMATION SECURITY THREATS, ASSOCIATED WITH SUPPLY CHAIN ATTACKS." ИНФОРМАЦИЯ И БЕЗОПАСНОСТЬ, no. 1(-) (April 5, 2022): 135–40. http://dx.doi.org/10.36622/vstu.2022.25.1.011.
Full textDissertations / Theses on the topic "Software Supply Chain Security"
Vu, Duc Ly. "Towards Understanding and Securing the OSS Supply Chain." Doctoral thesis, Università degli studi di Trento, 2022. http://hdl.handle.net/11572/333508.
Full textMassimino, Brett J. "Operational Factors Affecting the Confidentiality of Proprietary Digital Assets." The Ohio State University, 2014. http://rave.ohiolink.edu/etdc/view?acc_num=osu1405683732.
Full textSichel, Alexander R. (Alexander Russell). "Supply chain security along the Columbia River : an analysis of maritime supply chain security with respect to communication between security experts." Thesis, Massachusetts Institute of Technology, 2005. http://hdl.handle.net/1721.1/33589.
Full textIncludes bibliographical references (leaves 74-75).
The amount of cargo that enters the US border is at an all time high. Cargo containers and vessel shipments enter the US from all over the world. Tracking these shipments from their origin to destination requires professional expertise. Security organizations, such as the Regional Maritime Security Coalition of the Columbia River, realize the potential of these professionals, who track and coordinate cargo containers as they move through a supply chain, to enhance security of maritime cargo. In order to utilize these supply chain logistic professionals in a security coalition, proper training and certification would be required to comply with the US Federal Code on Liability Protection. This study examines the requirements that are necessary to certify supply chain logistic professionals as certified volunteers in an information sharing, security communication network to prevent terrorist activity, smuggling, theft, and to assist in general crisis mitigation. The thesis studies how the RMSC is currently developing its security communication system around supply chain logistic professionals, and the requirements and training that would be necessary to certify them under the US Federal Code.
by Alexander R. Sichel.
S.M.
Park, Hong. "Impact of supply chain security orientation on port performance." Thesis, Cardiff University, 2013. http://orca.cf.ac.uk/52117/.
Full textGarshasbi, Farzam, and Ebrahimi Shahram Pasha. "Supply Chain Security Programs Comparing TAPA FSR with ISPS." Thesis, Högskolan i Borås, Institutionen Ingenjörshögskolan, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:hb:diva-16642.
Full textProgram: BSc in Industrial Engineering - International Business Engineering
Holt, Christopher Michael Taylor 1968. "Supply chain simulator : an approach for development of software and methodology for simulation of supply chain management." Thesis, Massachusetts Institute of Technology, 1999. http://hdl.handle.net/1721.1/9495.
Full textIncludes bibliographical references (leaves 94-97).
Many companies see how new strategies and technologies can enable more efficient and adaptive supply chains-but they struggle to understand how these technologies overlay with existing processes and personnel issues both during and after implementation. This thesis investigates the concept of a simulated environment where multiple constituents whether they are different parts of a company's organization or different companies within a supply chain-can come together to design and experiment with new supply chain structures. The thesis explores the argument that the supply chain can be simulated, and evaluates different approaches to developing such a simulation that would allow low-risk experimentation and accelerated learning for supply chain managers. The thesis begins with an executive summary that provides a high level treatment of the challenges and recommendations associated with supply chain simulation, then proceeds to present a definition of the elaborate interrelationships between companies, technologies and business processes that collectively shape an industry's supply chain. This is followed by a discussion of complexity theory and general simulation techniques that could be applicable to the development of a software simulation environment in this area. Then, a review of efforts to date to simulate management of the supply chain, including approach, resources required, and eventual results is followed by a recommendation and justification of the thesis' approach to supply chain simulation. Finally, operating methods are presented for development and management of the learning and decision-making processes required to best utilize the software. The conclusion of the thesis is that because of the emergence of new technologies, the supply chain can be simulated for practical experimentation and learning. It is apparent that significant supply chain performance improvement can be identified and quantified through simulation. The thesis recommends using agent-based modeling, specifically a software package called Swarm, as the software environment. The software should be supported by operating methods that can maximize its capabilities while encouraging the likelihood of adoption of solutions identified.
by Christopher Michael Taylor Holt.
M.Eng.
Malinowski, Mateusz Ksawery. "CargoNet : micropower sensate tags for supply-chain management and security." Thesis, Massachusetts Institute of Technology, 2007. http://hdl.handle.net/1721.1/41654.
Full textIncludes bibliographical references (p. 109-113).
This thesis describes the development of a system of sensate active RFID tags for supply-chain management and security applications, necessitated by the current lack of commercial platforms capable of monitoring the state of shipments at the crate and case level. To make a practical prototype, off-the-shelf components and custom-designed circuits that minimize power consumption and cost were assembled and integrated into an interrupt-driven, quasi-passive system that can monitor, log, and report environmental conditions inside a shipping crate while consuming only 23.7 microwatts of average power. To prove the feasibility of the system, the tags were tested in the laboratory and aboard transport conveyances.
by Mateusz Ksawery Malinowski.
M.Eng.
Barcelos, Mariana Alexandra Aleixo de. "Towards a security framework for the semiconductor supply chain environment." Master's thesis, Universidade de Aveiro, 2018. http://hdl.handle.net/10773/23555.
Full textHoje em dia, a troca de informação entre os parceiros da cadeia de forne-cimento de semicondutores pode ser alvo de muitas ameaças de segurança conhecidas e desconhecidas no ambiente interno/externo dos parceiros. Particularmente, estas vulnerabilidades, no ambiente da cadeia de fornecimento de semicondutores, podem ser exploradas por atacantes com um amplo espectro de motivações que vão desde intenções criminais, visando o ganho financeiro, até à espionagem industrial e a cyber-sabotagem. Os atacantes podem comprometer a comunicação de dados entre parceiros na cadeia de fornecimento e, portanto, podem prejudicar o fornecimento de serviços pelos parceiros, bem como a continuidade da prestação de serviços. Como resultado, os parceiros da cadeia de fornecimento de semicondutores poderão sofrer repercussões nocivas que podem causar perdas significativas de receita, destruição da sua marca e atrasos no avanço das suas tecnologias. Consequentemente, uma plataforma de segurança para o ambiente da cadeia de fornecimento de semicondutores é de extrema importância. Assim, a intenção desta tese é fornecer uma base para uma plataforma de segurança para comunicação segura de dados entre todos os parceiros da cadeia de fornecimento de semicondutores.
Nowadays, data communication across the partners in the semiconductor supply chain can be the target of many known and unknown security threats exploiting security vulnerabilities in the internal/external environment of the partners. Particularly, these vulnerabilities in the semiconductor supply chain environment can be exploited by attackers with a wide spectrum of motivations ranging from criminal intents aimed at nancial gain to industrial espionage and cyber-sabotage. Attackers can compromise the data communication between legitimate parties in the supply chain and thus can jeopardize the delivery of services across the partners as well as the continuity of the service provision. As a result, semiconductor supply chain partners will su er from damaging repercussions which can cause signi cant revenue loss, destroy their brand and eventually hinder their advancement. Consequently, a security framework for the semiconductor supply chain environment is of utmost importance. Hence, the intent of this thesis is to provide a foundation for a security framework for secure data communication across the partners in the semiconductor supply chain.
Williams, Zachary. "Supply chain security an institutional approach to strategies and outcomes /." Diss., Mississippi State : Mississippi State University, 2008. http://library.msstate.edu/etd/show.asp?etd=etd-03312008-163918.
Full textSheinbein, Rachel Felice 1975. "Applying supply chain methodology to a centralized software licensing strategy." Thesis, Massachusetts Institute of Technology, 2004. http://hdl.handle.net/1721.1/34781.
Full textIncludes bibliographical references (p. 76).
Eleven percent of companies spend between $150K and $200K per year per engineer on software development tools and nine percent spend more than $200K, according to a Silicon Integration Initiative/Gartner/EE Times study from 2002. For Agilent Technologies, these costs result in spending tens of millions of dollars each year on software, and for Motorola, the costs are more than $100M each year. From the current trends in software spending, one can infer that companies will pay even more for software in the future, because the cost of the software itself is rising and because of the complexity of the technology needed for innovation. In order to understand whether the total spending on software is appropriate and necessary, Agilent sponsored this project to create a model that analyzes the trade-offs between the cost of software and the cost of software unavailability. The model treats software licenses as supplies to the development of a product, and thus, supply chain methodologies such as inventory (cost of licenses), stock outs (cost of unavailability) and service level are applied. The goal of the model is to minimize software costs while maintaining a satisfactory level of service. The thesis explains the model and then shows the results from applying it to four software products that Agilent currently uses. The results show that in the absence of this type of analysis, Agilent spends more than necessary for software licenses. In fact, Agilent can reduce costs by at least 5%. This model can be used by Agilent and other companies to optimize software purchases.
by Rachel Felice Sheinbein.
S.M.
M.B.A.
Books on the topic "Software Supply Chain Security"
Thomas, Andrew R., and Sebastian Vaduva, eds. Global Supply Chain Security. New York, NY: Springer New York, 2015. http://dx.doi.org/10.1007/978-1-4939-2178-2.
Full textHalak, Basel, ed. Hardware Supply Chain Security. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-62707-2.
Full textAlfonso, Cristina M., Jason P. Sullivan, Cristina M. Alfonso, and Jason P. Sullivan. Cargo containers and supply chain security. New York: Nova Science Publishers, 2011.
Find full textNicholson, Anna, Evan Randall, Lisa Brown, Carolyn Shore, and Benjamin Kahn, eds. The Security of America's Medical Product Supply Chain. Washington, D.C.: National Academies Press, 2021. http://dx.doi.org/10.17226/26137.
Full textKieras, Timothy, Junaid Farooq, and Quanyan Zhu. IoT Supply Chain Security Risk Analysis and Mitigation. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-08480-5.
Full textBurges, Dan. Cargo theft, loss prevention, and supply chain security. Waltham, MA: Butterworth-Heinemann, 2012.
Find full textEnterprise software delivery: Bringing agility and efficiency to the global software supply chain. Upper Saddle River, NJ: Addison-Wesley, 2013.
Find full textKoepsel, Kirsten M., ed. The Aerospace Supply Chain and Cyber Security - Challenges Ahead. Warrendale, PA: SAE International, 2018. http://dx.doi.org/10.4271/t-133.
Full textEssig, Michael. Supply Chain Safety Management: Security and Robustness in Logistics. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013.
Find full textWillis, Henry H. Evaluating the security of the global containerized supply chain. Santa Monica, CA: RAND Corporation, 2004.
Find full textBook chapters on the topic "Software Supply Chain Security"
Yang, Jeong, Young Lee, and Arlen P. McDonald. "SolarWinds Software Supply Chain Security: Better Protection with Enforced Policies and Technologies." In Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, 43–58. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-92317-4_4.
Full textBarabanov, Alexander, Alexey Markov, and Valentin Tsirlov. "On Systematics of the Information Security of Software Supply Chains." In Software Engineering Perspectives in Intelligent Systems, 115–29. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-63322-6_9.
Full textZomer, Gerwin. "Supply Chain Security." In Operations, Logistics and Supply Chain Management, 575–92. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-92447-2_25.
Full textCollier, Zachary A., and Shital A. Thekdi. "Supply Chain Security." In The Palgrave Handbook of Supply Chain Management, 1–24. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-89822-9_30-1.
Full textSeaman, Jim. "Securing Your Supply Chain." In Protective Security, 439–85. Berkeley, CA: Apress, 2021. http://dx.doi.org/10.1007/978-1-4842-6908-4_11.
Full textSzymonik, Andrzej, and Robert Stanisławski. "Conclusions." In Supply Chain Security, 271–74. New York: Productivity Press, 2022. http://dx.doi.org/10.4324/9781003286110-10.
Full textSzymonik, Andrzej, and Robert Stanisławski. "Safety Determinants for the Needs of the Delivery Chain." In Supply Chain Security, 1–24. New York: Productivity Press, 2022. http://dx.doi.org/10.4324/9781003286110-2.
Full textSzymonik, Andrzej, and Robert Stanisławski. "Reverse Logistics in Supply Chains:." In Supply Chain Security, 193–206. New York: Productivity Press, 2022. http://dx.doi.org/10.4324/9781003286110-7.
Full textSzymonik, Andrzej, and Robert Stanisławski. "Technologies Supporting Supply Chain Safety Management." In Supply Chain Security, 159–92. New York: Productivity Press, 2022. http://dx.doi.org/10.4324/9781003286110-6.
Full textSzymonik, Andrzej, and Robert Stanisławski. "Contemporary Conditions of Supply Chains." In Supply Chain Security, 25–66. New York: Productivity Press, 2022. http://dx.doi.org/10.4324/9781003286110-3.
Full textConference papers on the topic "Software Supply Chain Security"
Ellison, Robert J., and Carol Woody. "Supply-Chain Risk Management: Incorporating Security into Software Development." In 2010 43rd Hawaii International Conference on System Sciences. IEEE, 2010. http://dx.doi.org/10.1109/hicss.2010.355.
Full textNakano, Yuto, Toru Nakamura, Yasuaki Kobayashi, Takashi Ozu, Masahito Ishizaka, Masayuki Hashimoto, Hiroyuki Yokoyama, Yutaka Miyake, and Shinsaku Kiyomoto. "Automatic Security Inspection Framework for Trustworthy Supply Chain." In 2021 IEEE/ACIS 19th International Conference on Software Engineering Research, Management and Applications (SERA). IEEE, 2021. http://dx.doi.org/10.1109/sera51205.2021.9509040.
Full textAxelrod, C. Warren. "Assuring software and hardware security and integrity throughout the supply chain." In 2011 IEEE International Conference on Technologies for Homeland Security (HST). IEEE, 2011. http://dx.doi.org/10.1109/ths.2011.6107848.
Full textOhm, Marc, Arnold Sykosch, and Michael Meier. "Towards detection of software supply chain attacks by forensic artifacts." In ARES 2020: The 15th International Conference on Availability, Reliability and Security. New York, NY, USA: ACM, 2020. http://dx.doi.org/10.1145/3407023.3409183.
Full textHejderup, Joseph. "On the Use of Tests for Software Supply Chain Threats." In CCS '22: 2022 ACM SIGSAC Conference on Computer and Communications Security. New York, NY, USA: ACM, 2022. http://dx.doi.org/10.1145/3560835.3564557.
Full textMartin, Robert Alan. "Visibility & Control: Addressing Supply Chain Challenges to Trustworthy Software-Enabled Things." In 2020 IEEE Systems Security Symposium (SSS). IEEE, 2020. http://dx.doi.org/10.1109/sss47320.2020.9174365.
Full textVu, Duc Ly, Ivan Pashchenko, Fabio Massacci, Henrik Plate, and Antonino Sabetta. "Towards Using Source Code Repositories to Identify Software Supply Chain Attacks." In CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security. New York, NY, USA: ACM, 2020. http://dx.doi.org/10.1145/3372297.3420015.
Full textOkafor, Chinenye, Taylor R. Schorlemmer, Santiago Torres-Arias, and James C. Davis. "SoK: Analysis of Software Supply Chain Security by Establishing Secure Design Properties." In CCS '22: 2022 ACM SIGSAC Conference on Computer and Communications Security. New York, NY, USA: ACM, 2022. http://dx.doi.org/10.1145/3560835.3564556.
Full textMartin, Robert Alan. "Assurance for CyberPhysical Systems: Addressing Supply Chain Challenges to Trustworthy Software-Enabled Things." In 2020 IEEE Systems Security Symposium (SSS). IEEE, 2020. http://dx.doi.org/10.1109/sss47320.2020.9174201.
Full textKeller, Joseph, Shuva Paul, Santiago Grijalva, and Vincent J. Mooney. "Experimental Setup for Grid Control Device Software Updates in Supply Chain Cyber-Security." In 2022 North American Power Symposium (NAPS). IEEE, 2022. http://dx.doi.org/10.1109/naps56150.2022.10012179.
Full textReports on the topic "Software Supply Chain Security"
Chandramouli, Ramaswamy. Securing the Artifacts in Software Supply Chain for Building Cloud-Native Microservices Applications. Gaithersburg, MD: National Institute of Standards and Technology, 2023. http://dx.doi.org/10.6028/nist.sp.800-204d.ipd.
Full textVisker, Edward R. Improving the DoD Supply Chain Can Commercial Supply Chain Management Software Do the Job"". Fort Belvoir, VA: Defense Technical Information Center, April 2000. http://dx.doi.org/10.21236/ada378230.
Full textHund, Gretchen. Walk the Talk: Progress in Building a Supply Chain Security Culture. Office of Scientific and Technical Information (OSTI), August 2016. http://dx.doi.org/10.2172/1329456.
Full textEdwards, Frances, Joseph Szyliowicz, Dan Goodrich, William Medigovich, Liz Lange, and Autumn Anderton. Surface Transportation Supply Chain Security: Creating a Blueprint for Future Research. Mineta Transportation Institute, April 2021. http://dx.doi.org/10.31979/mti.2021.1937.
Full textHund, Gretchen. Walk the Talk: How PNNL is developing a Supply Chain Security Culture. Office of Scientific and Technical Information (OSTI), September 2015. http://dx.doi.org/10.2172/1334055.
Full textKhan, Saif M., Alexander Mann, and Dahlia Peterson. The Semiconductor Supply Chain: Assessing National Competitiveness. Center for Security and Emerging Technology, January 2021. http://dx.doi.org/10.51593/20190016.
Full textLindquist, Joachim, and Henning de Haas. Creating Supply Chain Resilience Through Scenario Planning: How a Digital Twin Can Be Used To Enhance Supply Chain Resilience Through Scenario Planning. Aarhus University Library, 2021. http://dx.doi.org/10.7146/aul.435.
Full textBoyens, Jon M. Cybersecurity Supply Chain Risk Management for Systems and Organizations. Gaithersburg, MD: National Institute of Standards and Technology, 2022. http://dx.doi.org/10.6028/nist.sp.800-161r1.
Full textRowland, Michael, and Benjamin Karch. Security Evaluation of Smart Cards and Secure Tokens: Benefits and Drawbacks for Reducing Supply Chain Risks of Nuclear Power Plants. Office of Scientific and Technical Information (OSTI), August 2022. http://dx.doi.org/10.2172/1884928.
Full textHicks, Julie, Laurin Yates, and Jackie Pettway. Mat Sinking Unit supply study : Mississippi River revetment. Engineer Research and Development Center (U.S.), September 2021. http://dx.doi.org/10.21079/11681/41867.
Full text