Littérature scientifique sur le sujet « Software Supply Chain Security »
Créez une référence correcte selon les styles APA, MLA, Chicago, Harvard et plusieurs autres
Sommaire
Consultez les listes thématiques d’articles de revues, de livres, de thèses, de rapports de conférences et d’autres sources académiques sur le sujet « Software Supply Chain Security ».
À côté de chaque source dans la liste de références il y a un bouton « Ajouter à la bibliographie ». Cliquez sur ce bouton, et nous générerons automatiquement la référence bibliographique pour la source choisie selon votre style de citation préféré : APA, MLA, Harvard, Vancouver, Chicago, etc.
Vous pouvez aussi télécharger le texte intégral de la publication scolaire au format pdf et consulter son résumé en ligne lorsque ces informations sont inclues dans les métadonnées.
Articles de revues sur le sujet "Software Supply Chain Security"
Morkūnas, Mangirdas, Elzė Rudienė et Aleksander Ostenda. « CAN CLIMATE-SMART AGRICULTURE HELP TO ASSURE FOOD SECURITY THROUGH SHORT SUPPLY CHAINS ? A SYSTEMATIC BIBLIOMETRIC AND BIBLIOGRAPHIC LITERATURE REVIEW ». Journal Business, Management and Economics Engineering 20, no 02 (14 juillet 2022) : 207–23. http://dx.doi.org/10.3846/bmee.2022.17101.
Texte intégralP.N., Sindhuja. « The impact of information security initiatives on supply chain robustness and performance : an empirical study ». Information & ; Computer Security 29, no 2 (10 juin 2021) : 365–91. http://dx.doi.org/10.1108/ics-07-2020-0128.
Texte intégralKaczorowski, Maya, Falcon Momot, George V. Neville-Neil et Chris McCubbin. « OSS Supply-chain Security : What Will It Take ? » Queue 20, no 5 (31 octobre 2022) : 86–102. http://dx.doi.org/10.1145/3570923.
Texte intégralBarabanov, Alexander V., Alexey S. Markov et Valentin L. Tsirlov. « Information security systematics of software supply chains ». Bezopasnost informacionnyh tehnology 26, no 3 (septembre 2019) : 68–79. http://dx.doi.org/10.26583/bit.2019.3.06.
Texte intégralTurjo, Manoshi Das, Mohammad Monirujjaman Khan, Manjit Kaur et Atef Zaguia. « Smart Supply Chain Management Using the Blockchain and Smart Contract ». Scientific Programming 2021 (28 septembre 2021) : 1–12. http://dx.doi.org/10.1155/2021/6092792.
Texte intégralEhsan, Ibtisam, Muhammad Irfan Khalid, Laura Ricci, Jawaid Iqbal, Amerah Alabrah, Syed Sajid Ullah et Taha M. Alfakih. « A Conceptual Model for Blockchain-Based Agriculture Food Supply Chain System ». Scientific Programming 2022 (28 février 2022) : 1–15. http://dx.doi.org/10.1155/2022/7358354.
Texte intégralWang, Lai-Wang, Chen-Chih Hung et Ching-Tang Hsieh. « Security Strategy Optimization and Algorithm Based on 3D Economic Sustainable Supply Chain ». Scientific Programming 2022 (10 septembre 2022) : 1–11. http://dx.doi.org/10.1155/2022/9972658.
Texte intégralMarjanovic, Jelena, Nikola Dalcekovic et Goran Sladic. « Blockchain-based model for tracking compliance with security requirements ». Computer Science and Information Systems, no 00 (2022) : 60. http://dx.doi.org/10.2298/csis210923060m.
Texte intégralKusumastuti, Ratna Yulia, Heti Mulyati et Gendut Suprayitno. « Disclosure Integration of Lean Six Sigma Principles in Sustainable Supply Chain in Poultry Industry ». Indonesian Interdisciplinary Journal of Sharia Economics (IIJSE) 4, no 1 (6 octobre 2021) : 300–312. http://dx.doi.org/10.31538/iijse.v4i1.1706.
Texte intégralКуликов, Сергей Сергеевич, Владимир Иванович Белоножкин et Николай Алексеевич Ююкин. « ANALYSIS OF INFORMATION SECURITY THREATS, ASSOCIATED WITH SUPPLY CHAIN ATTACKS ». ИНФОРМАЦИЯ И БЕЗОПАСНОСТЬ, no 1(-) (5 avril 2022) : 135–40. http://dx.doi.org/10.36622/vstu.2022.25.1.011.
Texte intégralThèses sur le sujet "Software Supply Chain Security"
Vu, Duc Ly. « Towards Understanding and Securing the OSS Supply Chain ». Doctoral thesis, Università degli studi di Trento, 2022. http://hdl.handle.net/11572/333508.
Texte intégralMassimino, Brett J. « Operational Factors Affecting the Confidentiality of Proprietary Digital Assets ». The Ohio State University, 2014. http://rave.ohiolink.edu/etdc/view?acc_num=osu1405683732.
Texte intégralSichel, Alexander R. (Alexander Russell). « Supply chain security along the Columbia River : an analysis of maritime supply chain security with respect to communication between security experts ». Thesis, Massachusetts Institute of Technology, 2005. http://hdl.handle.net/1721.1/33589.
Texte intégralIncludes bibliographical references (leaves 74-75).
The amount of cargo that enters the US border is at an all time high. Cargo containers and vessel shipments enter the US from all over the world. Tracking these shipments from their origin to destination requires professional expertise. Security organizations, such as the Regional Maritime Security Coalition of the Columbia River, realize the potential of these professionals, who track and coordinate cargo containers as they move through a supply chain, to enhance security of maritime cargo. In order to utilize these supply chain logistic professionals in a security coalition, proper training and certification would be required to comply with the US Federal Code on Liability Protection. This study examines the requirements that are necessary to certify supply chain logistic professionals as certified volunteers in an information sharing, security communication network to prevent terrorist activity, smuggling, theft, and to assist in general crisis mitigation. The thesis studies how the RMSC is currently developing its security communication system around supply chain logistic professionals, and the requirements and training that would be necessary to certify them under the US Federal Code.
by Alexander R. Sichel.
S.M.
Park, Hong. « Impact of supply chain security orientation on port performance ». Thesis, Cardiff University, 2013. http://orca.cf.ac.uk/52117/.
Texte intégralGarshasbi, Farzam, et Ebrahimi Shahram Pasha. « Supply Chain Security Programs Comparing TAPA FSR with ISPS ». Thesis, Högskolan i Borås, Institutionen Ingenjörshögskolan, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:hb:diva-16642.
Texte intégralProgram: BSc in Industrial Engineering - International Business Engineering
Holt, Christopher Michael Taylor 1968. « Supply chain simulator : an approach for development of software and methodology for simulation of supply chain management ». Thesis, Massachusetts Institute of Technology, 1999. http://hdl.handle.net/1721.1/9495.
Texte intégralIncludes bibliographical references (leaves 94-97).
Many companies see how new strategies and technologies can enable more efficient and adaptive supply chains-but they struggle to understand how these technologies overlay with existing processes and personnel issues both during and after implementation. This thesis investigates the concept of a simulated environment where multiple constituents whether they are different parts of a company's organization or different companies within a supply chain-can come together to design and experiment with new supply chain structures. The thesis explores the argument that the supply chain can be simulated, and evaluates different approaches to developing such a simulation that would allow low-risk experimentation and accelerated learning for supply chain managers. The thesis begins with an executive summary that provides a high level treatment of the challenges and recommendations associated with supply chain simulation, then proceeds to present a definition of the elaborate interrelationships between companies, technologies and business processes that collectively shape an industry's supply chain. This is followed by a discussion of complexity theory and general simulation techniques that could be applicable to the development of a software simulation environment in this area. Then, a review of efforts to date to simulate management of the supply chain, including approach, resources required, and eventual results is followed by a recommendation and justification of the thesis' approach to supply chain simulation. Finally, operating methods are presented for development and management of the learning and decision-making processes required to best utilize the software. The conclusion of the thesis is that because of the emergence of new technologies, the supply chain can be simulated for practical experimentation and learning. It is apparent that significant supply chain performance improvement can be identified and quantified through simulation. The thesis recommends using agent-based modeling, specifically a software package called Swarm, as the software environment. The software should be supported by operating methods that can maximize its capabilities while encouraging the likelihood of adoption of solutions identified.
by Christopher Michael Taylor Holt.
M.Eng.
Malinowski, Mateusz Ksawery. « CargoNet : micropower sensate tags for supply-chain management and security ». Thesis, Massachusetts Institute of Technology, 2007. http://hdl.handle.net/1721.1/41654.
Texte intégralIncludes bibliographical references (p. 109-113).
This thesis describes the development of a system of sensate active RFID tags for supply-chain management and security applications, necessitated by the current lack of commercial platforms capable of monitoring the state of shipments at the crate and case level. To make a practical prototype, off-the-shelf components and custom-designed circuits that minimize power consumption and cost were assembled and integrated into an interrupt-driven, quasi-passive system that can monitor, log, and report environmental conditions inside a shipping crate while consuming only 23.7 microwatts of average power. To prove the feasibility of the system, the tags were tested in the laboratory and aboard transport conveyances.
by Mateusz Ksawery Malinowski.
M.Eng.
Barcelos, Mariana Alexandra Aleixo de. « Towards a security framework for the semiconductor supply chain environment ». Master's thesis, Universidade de Aveiro, 2018. http://hdl.handle.net/10773/23555.
Texte intégralHoje em dia, a troca de informação entre os parceiros da cadeia de forne-cimento de semicondutores pode ser alvo de muitas ameaças de segurança conhecidas e desconhecidas no ambiente interno/externo dos parceiros. Particularmente, estas vulnerabilidades, no ambiente da cadeia de fornecimento de semicondutores, podem ser exploradas por atacantes com um amplo espectro de motivações que vão desde intenções criminais, visando o ganho financeiro, até à espionagem industrial e a cyber-sabotagem. Os atacantes podem comprometer a comunicação de dados entre parceiros na cadeia de fornecimento e, portanto, podem prejudicar o fornecimento de serviços pelos parceiros, bem como a continuidade da prestação de serviços. Como resultado, os parceiros da cadeia de fornecimento de semicondutores poderão sofrer repercussões nocivas que podem causar perdas significativas de receita, destruição da sua marca e atrasos no avanço das suas tecnologias. Consequentemente, uma plataforma de segurança para o ambiente da cadeia de fornecimento de semicondutores é de extrema importância. Assim, a intenção desta tese é fornecer uma base para uma plataforma de segurança para comunicação segura de dados entre todos os parceiros da cadeia de fornecimento de semicondutores.
Nowadays, data communication across the partners in the semiconductor supply chain can be the target of many known and unknown security threats exploiting security vulnerabilities in the internal/external environment of the partners. Particularly, these vulnerabilities in the semiconductor supply chain environment can be exploited by attackers with a wide spectrum of motivations ranging from criminal intents aimed at nancial gain to industrial espionage and cyber-sabotage. Attackers can compromise the data communication between legitimate parties in the supply chain and thus can jeopardize the delivery of services across the partners as well as the continuity of the service provision. As a result, semiconductor supply chain partners will su er from damaging repercussions which can cause signi cant revenue loss, destroy their brand and eventually hinder their advancement. Consequently, a security framework for the semiconductor supply chain environment is of utmost importance. Hence, the intent of this thesis is to provide a foundation for a security framework for secure data communication across the partners in the semiconductor supply chain.
Williams, Zachary. « Supply chain security an institutional approach to strategies and outcomes / ». Diss., Mississippi State : Mississippi State University, 2008. http://library.msstate.edu/etd/show.asp?etd=etd-03312008-163918.
Texte intégralSheinbein, Rachel Felice 1975. « Applying supply chain methodology to a centralized software licensing strategy ». Thesis, Massachusetts Institute of Technology, 2004. http://hdl.handle.net/1721.1/34781.
Texte intégralIncludes bibliographical references (p. 76).
Eleven percent of companies spend between $150K and $200K per year per engineer on software development tools and nine percent spend more than $200K, according to a Silicon Integration Initiative/Gartner/EE Times study from 2002. For Agilent Technologies, these costs result in spending tens of millions of dollars each year on software, and for Motorola, the costs are more than $100M each year. From the current trends in software spending, one can infer that companies will pay even more for software in the future, because the cost of the software itself is rising and because of the complexity of the technology needed for innovation. In order to understand whether the total spending on software is appropriate and necessary, Agilent sponsored this project to create a model that analyzes the trade-offs between the cost of software and the cost of software unavailability. The model treats software licenses as supplies to the development of a product, and thus, supply chain methodologies such as inventory (cost of licenses), stock outs (cost of unavailability) and service level are applied. The goal of the model is to minimize software costs while maintaining a satisfactory level of service. The thesis explains the model and then shows the results from applying it to four software products that Agilent currently uses. The results show that in the absence of this type of analysis, Agilent spends more than necessary for software licenses. In fact, Agilent can reduce costs by at least 5%. This model can be used by Agilent and other companies to optimize software purchases.
by Rachel Felice Sheinbein.
S.M.
M.B.A.
Livres sur le sujet "Software Supply Chain Security"
Thomas, Andrew R., et Sebastian Vaduva, dir. Global Supply Chain Security. New York, NY : Springer New York, 2015. http://dx.doi.org/10.1007/978-1-4939-2178-2.
Texte intégralHalak, Basel, dir. Hardware Supply Chain Security. Cham : Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-62707-2.
Texte intégralAlfonso, Cristina M., Jason P. Sullivan, Cristina M. Alfonso et Jason P. Sullivan. Cargo containers and supply chain security. New York : Nova Science Publishers, 2011.
Trouver le texte intégralNicholson, Anna, Evan Randall, Lisa Brown, Carolyn Shore et Benjamin Kahn, dir. The Security of America's Medical Product Supply Chain. Washington, D.C. : National Academies Press, 2021. http://dx.doi.org/10.17226/26137.
Texte intégralKieras, Timothy, Junaid Farooq et Quanyan Zhu. IoT Supply Chain Security Risk Analysis and Mitigation. Cham : Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-08480-5.
Texte intégralBurges, Dan. Cargo theft, loss prevention, and supply chain security. Waltham, MA : Butterworth-Heinemann, 2012.
Trouver le texte intégralEnterprise software delivery : Bringing agility and efficiency to the global software supply chain. Upper Saddle River, NJ : Addison-Wesley, 2013.
Trouver le texte intégralKoepsel, Kirsten M., dir. The Aerospace Supply Chain and Cyber Security - Challenges Ahead. Warrendale, PA : SAE International, 2018. http://dx.doi.org/10.4271/t-133.
Texte intégralEssig, Michael. Supply Chain Safety Management : Security and Robustness in Logistics. Berlin, Heidelberg : Springer Berlin Heidelberg, 2013.
Trouver le texte intégralWillis, Henry H. Evaluating the security of the global containerized supply chain. Santa Monica, CA : RAND Corporation, 2004.
Trouver le texte intégralChapitres de livres sur le sujet "Software Supply Chain Security"
Yang, Jeong, Young Lee et Arlen P. McDonald. « SolarWinds Software Supply Chain Security : Better Protection with Enforced Policies and Technologies ». Dans Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, 43–58. Cham : Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-92317-4_4.
Texte intégralBarabanov, Alexander, Alexey Markov et Valentin Tsirlov. « On Systematics of the Information Security of Software Supply Chains ». Dans Software Engineering Perspectives in Intelligent Systems, 115–29. Cham : Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-63322-6_9.
Texte intégralZomer, Gerwin. « Supply Chain Security ». Dans Operations, Logistics and Supply Chain Management, 575–92. Cham : Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-92447-2_25.
Texte intégralCollier, Zachary A., et Shital A. Thekdi. « Supply Chain Security ». Dans The Palgrave Handbook of Supply Chain Management, 1–24. Cham : Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-89822-9_30-1.
Texte intégralSeaman, Jim. « Securing Your Supply Chain ». Dans Protective Security, 439–85. Berkeley, CA : Apress, 2021. http://dx.doi.org/10.1007/978-1-4842-6908-4_11.
Texte intégralSzymonik, Andrzej, et Robert Stanisławski. « Conclusions ». Dans Supply Chain Security, 271–74. New York : Productivity Press, 2022. http://dx.doi.org/10.4324/9781003286110-10.
Texte intégralSzymonik, Andrzej, et Robert Stanisławski. « Safety Determinants for the Needs of the Delivery Chain ». Dans Supply Chain Security, 1–24. New York : Productivity Press, 2022. http://dx.doi.org/10.4324/9781003286110-2.
Texte intégralSzymonik, Andrzej, et Robert Stanisławski. « Reverse Logistics in Supply Chains : ». Dans Supply Chain Security, 193–206. New York : Productivity Press, 2022. http://dx.doi.org/10.4324/9781003286110-7.
Texte intégralSzymonik, Andrzej, et Robert Stanisławski. « Technologies Supporting Supply Chain Safety Management ». Dans Supply Chain Security, 159–92. New York : Productivity Press, 2022. http://dx.doi.org/10.4324/9781003286110-6.
Texte intégralSzymonik, Andrzej, et Robert Stanisławski. « Contemporary Conditions of Supply Chains ». Dans Supply Chain Security, 25–66. New York : Productivity Press, 2022. http://dx.doi.org/10.4324/9781003286110-3.
Texte intégralActes de conférences sur le sujet "Software Supply Chain Security"
Ellison, Robert J., et Carol Woody. « Supply-Chain Risk Management : Incorporating Security into Software Development ». Dans 2010 43rd Hawaii International Conference on System Sciences. IEEE, 2010. http://dx.doi.org/10.1109/hicss.2010.355.
Texte intégralNakano, Yuto, Toru Nakamura, Yasuaki Kobayashi, Takashi Ozu, Masahito Ishizaka, Masayuki Hashimoto, Hiroyuki Yokoyama, Yutaka Miyake et Shinsaku Kiyomoto. « Automatic Security Inspection Framework for Trustworthy Supply Chain ». Dans 2021 IEEE/ACIS 19th International Conference on Software Engineering Research, Management and Applications (SERA). IEEE, 2021. http://dx.doi.org/10.1109/sera51205.2021.9509040.
Texte intégralAxelrod, C. Warren. « Assuring software and hardware security and integrity throughout the supply chain ». Dans 2011 IEEE International Conference on Technologies for Homeland Security (HST). IEEE, 2011. http://dx.doi.org/10.1109/ths.2011.6107848.
Texte intégralOhm, Marc, Arnold Sykosch et Michael Meier. « Towards detection of software supply chain attacks by forensic artifacts ». Dans ARES 2020 : The 15th International Conference on Availability, Reliability and Security. New York, NY, USA : ACM, 2020. http://dx.doi.org/10.1145/3407023.3409183.
Texte intégralHejderup, Joseph. « On the Use of Tests for Software Supply Chain Threats ». Dans CCS '22 : 2022 ACM SIGSAC Conference on Computer and Communications Security. New York, NY, USA : ACM, 2022. http://dx.doi.org/10.1145/3560835.3564557.
Texte intégralMartin, Robert Alan. « Visibility & ; Control : Addressing Supply Chain Challenges to Trustworthy Software-Enabled Things ». Dans 2020 IEEE Systems Security Symposium (SSS). IEEE, 2020. http://dx.doi.org/10.1109/sss47320.2020.9174365.
Texte intégralVu, Duc Ly, Ivan Pashchenko, Fabio Massacci, Henrik Plate et Antonino Sabetta. « Towards Using Source Code Repositories to Identify Software Supply Chain Attacks ». Dans CCS '20 : 2020 ACM SIGSAC Conference on Computer and Communications Security. New York, NY, USA : ACM, 2020. http://dx.doi.org/10.1145/3372297.3420015.
Texte intégralOkafor, Chinenye, Taylor R. Schorlemmer, Santiago Torres-Arias et James C. Davis. « SoK : Analysis of Software Supply Chain Security by Establishing Secure Design Properties ». Dans CCS '22 : 2022 ACM SIGSAC Conference on Computer and Communications Security. New York, NY, USA : ACM, 2022. http://dx.doi.org/10.1145/3560835.3564556.
Texte intégralMartin, Robert Alan. « Assurance for CyberPhysical Systems : Addressing Supply Chain Challenges to Trustworthy Software-Enabled Things ». Dans 2020 IEEE Systems Security Symposium (SSS). IEEE, 2020. http://dx.doi.org/10.1109/sss47320.2020.9174201.
Texte intégralKeller, Joseph, Shuva Paul, Santiago Grijalva et Vincent J. Mooney. « Experimental Setup for Grid Control Device Software Updates in Supply Chain Cyber-Security ». Dans 2022 North American Power Symposium (NAPS). IEEE, 2022. http://dx.doi.org/10.1109/naps56150.2022.10012179.
Texte intégralRapports d'organisations sur le sujet "Software Supply Chain Security"
Chandramouli, Ramaswamy. Securing the Artifacts in Software Supply Chain for Building Cloud-Native Microservices Applications. Gaithersburg, MD : National Institute of Standards and Technology, 2023. http://dx.doi.org/10.6028/nist.sp.800-204d.ipd.
Texte intégralVisker, Edward R. Improving the DoD Supply Chain Can Commercial Supply Chain Management Software Do the Job"". Fort Belvoir, VA : Defense Technical Information Center, avril 2000. http://dx.doi.org/10.21236/ada378230.
Texte intégralHund, Gretchen. Walk the Talk : Progress in Building a Supply Chain Security Culture. Office of Scientific and Technical Information (OSTI), août 2016. http://dx.doi.org/10.2172/1329456.
Texte intégralEdwards, Frances, Joseph Szyliowicz, Dan Goodrich, William Medigovich, Liz Lange et Autumn Anderton. Surface Transportation Supply Chain Security : Creating a Blueprint for Future Research. Mineta Transportation Institute, avril 2021. http://dx.doi.org/10.31979/mti.2021.1937.
Texte intégralHund, Gretchen. Walk the Talk : How PNNL is developing a Supply Chain Security Culture. Office of Scientific and Technical Information (OSTI), septembre 2015. http://dx.doi.org/10.2172/1334055.
Texte intégralKhan, Saif M., Alexander Mann et Dahlia Peterson. The Semiconductor Supply Chain : Assessing National Competitiveness. Center for Security and Emerging Technology, janvier 2021. http://dx.doi.org/10.51593/20190016.
Texte intégralLindquist, Joachim, et Henning de Haas. Creating Supply Chain Resilience Through Scenario Planning : How a Digital Twin Can Be Used To Enhance Supply Chain Resilience Through Scenario Planning. Aarhus University Library, 2021. http://dx.doi.org/10.7146/aul.435.
Texte intégralBoyens, Jon M. Cybersecurity Supply Chain Risk Management for Systems and Organizations. Gaithersburg, MD : National Institute of Standards and Technology, 2022. http://dx.doi.org/10.6028/nist.sp.800-161r1.
Texte intégralRowland, Michael, et Benjamin Karch. Security Evaluation of Smart Cards and Secure Tokens : Benefits and Drawbacks for Reducing Supply Chain Risks of Nuclear Power Plants. Office of Scientific and Technical Information (OSTI), août 2022. http://dx.doi.org/10.2172/1884928.
Texte intégralHicks, Julie, Laurin Yates et Jackie Pettway. Mat Sinking Unit supply study : Mississippi River revetment. Engineer Research and Development Center (U.S.), septembre 2021. http://dx.doi.org/10.21079/11681/41867.
Texte intégral