Добірка наукової літератури з теми "Software Supply Chain Security"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "Software Supply Chain Security".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Статті в журналах з теми "Software Supply Chain Security"
Morkūnas, Mangirdas, Elzė Rudienė, and Aleksander Ostenda. "CAN CLIMATE-SMART AGRICULTURE HELP TO ASSURE FOOD SECURITY THROUGH SHORT SUPPLY CHAINS? A SYSTEMATIC BIBLIOMETRIC AND BIBLIOGRAPHIC LITERATURE REVIEW." Journal Business, Management and Economics Engineering 20, no. 02 (July 14, 2022): 207–23. http://dx.doi.org/10.3846/bmee.2022.17101.
Повний текст джерелаP.N., Sindhuja. "The impact of information security initiatives on supply chain robustness and performance: an empirical study." Information & Computer Security 29, no. 2 (June 10, 2021): 365–91. http://dx.doi.org/10.1108/ics-07-2020-0128.
Повний текст джерелаKaczorowski, Maya, Falcon Momot, George V. Neville-Neil, and Chris McCubbin. "OSS Supply-chain Security: What Will It Take?" Queue 20, no. 5 (October 31, 2022): 86–102. http://dx.doi.org/10.1145/3570923.
Повний текст джерелаBarabanov, Alexander V., Alexey S. Markov, and Valentin L. Tsirlov. "Information security systematics of software supply chains." Bezopasnost informacionnyh tehnology 26, no. 3 (September 2019): 68–79. http://dx.doi.org/10.26583/bit.2019.3.06.
Повний текст джерелаTurjo, Manoshi Das, Mohammad Monirujjaman Khan, Manjit Kaur, and Atef Zaguia. "Smart Supply Chain Management Using the Blockchain and Smart Contract." Scientific Programming 2021 (September 28, 2021): 1–12. http://dx.doi.org/10.1155/2021/6092792.
Повний текст джерелаEhsan, Ibtisam, Muhammad Irfan Khalid, Laura Ricci, Jawaid Iqbal, Amerah Alabrah, Syed Sajid Ullah, and Taha M. Alfakih. "A Conceptual Model for Blockchain-Based Agriculture Food Supply Chain System." Scientific Programming 2022 (February 28, 2022): 1–15. http://dx.doi.org/10.1155/2022/7358354.
Повний текст джерелаWang, Lai-Wang, Chen-Chih Hung, and Ching-Tang Hsieh. "Security Strategy Optimization and Algorithm Based on 3D Economic Sustainable Supply Chain." Scientific Programming 2022 (September 10, 2022): 1–11. http://dx.doi.org/10.1155/2022/9972658.
Повний текст джерелаMarjanovic, Jelena, Nikola Dalcekovic, and Goran Sladic. "Blockchain-based model for tracking compliance with security requirements." Computer Science and Information Systems, no. 00 (2022): 60. http://dx.doi.org/10.2298/csis210923060m.
Повний текст джерелаKusumastuti, Ratna Yulia, Heti Mulyati, and Gendut Suprayitno. "Disclosure Integration of Lean Six Sigma Principles in Sustainable Supply Chain in Poultry Industry." Indonesian Interdisciplinary Journal of Sharia Economics (IIJSE) 4, no. 1 (October 6, 2021): 300–312. http://dx.doi.org/10.31538/iijse.v4i1.1706.
Повний текст джерелаКуликов, Сергей Сергеевич, Владимир Иванович Белоножкин, and Николай Алексеевич Ююкин. "ANALYSIS OF INFORMATION SECURITY THREATS, ASSOCIATED WITH SUPPLY CHAIN ATTACKS." ИНФОРМАЦИЯ И БЕЗОПАСНОСТЬ, no. 1(-) (April 5, 2022): 135–40. http://dx.doi.org/10.36622/vstu.2022.25.1.011.
Повний текст джерелаДисертації з теми "Software Supply Chain Security"
Vu, Duc Ly. "Towards Understanding and Securing the OSS Supply Chain." Doctoral thesis, Università degli studi di Trento, 2022. http://hdl.handle.net/11572/333508.
Повний текст джерелаMassimino, Brett J. "Operational Factors Affecting the Confidentiality of Proprietary Digital Assets." The Ohio State University, 2014. http://rave.ohiolink.edu/etdc/view?acc_num=osu1405683732.
Повний текст джерелаSichel, Alexander R. (Alexander Russell). "Supply chain security along the Columbia River : an analysis of maritime supply chain security with respect to communication between security experts." Thesis, Massachusetts Institute of Technology, 2005. http://hdl.handle.net/1721.1/33589.
Повний текст джерелаIncludes bibliographical references (leaves 74-75).
The amount of cargo that enters the US border is at an all time high. Cargo containers and vessel shipments enter the US from all over the world. Tracking these shipments from their origin to destination requires professional expertise. Security organizations, such as the Regional Maritime Security Coalition of the Columbia River, realize the potential of these professionals, who track and coordinate cargo containers as they move through a supply chain, to enhance security of maritime cargo. In order to utilize these supply chain logistic professionals in a security coalition, proper training and certification would be required to comply with the US Federal Code on Liability Protection. This study examines the requirements that are necessary to certify supply chain logistic professionals as certified volunteers in an information sharing, security communication network to prevent terrorist activity, smuggling, theft, and to assist in general crisis mitigation. The thesis studies how the RMSC is currently developing its security communication system around supply chain logistic professionals, and the requirements and training that would be necessary to certify them under the US Federal Code.
by Alexander R. Sichel.
S.M.
Park, Hong. "Impact of supply chain security orientation on port performance." Thesis, Cardiff University, 2013. http://orca.cf.ac.uk/52117/.
Повний текст джерелаGarshasbi, Farzam, and Ebrahimi Shahram Pasha. "Supply Chain Security Programs Comparing TAPA FSR with ISPS." Thesis, Högskolan i Borås, Institutionen Ingenjörshögskolan, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:hb:diva-16642.
Повний текст джерелаProgram: BSc in Industrial Engineering - International Business Engineering
Holt, Christopher Michael Taylor 1968. "Supply chain simulator : an approach for development of software and methodology for simulation of supply chain management." Thesis, Massachusetts Institute of Technology, 1999. http://hdl.handle.net/1721.1/9495.
Повний текст джерелаIncludes bibliographical references (leaves 94-97).
Many companies see how new strategies and technologies can enable more efficient and adaptive supply chains-but they struggle to understand how these technologies overlay with existing processes and personnel issues both during and after implementation. This thesis investigates the concept of a simulated environment where multiple constituents whether they are different parts of a company's organization or different companies within a supply chain-can come together to design and experiment with new supply chain structures. The thesis explores the argument that the supply chain can be simulated, and evaluates different approaches to developing such a simulation that would allow low-risk experimentation and accelerated learning for supply chain managers. The thesis begins with an executive summary that provides a high level treatment of the challenges and recommendations associated with supply chain simulation, then proceeds to present a definition of the elaborate interrelationships between companies, technologies and business processes that collectively shape an industry's supply chain. This is followed by a discussion of complexity theory and general simulation techniques that could be applicable to the development of a software simulation environment in this area. Then, a review of efforts to date to simulate management of the supply chain, including approach, resources required, and eventual results is followed by a recommendation and justification of the thesis' approach to supply chain simulation. Finally, operating methods are presented for development and management of the learning and decision-making processes required to best utilize the software. The conclusion of the thesis is that because of the emergence of new technologies, the supply chain can be simulated for practical experimentation and learning. It is apparent that significant supply chain performance improvement can be identified and quantified through simulation. The thesis recommends using agent-based modeling, specifically a software package called Swarm, as the software environment. The software should be supported by operating methods that can maximize its capabilities while encouraging the likelihood of adoption of solutions identified.
by Christopher Michael Taylor Holt.
M.Eng.
Malinowski, Mateusz Ksawery. "CargoNet : micropower sensate tags for supply-chain management and security." Thesis, Massachusetts Institute of Technology, 2007. http://hdl.handle.net/1721.1/41654.
Повний текст джерелаIncludes bibliographical references (p. 109-113).
This thesis describes the development of a system of sensate active RFID tags for supply-chain management and security applications, necessitated by the current lack of commercial platforms capable of monitoring the state of shipments at the crate and case level. To make a practical prototype, off-the-shelf components and custom-designed circuits that minimize power consumption and cost were assembled and integrated into an interrupt-driven, quasi-passive system that can monitor, log, and report environmental conditions inside a shipping crate while consuming only 23.7 microwatts of average power. To prove the feasibility of the system, the tags were tested in the laboratory and aboard transport conveyances.
by Mateusz Ksawery Malinowski.
M.Eng.
Barcelos, Mariana Alexandra Aleixo de. "Towards a security framework for the semiconductor supply chain environment." Master's thesis, Universidade de Aveiro, 2018. http://hdl.handle.net/10773/23555.
Повний текст джерелаHoje em dia, a troca de informação entre os parceiros da cadeia de forne-cimento de semicondutores pode ser alvo de muitas ameaças de segurança conhecidas e desconhecidas no ambiente interno/externo dos parceiros. Particularmente, estas vulnerabilidades, no ambiente da cadeia de fornecimento de semicondutores, podem ser exploradas por atacantes com um amplo espectro de motivações que vão desde intenções criminais, visando o ganho financeiro, até à espionagem industrial e a cyber-sabotagem. Os atacantes podem comprometer a comunicação de dados entre parceiros na cadeia de fornecimento e, portanto, podem prejudicar o fornecimento de serviços pelos parceiros, bem como a continuidade da prestação de serviços. Como resultado, os parceiros da cadeia de fornecimento de semicondutores poderão sofrer repercussões nocivas que podem causar perdas significativas de receita, destruição da sua marca e atrasos no avanço das suas tecnologias. Consequentemente, uma plataforma de segurança para o ambiente da cadeia de fornecimento de semicondutores é de extrema importância. Assim, a intenção desta tese é fornecer uma base para uma plataforma de segurança para comunicação segura de dados entre todos os parceiros da cadeia de fornecimento de semicondutores.
Nowadays, data communication across the partners in the semiconductor supply chain can be the target of many known and unknown security threats exploiting security vulnerabilities in the internal/external environment of the partners. Particularly, these vulnerabilities in the semiconductor supply chain environment can be exploited by attackers with a wide spectrum of motivations ranging from criminal intents aimed at nancial gain to industrial espionage and cyber-sabotage. Attackers can compromise the data communication between legitimate parties in the supply chain and thus can jeopardize the delivery of services across the partners as well as the continuity of the service provision. As a result, semiconductor supply chain partners will su er from damaging repercussions which can cause signi cant revenue loss, destroy their brand and eventually hinder their advancement. Consequently, a security framework for the semiconductor supply chain environment is of utmost importance. Hence, the intent of this thesis is to provide a foundation for a security framework for secure data communication across the partners in the semiconductor supply chain.
Williams, Zachary. "Supply chain security an institutional approach to strategies and outcomes /." Diss., Mississippi State : Mississippi State University, 2008. http://library.msstate.edu/etd/show.asp?etd=etd-03312008-163918.
Повний текст джерелаSheinbein, Rachel Felice 1975. "Applying supply chain methodology to a centralized software licensing strategy." Thesis, Massachusetts Institute of Technology, 2004. http://hdl.handle.net/1721.1/34781.
Повний текст джерелаIncludes bibliographical references (p. 76).
Eleven percent of companies spend between $150K and $200K per year per engineer on software development tools and nine percent spend more than $200K, according to a Silicon Integration Initiative/Gartner/EE Times study from 2002. For Agilent Technologies, these costs result in spending tens of millions of dollars each year on software, and for Motorola, the costs are more than $100M each year. From the current trends in software spending, one can infer that companies will pay even more for software in the future, because the cost of the software itself is rising and because of the complexity of the technology needed for innovation. In order to understand whether the total spending on software is appropriate and necessary, Agilent sponsored this project to create a model that analyzes the trade-offs between the cost of software and the cost of software unavailability. The model treats software licenses as supplies to the development of a product, and thus, supply chain methodologies such as inventory (cost of licenses), stock outs (cost of unavailability) and service level are applied. The goal of the model is to minimize software costs while maintaining a satisfactory level of service. The thesis explains the model and then shows the results from applying it to four software products that Agilent currently uses. The results show that in the absence of this type of analysis, Agilent spends more than necessary for software licenses. In fact, Agilent can reduce costs by at least 5%. This model can be used by Agilent and other companies to optimize software purchases.
by Rachel Felice Sheinbein.
S.M.
M.B.A.
Книги з теми "Software Supply Chain Security"
Thomas, Andrew R., and Sebastian Vaduva, eds. Global Supply Chain Security. New York, NY: Springer New York, 2015. http://dx.doi.org/10.1007/978-1-4939-2178-2.
Повний текст джерелаHalak, Basel, ed. Hardware Supply Chain Security. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-62707-2.
Повний текст джерелаAlfonso, Cristina M., Jason P. Sullivan, Cristina M. Alfonso, and Jason P. Sullivan. Cargo containers and supply chain security. New York: Nova Science Publishers, 2011.
Знайти повний текст джерелаNicholson, Anna, Evan Randall, Lisa Brown, Carolyn Shore, and Benjamin Kahn, eds. The Security of America's Medical Product Supply Chain. Washington, D.C.: National Academies Press, 2021. http://dx.doi.org/10.17226/26137.
Повний текст джерелаKieras, Timothy, Junaid Farooq, and Quanyan Zhu. IoT Supply Chain Security Risk Analysis and Mitigation. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-08480-5.
Повний текст джерелаBurges, Dan. Cargo theft, loss prevention, and supply chain security. Waltham, MA: Butterworth-Heinemann, 2012.
Знайти повний текст джерелаEnterprise software delivery: Bringing agility and efficiency to the global software supply chain. Upper Saddle River, NJ: Addison-Wesley, 2013.
Знайти повний текст джерелаKoepsel, Kirsten M., ed. The Aerospace Supply Chain and Cyber Security - Challenges Ahead. Warrendale, PA: SAE International, 2018. http://dx.doi.org/10.4271/t-133.
Повний текст джерелаEssig, Michael. Supply Chain Safety Management: Security and Robustness in Logistics. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013.
Знайти повний текст джерелаWillis, Henry H. Evaluating the security of the global containerized supply chain. Santa Monica, CA: RAND Corporation, 2004.
Знайти повний текст джерелаЧастини книг з теми "Software Supply Chain Security"
Yang, Jeong, Young Lee, and Arlen P. McDonald. "SolarWinds Software Supply Chain Security: Better Protection with Enforced Policies and Technologies." In Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, 43–58. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-92317-4_4.
Повний текст джерелаBarabanov, Alexander, Alexey Markov, and Valentin Tsirlov. "On Systematics of the Information Security of Software Supply Chains." In Software Engineering Perspectives in Intelligent Systems, 115–29. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-63322-6_9.
Повний текст джерелаZomer, Gerwin. "Supply Chain Security." In Operations, Logistics and Supply Chain Management, 575–92. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-92447-2_25.
Повний текст джерелаCollier, Zachary A., and Shital A. Thekdi. "Supply Chain Security." In The Palgrave Handbook of Supply Chain Management, 1–24. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-89822-9_30-1.
Повний текст джерелаSeaman, Jim. "Securing Your Supply Chain." In Protective Security, 439–85. Berkeley, CA: Apress, 2021. http://dx.doi.org/10.1007/978-1-4842-6908-4_11.
Повний текст джерелаSzymonik, Andrzej, and Robert Stanisławski. "Conclusions." In Supply Chain Security, 271–74. New York: Productivity Press, 2022. http://dx.doi.org/10.4324/9781003286110-10.
Повний текст джерелаSzymonik, Andrzej, and Robert Stanisławski. "Safety Determinants for the Needs of the Delivery Chain." In Supply Chain Security, 1–24. New York: Productivity Press, 2022. http://dx.doi.org/10.4324/9781003286110-2.
Повний текст джерелаSzymonik, Andrzej, and Robert Stanisławski. "Reverse Logistics in Supply Chains:." In Supply Chain Security, 193–206. New York: Productivity Press, 2022. http://dx.doi.org/10.4324/9781003286110-7.
Повний текст джерелаSzymonik, Andrzej, and Robert Stanisławski. "Technologies Supporting Supply Chain Safety Management." In Supply Chain Security, 159–92. New York: Productivity Press, 2022. http://dx.doi.org/10.4324/9781003286110-6.
Повний текст джерелаSzymonik, Andrzej, and Robert Stanisławski. "Contemporary Conditions of Supply Chains." In Supply Chain Security, 25–66. New York: Productivity Press, 2022. http://dx.doi.org/10.4324/9781003286110-3.
Повний текст джерелаТези доповідей конференцій з теми "Software Supply Chain Security"
Ellison, Robert J., and Carol Woody. "Supply-Chain Risk Management: Incorporating Security into Software Development." In 2010 43rd Hawaii International Conference on System Sciences. IEEE, 2010. http://dx.doi.org/10.1109/hicss.2010.355.
Повний текст джерелаNakano, Yuto, Toru Nakamura, Yasuaki Kobayashi, Takashi Ozu, Masahito Ishizaka, Masayuki Hashimoto, Hiroyuki Yokoyama, Yutaka Miyake, and Shinsaku Kiyomoto. "Automatic Security Inspection Framework for Trustworthy Supply Chain." In 2021 IEEE/ACIS 19th International Conference on Software Engineering Research, Management and Applications (SERA). IEEE, 2021. http://dx.doi.org/10.1109/sera51205.2021.9509040.
Повний текст джерелаAxelrod, C. Warren. "Assuring software and hardware security and integrity throughout the supply chain." In 2011 IEEE International Conference on Technologies for Homeland Security (HST). IEEE, 2011. http://dx.doi.org/10.1109/ths.2011.6107848.
Повний текст джерелаOhm, Marc, Arnold Sykosch, and Michael Meier. "Towards detection of software supply chain attacks by forensic artifacts." In ARES 2020: The 15th International Conference on Availability, Reliability and Security. New York, NY, USA: ACM, 2020. http://dx.doi.org/10.1145/3407023.3409183.
Повний текст джерелаHejderup, Joseph. "On the Use of Tests for Software Supply Chain Threats." In CCS '22: 2022 ACM SIGSAC Conference on Computer and Communications Security. New York, NY, USA: ACM, 2022. http://dx.doi.org/10.1145/3560835.3564557.
Повний текст джерелаMartin, Robert Alan. "Visibility & Control: Addressing Supply Chain Challenges to Trustworthy Software-Enabled Things." In 2020 IEEE Systems Security Symposium (SSS). IEEE, 2020. http://dx.doi.org/10.1109/sss47320.2020.9174365.
Повний текст джерелаVu, Duc Ly, Ivan Pashchenko, Fabio Massacci, Henrik Plate, and Antonino Sabetta. "Towards Using Source Code Repositories to Identify Software Supply Chain Attacks." In CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security. New York, NY, USA: ACM, 2020. http://dx.doi.org/10.1145/3372297.3420015.
Повний текст джерелаOkafor, Chinenye, Taylor R. Schorlemmer, Santiago Torres-Arias, and James C. Davis. "SoK: Analysis of Software Supply Chain Security by Establishing Secure Design Properties." In CCS '22: 2022 ACM SIGSAC Conference on Computer and Communications Security. New York, NY, USA: ACM, 2022. http://dx.doi.org/10.1145/3560835.3564556.
Повний текст джерелаMartin, Robert Alan. "Assurance for CyberPhysical Systems: Addressing Supply Chain Challenges to Trustworthy Software-Enabled Things." In 2020 IEEE Systems Security Symposium (SSS). IEEE, 2020. http://dx.doi.org/10.1109/sss47320.2020.9174201.
Повний текст джерелаKeller, Joseph, Shuva Paul, Santiago Grijalva, and Vincent J. Mooney. "Experimental Setup for Grid Control Device Software Updates in Supply Chain Cyber-Security." In 2022 North American Power Symposium (NAPS). IEEE, 2022. http://dx.doi.org/10.1109/naps56150.2022.10012179.
Повний текст джерелаЗвіти організацій з теми "Software Supply Chain Security"
Chandramouli, Ramaswamy. Securing the Artifacts in Software Supply Chain for Building Cloud-Native Microservices Applications. Gaithersburg, MD: National Institute of Standards and Technology, 2023. http://dx.doi.org/10.6028/nist.sp.800-204d.ipd.
Повний текст джерелаVisker, Edward R. Improving the DoD Supply Chain Can Commercial Supply Chain Management Software Do the Job"". Fort Belvoir, VA: Defense Technical Information Center, April 2000. http://dx.doi.org/10.21236/ada378230.
Повний текст джерелаHund, Gretchen. Walk the Talk: Progress in Building a Supply Chain Security Culture. Office of Scientific and Technical Information (OSTI), August 2016. http://dx.doi.org/10.2172/1329456.
Повний текст джерелаEdwards, Frances, Joseph Szyliowicz, Dan Goodrich, William Medigovich, Liz Lange, and Autumn Anderton. Surface Transportation Supply Chain Security: Creating a Blueprint for Future Research. Mineta Transportation Institute, April 2021. http://dx.doi.org/10.31979/mti.2021.1937.
Повний текст джерелаHund, Gretchen. Walk the Talk: How PNNL is developing a Supply Chain Security Culture. Office of Scientific and Technical Information (OSTI), September 2015. http://dx.doi.org/10.2172/1334055.
Повний текст джерелаKhan, Saif M., Alexander Mann, and Dahlia Peterson. The Semiconductor Supply Chain: Assessing National Competitiveness. Center for Security and Emerging Technology, January 2021. http://dx.doi.org/10.51593/20190016.
Повний текст джерелаLindquist, Joachim, and Henning de Haas. Creating Supply Chain Resilience Through Scenario Planning: How a Digital Twin Can Be Used To Enhance Supply Chain Resilience Through Scenario Planning. Aarhus University Library, 2021. http://dx.doi.org/10.7146/aul.435.
Повний текст джерелаBoyens, Jon M. Cybersecurity Supply Chain Risk Management for Systems and Organizations. Gaithersburg, MD: National Institute of Standards and Technology, 2022. http://dx.doi.org/10.6028/nist.sp.800-161r1.
Повний текст джерелаRowland, Michael, and Benjamin Karch. Security Evaluation of Smart Cards and Secure Tokens: Benefits and Drawbacks for Reducing Supply Chain Risks of Nuclear Power Plants. Office of Scientific and Technical Information (OSTI), August 2022. http://dx.doi.org/10.2172/1884928.
Повний текст джерелаHicks, Julie, Laurin Yates, and Jackie Pettway. Mat Sinking Unit supply study : Mississippi River revetment. Engineer Research and Development Center (U.S.), September 2021. http://dx.doi.org/10.21079/11681/41867.
Повний текст джерела