Literatura académica sobre el tema "Software Supply Chain Security"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte las listas temáticas de artículos, libros, tesis, actas de conferencias y otras fuentes académicas sobre el tema "Software Supply Chain Security".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Artículos de revistas sobre el tema "Software Supply Chain Security"
Morkūnas, Mangirdas, Elzė Rudienė y Aleksander Ostenda. "CAN CLIMATE-SMART AGRICULTURE HELP TO ASSURE FOOD SECURITY THROUGH SHORT SUPPLY CHAINS? A SYSTEMATIC BIBLIOMETRIC AND BIBLIOGRAPHIC LITERATURE REVIEW". Journal Business, Management and Economics Engineering 20, n.º 02 (14 de julio de 2022): 207–23. http://dx.doi.org/10.3846/bmee.2022.17101.
Texto completoP.N., Sindhuja. "The impact of information security initiatives on supply chain robustness and performance: an empirical study". Information & Computer Security 29, n.º 2 (10 de junio de 2021): 365–91. http://dx.doi.org/10.1108/ics-07-2020-0128.
Texto completoKaczorowski, Maya, Falcon Momot, George V. Neville-Neil y Chris McCubbin. "OSS Supply-chain Security: What Will It Take?" Queue 20, n.º 5 (31 de octubre de 2022): 86–102. http://dx.doi.org/10.1145/3570923.
Texto completoBarabanov, Alexander V., Alexey S. Markov y Valentin L. Tsirlov. "Information security systematics of software supply chains". Bezopasnost informacionnyh tehnology 26, n.º 3 (septiembre de 2019): 68–79. http://dx.doi.org/10.26583/bit.2019.3.06.
Texto completoTurjo, Manoshi Das, Mohammad Monirujjaman Khan, Manjit Kaur y Atef Zaguia. "Smart Supply Chain Management Using the Blockchain and Smart Contract". Scientific Programming 2021 (28 de septiembre de 2021): 1–12. http://dx.doi.org/10.1155/2021/6092792.
Texto completoEhsan, Ibtisam, Muhammad Irfan Khalid, Laura Ricci, Jawaid Iqbal, Amerah Alabrah, Syed Sajid Ullah y Taha M. Alfakih. "A Conceptual Model for Blockchain-Based Agriculture Food Supply Chain System". Scientific Programming 2022 (28 de febrero de 2022): 1–15. http://dx.doi.org/10.1155/2022/7358354.
Texto completoWang, Lai-Wang, Chen-Chih Hung y Ching-Tang Hsieh. "Security Strategy Optimization and Algorithm Based on 3D Economic Sustainable Supply Chain". Scientific Programming 2022 (10 de septiembre de 2022): 1–11. http://dx.doi.org/10.1155/2022/9972658.
Texto completoMarjanovic, Jelena, Nikola Dalcekovic y Goran Sladic. "Blockchain-based model for tracking compliance with security requirements". Computer Science and Information Systems, n.º 00 (2022): 60. http://dx.doi.org/10.2298/csis210923060m.
Texto completoKusumastuti, Ratna Yulia, Heti Mulyati y Gendut Suprayitno. "Disclosure Integration of Lean Six Sigma Principles in Sustainable Supply Chain in Poultry Industry". Indonesian Interdisciplinary Journal of Sharia Economics (IIJSE) 4, n.º 1 (6 de octubre de 2021): 300–312. http://dx.doi.org/10.31538/iijse.v4i1.1706.
Texto completoКуликов, Сергей Сергеевич, Владимир Иванович Белоножкин y Николай Алексеевич Ююкин. "ANALYSIS OF INFORMATION SECURITY THREATS, ASSOCIATED WITH SUPPLY CHAIN ATTACKS". ИНФОРМАЦИЯ И БЕЗОПАСНОСТЬ, n.º 1(-) (5 de abril de 2022): 135–40. http://dx.doi.org/10.36622/vstu.2022.25.1.011.
Texto completoTesis sobre el tema "Software Supply Chain Security"
Vu, Duc Ly. "Towards Understanding and Securing the OSS Supply Chain". Doctoral thesis, Università degli studi di Trento, 2022. http://hdl.handle.net/11572/333508.
Texto completoMassimino, Brett J. "Operational Factors Affecting the Confidentiality of Proprietary Digital Assets". The Ohio State University, 2014. http://rave.ohiolink.edu/etdc/view?acc_num=osu1405683732.
Texto completoSichel, Alexander R. (Alexander Russell). "Supply chain security along the Columbia River : an analysis of maritime supply chain security with respect to communication between security experts". Thesis, Massachusetts Institute of Technology, 2005. http://hdl.handle.net/1721.1/33589.
Texto completoIncludes bibliographical references (leaves 74-75).
The amount of cargo that enters the US border is at an all time high. Cargo containers and vessel shipments enter the US from all over the world. Tracking these shipments from their origin to destination requires professional expertise. Security organizations, such as the Regional Maritime Security Coalition of the Columbia River, realize the potential of these professionals, who track and coordinate cargo containers as they move through a supply chain, to enhance security of maritime cargo. In order to utilize these supply chain logistic professionals in a security coalition, proper training and certification would be required to comply with the US Federal Code on Liability Protection. This study examines the requirements that are necessary to certify supply chain logistic professionals as certified volunteers in an information sharing, security communication network to prevent terrorist activity, smuggling, theft, and to assist in general crisis mitigation. The thesis studies how the RMSC is currently developing its security communication system around supply chain logistic professionals, and the requirements and training that would be necessary to certify them under the US Federal Code.
by Alexander R. Sichel.
S.M.
Park, Hong. "Impact of supply chain security orientation on port performance". Thesis, Cardiff University, 2013. http://orca.cf.ac.uk/52117/.
Texto completoGarshasbi, Farzam y Ebrahimi Shahram Pasha. "Supply Chain Security Programs Comparing TAPA FSR with ISPS". Thesis, Högskolan i Borås, Institutionen Ingenjörshögskolan, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:hb:diva-16642.
Texto completoProgram: BSc in Industrial Engineering - International Business Engineering
Holt, Christopher Michael Taylor 1968. "Supply chain simulator : an approach for development of software and methodology for simulation of supply chain management". Thesis, Massachusetts Institute of Technology, 1999. http://hdl.handle.net/1721.1/9495.
Texto completoIncludes bibliographical references (leaves 94-97).
Many companies see how new strategies and technologies can enable more efficient and adaptive supply chains-but they struggle to understand how these technologies overlay with existing processes and personnel issues both during and after implementation. This thesis investigates the concept of a simulated environment where multiple constituents whether they are different parts of a company's organization or different companies within a supply chain-can come together to design and experiment with new supply chain structures. The thesis explores the argument that the supply chain can be simulated, and evaluates different approaches to developing such a simulation that would allow low-risk experimentation and accelerated learning for supply chain managers. The thesis begins with an executive summary that provides a high level treatment of the challenges and recommendations associated with supply chain simulation, then proceeds to present a definition of the elaborate interrelationships between companies, technologies and business processes that collectively shape an industry's supply chain. This is followed by a discussion of complexity theory and general simulation techniques that could be applicable to the development of a software simulation environment in this area. Then, a review of efforts to date to simulate management of the supply chain, including approach, resources required, and eventual results is followed by a recommendation and justification of the thesis' approach to supply chain simulation. Finally, operating methods are presented for development and management of the learning and decision-making processes required to best utilize the software. The conclusion of the thesis is that because of the emergence of new technologies, the supply chain can be simulated for practical experimentation and learning. It is apparent that significant supply chain performance improvement can be identified and quantified through simulation. The thesis recommends using agent-based modeling, specifically a software package called Swarm, as the software environment. The software should be supported by operating methods that can maximize its capabilities while encouraging the likelihood of adoption of solutions identified.
by Christopher Michael Taylor Holt.
M.Eng.
Malinowski, Mateusz Ksawery. "CargoNet : micropower sensate tags for supply-chain management and security". Thesis, Massachusetts Institute of Technology, 2007. http://hdl.handle.net/1721.1/41654.
Texto completoIncludes bibliographical references (p. 109-113).
This thesis describes the development of a system of sensate active RFID tags for supply-chain management and security applications, necessitated by the current lack of commercial platforms capable of monitoring the state of shipments at the crate and case level. To make a practical prototype, off-the-shelf components and custom-designed circuits that minimize power consumption and cost were assembled and integrated into an interrupt-driven, quasi-passive system that can monitor, log, and report environmental conditions inside a shipping crate while consuming only 23.7 microwatts of average power. To prove the feasibility of the system, the tags were tested in the laboratory and aboard transport conveyances.
by Mateusz Ksawery Malinowski.
M.Eng.
Barcelos, Mariana Alexandra Aleixo de. "Towards a security framework for the semiconductor supply chain environment". Master's thesis, Universidade de Aveiro, 2018. http://hdl.handle.net/10773/23555.
Texto completoHoje em dia, a troca de informação entre os parceiros da cadeia de forne-cimento de semicondutores pode ser alvo de muitas ameaças de segurança conhecidas e desconhecidas no ambiente interno/externo dos parceiros. Particularmente, estas vulnerabilidades, no ambiente da cadeia de fornecimento de semicondutores, podem ser exploradas por atacantes com um amplo espectro de motivações que vão desde intenções criminais, visando o ganho financeiro, até à espionagem industrial e a cyber-sabotagem. Os atacantes podem comprometer a comunicação de dados entre parceiros na cadeia de fornecimento e, portanto, podem prejudicar o fornecimento de serviços pelos parceiros, bem como a continuidade da prestação de serviços. Como resultado, os parceiros da cadeia de fornecimento de semicondutores poderão sofrer repercussões nocivas que podem causar perdas significativas de receita, destruição da sua marca e atrasos no avanço das suas tecnologias. Consequentemente, uma plataforma de segurança para o ambiente da cadeia de fornecimento de semicondutores é de extrema importância. Assim, a intenção desta tese é fornecer uma base para uma plataforma de segurança para comunicação segura de dados entre todos os parceiros da cadeia de fornecimento de semicondutores.
Nowadays, data communication across the partners in the semiconductor supply chain can be the target of many known and unknown security threats exploiting security vulnerabilities in the internal/external environment of the partners. Particularly, these vulnerabilities in the semiconductor supply chain environment can be exploited by attackers with a wide spectrum of motivations ranging from criminal intents aimed at nancial gain to industrial espionage and cyber-sabotage. Attackers can compromise the data communication between legitimate parties in the supply chain and thus can jeopardize the delivery of services across the partners as well as the continuity of the service provision. As a result, semiconductor supply chain partners will su er from damaging repercussions which can cause signi cant revenue loss, destroy their brand and eventually hinder their advancement. Consequently, a security framework for the semiconductor supply chain environment is of utmost importance. Hence, the intent of this thesis is to provide a foundation for a security framework for secure data communication across the partners in the semiconductor supply chain.
Williams, Zachary. "Supply chain security an institutional approach to strategies and outcomes /". Diss., Mississippi State : Mississippi State University, 2008. http://library.msstate.edu/etd/show.asp?etd=etd-03312008-163918.
Texto completoSheinbein, Rachel Felice 1975. "Applying supply chain methodology to a centralized software licensing strategy". Thesis, Massachusetts Institute of Technology, 2004. http://hdl.handle.net/1721.1/34781.
Texto completoIncludes bibliographical references (p. 76).
Eleven percent of companies spend between $150K and $200K per year per engineer on software development tools and nine percent spend more than $200K, according to a Silicon Integration Initiative/Gartner/EE Times study from 2002. For Agilent Technologies, these costs result in spending tens of millions of dollars each year on software, and for Motorola, the costs are more than $100M each year. From the current trends in software spending, one can infer that companies will pay even more for software in the future, because the cost of the software itself is rising and because of the complexity of the technology needed for innovation. In order to understand whether the total spending on software is appropriate and necessary, Agilent sponsored this project to create a model that analyzes the trade-offs between the cost of software and the cost of software unavailability. The model treats software licenses as supplies to the development of a product, and thus, supply chain methodologies such as inventory (cost of licenses), stock outs (cost of unavailability) and service level are applied. The goal of the model is to minimize software costs while maintaining a satisfactory level of service. The thesis explains the model and then shows the results from applying it to four software products that Agilent currently uses. The results show that in the absence of this type of analysis, Agilent spends more than necessary for software licenses. In fact, Agilent can reduce costs by at least 5%. This model can be used by Agilent and other companies to optimize software purchases.
by Rachel Felice Sheinbein.
S.M.
M.B.A.
Libros sobre el tema "Software Supply Chain Security"
Thomas, Andrew R. y Sebastian Vaduva, eds. Global Supply Chain Security. New York, NY: Springer New York, 2015. http://dx.doi.org/10.1007/978-1-4939-2178-2.
Texto completoHalak, Basel, ed. Hardware Supply Chain Security. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-62707-2.
Texto completoAlfonso, Cristina M., Jason P. Sullivan, Cristina M. Alfonso y Jason P. Sullivan. Cargo containers and supply chain security. New York: Nova Science Publishers, 2011.
Buscar texto completoNicholson, Anna, Evan Randall, Lisa Brown, Carolyn Shore y Benjamin Kahn, eds. The Security of America's Medical Product Supply Chain. Washington, D.C.: National Academies Press, 2021. http://dx.doi.org/10.17226/26137.
Texto completoKieras, Timothy, Junaid Farooq y Quanyan Zhu. IoT Supply Chain Security Risk Analysis and Mitigation. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-08480-5.
Texto completoBurges, Dan. Cargo theft, loss prevention, and supply chain security. Waltham, MA: Butterworth-Heinemann, 2012.
Buscar texto completoEnterprise software delivery: Bringing agility and efficiency to the global software supply chain. Upper Saddle River, NJ: Addison-Wesley, 2013.
Buscar texto completoKoepsel, Kirsten M., ed. The Aerospace Supply Chain and Cyber Security - Challenges Ahead. Warrendale, PA: SAE International, 2018. http://dx.doi.org/10.4271/t-133.
Texto completoEssig, Michael. Supply Chain Safety Management: Security and Robustness in Logistics. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013.
Buscar texto completoWillis, Henry H. Evaluating the security of the global containerized supply chain. Santa Monica, CA: RAND Corporation, 2004.
Buscar texto completoCapítulos de libros sobre el tema "Software Supply Chain Security"
Yang, Jeong, Young Lee y Arlen P. McDonald. "SolarWinds Software Supply Chain Security: Better Protection with Enforced Policies and Technologies". En Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, 43–58. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-92317-4_4.
Texto completoBarabanov, Alexander, Alexey Markov y Valentin Tsirlov. "On Systematics of the Information Security of Software Supply Chains". En Software Engineering Perspectives in Intelligent Systems, 115–29. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-63322-6_9.
Texto completoZomer, Gerwin. "Supply Chain Security". En Operations, Logistics and Supply Chain Management, 575–92. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-92447-2_25.
Texto completoCollier, Zachary A. y Shital A. Thekdi. "Supply Chain Security". En The Palgrave Handbook of Supply Chain Management, 1–24. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-89822-9_30-1.
Texto completoSeaman, Jim. "Securing Your Supply Chain". En Protective Security, 439–85. Berkeley, CA: Apress, 2021. http://dx.doi.org/10.1007/978-1-4842-6908-4_11.
Texto completoSzymonik, Andrzej y Robert Stanisławski. "Conclusions". En Supply Chain Security, 271–74. New York: Productivity Press, 2022. http://dx.doi.org/10.4324/9781003286110-10.
Texto completoSzymonik, Andrzej y Robert Stanisławski. "Safety Determinants for the Needs of the Delivery Chain". En Supply Chain Security, 1–24. New York: Productivity Press, 2022. http://dx.doi.org/10.4324/9781003286110-2.
Texto completoSzymonik, Andrzej y Robert Stanisławski. "Reverse Logistics in Supply Chains:". En Supply Chain Security, 193–206. New York: Productivity Press, 2022. http://dx.doi.org/10.4324/9781003286110-7.
Texto completoSzymonik, Andrzej y Robert Stanisławski. "Technologies Supporting Supply Chain Safety Management". En Supply Chain Security, 159–92. New York: Productivity Press, 2022. http://dx.doi.org/10.4324/9781003286110-6.
Texto completoSzymonik, Andrzej y Robert Stanisławski. "Contemporary Conditions of Supply Chains". En Supply Chain Security, 25–66. New York: Productivity Press, 2022. http://dx.doi.org/10.4324/9781003286110-3.
Texto completoActas de conferencias sobre el tema "Software Supply Chain Security"
Ellison, Robert J. y Carol Woody. "Supply-Chain Risk Management: Incorporating Security into Software Development". En 2010 43rd Hawaii International Conference on System Sciences. IEEE, 2010. http://dx.doi.org/10.1109/hicss.2010.355.
Texto completoNakano, Yuto, Toru Nakamura, Yasuaki Kobayashi, Takashi Ozu, Masahito Ishizaka, Masayuki Hashimoto, Hiroyuki Yokoyama, Yutaka Miyake y Shinsaku Kiyomoto. "Automatic Security Inspection Framework for Trustworthy Supply Chain". En 2021 IEEE/ACIS 19th International Conference on Software Engineering Research, Management and Applications (SERA). IEEE, 2021. http://dx.doi.org/10.1109/sera51205.2021.9509040.
Texto completoAxelrod, C. Warren. "Assuring software and hardware security and integrity throughout the supply chain". En 2011 IEEE International Conference on Technologies for Homeland Security (HST). IEEE, 2011. http://dx.doi.org/10.1109/ths.2011.6107848.
Texto completoOhm, Marc, Arnold Sykosch y Michael Meier. "Towards detection of software supply chain attacks by forensic artifacts". En ARES 2020: The 15th International Conference on Availability, Reliability and Security. New York, NY, USA: ACM, 2020. http://dx.doi.org/10.1145/3407023.3409183.
Texto completoHejderup, Joseph. "On the Use of Tests for Software Supply Chain Threats". En CCS '22: 2022 ACM SIGSAC Conference on Computer and Communications Security. New York, NY, USA: ACM, 2022. http://dx.doi.org/10.1145/3560835.3564557.
Texto completoMartin, Robert Alan. "Visibility & Control: Addressing Supply Chain Challenges to Trustworthy Software-Enabled Things". En 2020 IEEE Systems Security Symposium (SSS). IEEE, 2020. http://dx.doi.org/10.1109/sss47320.2020.9174365.
Texto completoVu, Duc Ly, Ivan Pashchenko, Fabio Massacci, Henrik Plate y Antonino Sabetta. "Towards Using Source Code Repositories to Identify Software Supply Chain Attacks". En CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security. New York, NY, USA: ACM, 2020. http://dx.doi.org/10.1145/3372297.3420015.
Texto completoOkafor, Chinenye, Taylor R. Schorlemmer, Santiago Torres-Arias y James C. Davis. "SoK: Analysis of Software Supply Chain Security by Establishing Secure Design Properties". En CCS '22: 2022 ACM SIGSAC Conference on Computer and Communications Security. New York, NY, USA: ACM, 2022. http://dx.doi.org/10.1145/3560835.3564556.
Texto completoMartin, Robert Alan. "Assurance for CyberPhysical Systems: Addressing Supply Chain Challenges to Trustworthy Software-Enabled Things". En 2020 IEEE Systems Security Symposium (SSS). IEEE, 2020. http://dx.doi.org/10.1109/sss47320.2020.9174201.
Texto completoKeller, Joseph, Shuva Paul, Santiago Grijalva y Vincent J. Mooney. "Experimental Setup for Grid Control Device Software Updates in Supply Chain Cyber-Security". En 2022 North American Power Symposium (NAPS). IEEE, 2022. http://dx.doi.org/10.1109/naps56150.2022.10012179.
Texto completoInformes sobre el tema "Software Supply Chain Security"
Chandramouli, Ramaswamy. Securing the Artifacts in Software Supply Chain for Building Cloud-Native Microservices Applications. Gaithersburg, MD: National Institute of Standards and Technology, 2023. http://dx.doi.org/10.6028/nist.sp.800-204d.ipd.
Texto completoVisker, Edward R. Improving the DoD Supply Chain Can Commercial Supply Chain Management Software Do the Job"". Fort Belvoir, VA: Defense Technical Information Center, abril de 2000. http://dx.doi.org/10.21236/ada378230.
Texto completoHund, Gretchen. Walk the Talk: Progress in Building a Supply Chain Security Culture. Office of Scientific and Technical Information (OSTI), agosto de 2016. http://dx.doi.org/10.2172/1329456.
Texto completoEdwards, Frances, Joseph Szyliowicz, Dan Goodrich, William Medigovich, Liz Lange y Autumn Anderton. Surface Transportation Supply Chain Security: Creating a Blueprint for Future Research. Mineta Transportation Institute, abril de 2021. http://dx.doi.org/10.31979/mti.2021.1937.
Texto completoHund, Gretchen. Walk the Talk: How PNNL is developing a Supply Chain Security Culture. Office of Scientific and Technical Information (OSTI), septiembre de 2015. http://dx.doi.org/10.2172/1334055.
Texto completoKhan, Saif M., Alexander Mann y Dahlia Peterson. The Semiconductor Supply Chain: Assessing National Competitiveness. Center for Security and Emerging Technology, enero de 2021. http://dx.doi.org/10.51593/20190016.
Texto completoLindquist, Joachim y Henning de Haas. Creating Supply Chain Resilience Through Scenario Planning: How a Digital Twin Can Be Used To Enhance Supply Chain Resilience Through Scenario Planning. Aarhus University Library, 2021. http://dx.doi.org/10.7146/aul.435.
Texto completoBoyens, Jon M. Cybersecurity Supply Chain Risk Management for Systems and Organizations. Gaithersburg, MD: National Institute of Standards and Technology, 2022. http://dx.doi.org/10.6028/nist.sp.800-161r1.
Texto completoRowland, Michael y Benjamin Karch. Security Evaluation of Smart Cards and Secure Tokens: Benefits and Drawbacks for Reducing Supply Chain Risks of Nuclear Power Plants. Office of Scientific and Technical Information (OSTI), agosto de 2022. http://dx.doi.org/10.2172/1884928.
Texto completoHicks, Julie, Laurin Yates y Jackie Pettway. Mat Sinking Unit supply study : Mississippi River revetment. Engineer Research and Development Center (U.S.), septiembre de 2021. http://dx.doi.org/10.21079/11681/41867.
Texto completo