{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T07:53:32Z","timestamp":1726041212883},"publisher-location":"Cham","reference-count":31,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030271916"},{"type":"electronic","value":"9783030271923"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-27192-3_12","type":"book-chapter","created":{"date-parts":[[2019,8,18]],"date-time":"2019-08-18T23:03:04Z","timestamp":1566169384000},"page":"148-159","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["A Framework for Secure and Trustworthy Data Management in Supply Chain"],"prefix":"10.1007","author":[{"given":"Shinsaku","family":"Kiyomoto","sequence":"first","affiliation":[]},{"given":"Yuto","family":"Nakano","sequence":"additional","affiliation":[]},{"given":"Atsushi","family":"Waseda","sequence":"additional","affiliation":[]},{"given":"Toru","family":"Nakamura","sequence":"additional","affiliation":[]},{"given":"Masahito","family":"Ishizaka","sequence":"additional","affiliation":[]},{"given":"Yasuaki","family":"Kobayashi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,7,26]]},"reference":[{"issue":"09","key":"12_CR1","doi-asserted-by":"publisher","first-page":"1","DOI":"10.15623\/ijret.2016.0509001","volume":"05","author":"SA Abeyratne","year":"2016","unstructured":"Abeyratne, S.A., Monfared, R.P.: Blockchain ready manufacturing supply chain using distributed ledger. Int. J. Res. Eng. Technol. 05(09), 1\u201310 (2016)","journal-title":"Int. J. Res. Eng. Technol."},{"issue":"1","key":"12_CR2","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1108\/SCM-06-2016-0197","volume":"22","author":"A Ali","year":"2017","unstructured":"Ali, A., Mahfouz, A., Arisha, A.: Analysing supply chain resilience: integrating the constructs in a concept mapping framework via a systematic literature review. Suppl. Chain Manag.: Int. J. 22(1), 16\u201339 (2017)","journal-title":"Suppl. Chain Manag.: Int. J."},{"key":"12_CR3","doi-asserted-by":"publisher","unstructured":"Atallah, M.J., Elmongui, H.G., Deshpande, V., Schwarz, L.B.: Secure supply-chain protocols. In: EEE International Conference on E-Commerce, 2003, CEC 2003, pp. 293\u2013302, June 2003. \nhttps:\/\/doi.org\/10.1109\/COEC.2003.1210264","DOI":"10.1109\/COEC.2003.1210264"},{"key":"12_CR4","doi-asserted-by":"crossref","unstructured":"Barron, S., Cho, Y.M., Hua, A., Norcross, W., Voigt, J., Haimes, Y.: Systems-based cyber security in the supply chain. In: 2016 IEEE Systems and Information Engineering Design Symposium (SIEDS), pp. 20\u201325, April 2016","DOI":"10.1109\/SIEDS.2016.7489299"},{"key":"12_CR5","doi-asserted-by":"crossref","unstructured":"Bhargava, B., Ranchal, R., Ben Othmane, L.: Secure information sharing in digital supply chains. In: 2013 3rd IEEE International Advance Computing Conference (IACC), pp. 1636\u20131640, February 2013","DOI":"10.1109\/IAdCC.2013.6514473"},{"issue":"1","key":"12_CR6","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.ijpe.2010.01.020","volume":"126","author":"A Boin","year":"2010","unstructured":"Boin, A., Kelle, P., Clay Whybark, D.: Resilient supply chains for extreme situations: outlining a new field of study. Int. J. Prod. Econ. 126(1), 1\u20136 (2010)","journal-title":"Int. J. Prod. Econ."},{"issue":"3","key":"12_CR7","doi-asserted-by":"publisher","first-page":"303","DOI":"10.1108\/01443570710725563","volume":"27","author":"C Brindley","year":"2007","unstructured":"Brindley, C., Ritchie, B.: Supply chain risk management and performance: a guiding framework for future development. Int. J. Oper. Prod. Manag. 27(3), 303\u2013322 (2007)","journal-title":"Int. J. Oper. Prod. Manag."},{"issue":"1","key":"12_CR8","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1016\/S0019-8501(99)00110-8","volume":"29","author":"M Christopher","year":"2000","unstructured":"Christopher, M.: The agile supply chain: competing in volatile markets. Ind. Mark. Manage. 29(1), 37\u201344 (2000)","journal-title":"Ind. Mark. Manage."},{"issue":"2","key":"12_CR9","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1108\/09574090410700275","volume":"15","author":"M Christopher","year":"2004","unstructured":"Christopher, M., Peck, H.: Building the resilient supply chain. Int. J. Logistics Manag. 15(2), 1\u201314 (2004)","journal-title":"Int. J. Logistics Manag."},{"issue":"4","key":"12_CR10","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1108\/09600030110394914","volume":"31","author":"M Christopher","year":"2001","unstructured":"Christopher, M., Towill, D.: An integrated model for the design of agile supply chains. Int. J. Phys. Distrib. Logistics Manag. 31(4), 235\u2013246 (2001)","journal-title":"Int. J. Phys. Distrib. Logistics Manag."},{"key":"12_CR11","unstructured":"Cosic, J., Baca, M.: Do we have full control over integrity in digital evidence life cycle? In: Proceedings of the ITI 2010, 32nd International Conference on Information Technology Interfaces, pp. 429\u2013434, June 2010"},{"key":"12_CR12","doi-asserted-by":"crossref","unstructured":"Ellison, R.J., Woody, C.: Supply-chain risk management: incorporating security into software development. In: 2010 43rd Hawaii International Conference on System Sciences, pp. 1\u201310, January 2010","DOI":"10.1109\/HICSS.2010.355"},{"key":"12_CR13","unstructured":"Goranson, H.T., Goranson, T.: The Agile Virtual Enterprise: Cases, Metrics, Tools. Greenwood Publishing Group (1999)"},{"issue":"2","key":"12_CR14","doi-asserted-by":"publisher","first-page":"409","DOI":"10.1016\/j.ejor.2009.01.002","volume":"200","author":"D Ivanov","year":"2010","unstructured":"Ivanov, D., Sokolov, B., Kaeschel, J.: A multi-structural framework for adaptive supply chain planning and operations control with structure dynamics considerations. Eur. J. Oper. Res. 200(2), 409\u2013420 (2010)","journal-title":"Eur. J. Oper. Res."},{"key":"12_CR15","doi-asserted-by":"crossref","unstructured":"Kiyomoto, S., Rahman, M.S., Basu, A.: On blockchain-based anonymized dataset distribution platform. In: 2017 IEEE 15th International Conference on Software Engineering Research, Management and Applications (SERA), pp. 85\u201392, June 2017","DOI":"10.1109\/SERA.2017.7965711"},{"key":"12_CR16","doi-asserted-by":"crossref","unstructured":"Kuntze, N., Rudolph, C.: Secure digital chains of evidence. In: 2011 Sixth IEEE International Workshop on Systematic Approaches to Digital Forensic Engineering, pp. 1\u20138, May 2011","DOI":"10.1109\/SADFE.2011.16"},{"key":"12_CR17","series-title":"EcoProduction","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1007\/978-3-319-91668-2_5","volume-title":"SMART Supply Network","author":"D Leo\u0144czuk","year":"2019","unstructured":"Leo\u0144czuk, D., Ryciuk, U., Szymczak, M., Nazarko, J.: Measuring performance of adaptive supply chains. In: Kawa, A., Maryniak, A. (eds.) SMART Supply Network. E, pp. 89\u2013110. Springer, Cham (2019). \nhttps:\/\/doi.org\/10.1007\/978-3-319-91668-2_5"},{"key":"12_CR18","doi-asserted-by":"crossref","unstructured":"Lu, T., Guo, X., Xu, B., Zhao, L., Peng, Y., Yang, H.: Next big thing in big data: the security of the ICT supply chain. In: 2013 International Conference on Social Computing, pp. 1066\u20131073, September 2013","DOI":"10.1109\/SocialCom.2013.172"},{"key":"12_CR19","doi-asserted-by":"crossref","unstructured":"Meixell, M.J., Norbis, M.: Assessing security risk in global supply chains. In: First International Technology Management Conference, pp. 510\u2013515, June 2011","DOI":"10.1109\/ITMC.2011.5996020"},{"key":"12_CR20","unstructured":"Meneghetti, A., Quintavalle, A.O., Sala, M., Tomasi, A.: Two-tier blockchain timestamped notarization with incremental security. CoRR abs\/1902.03136 (2019). \nhttp:\/\/arxiv.org\/abs\/1902.03136"},{"issue":"1","key":"12_CR21","doi-asserted-by":"publisher","first-page":"124","DOI":"10.1108\/09574090910954873","volume":"20","author":"SY Ponomarov","year":"2009","unstructured":"Ponomarov, S.Y., Holcomb, M.C.: Understanding the concept of supply chain resilience. Int. J. Logistics Manag. 20(1), 124\u2013143 (2009)","journal-title":"Int. J. Logistics Manag."},{"key":"12_CR22","doi-asserted-by":"crossref","unstructured":"Richter, J., Kuntze, N., Rudolph, C.: Security digital evidence. In: 2010 Fifth IEEE International Workshop on Systematic Approaches to Digital Forensic Engineering, pp. 119\u2013130, May 2010","DOI":"10.1109\/SADFE.2010.31"},{"key":"12_CR23","unstructured":"Ross, R., Dempsey, K., Viscuso, P., Riddle, M., Guissanie, G.: Protecting controlled unclassified information in nonfederal systems and organizations. NIST Special Publication 800\u2013171 Revision 1 (2018)"},{"key":"12_CR24","doi-asserted-by":"crossref","unstructured":"Roy, A., Gupta, A.D., Deshmukh, S.G.: Information security in supply chains - a process framework. In: 2012 IEEE International Conference on Industrial Engineering and Engineering Management, pp. 1448\u20131452, December 2012","DOI":"10.1109\/IEEM.2012.6837986"},{"key":"12_CR25","doi-asserted-by":"crossref","unstructured":"Shidong, Z., Liu, J., Sheng, Y., Xiaorui, Z.: Research and implementation of digital evidence enforcement protection program. In: 2013 6th International Conference on Intelligent Networks and Intelligent Systems (ICINIS), pp. 33\u201335, November 2013","DOI":"10.1109\/ICINIS.2013.15"},{"key":"12_CR26","doi-asserted-by":"crossref","unstructured":"Soltani, S., Seno, S.A.H.: A survey on digital evidence collection and analysis. In: 2017 7th International Conference on Computer and Knowledge Engineering (ICCKE), pp. 247\u2013253, October 2017","DOI":"10.1109\/ICCKE.2017.8167885"},{"issue":"2","key":"12_CR27","doi-asserted-by":"publisher","first-page":"451","DOI":"10.1016\/j.ijpe.2005.12.006","volume":"103","author":"CS Tang","year":"2006","unstructured":"Tang, C.S.: Perspectives in supply chain risk management. Int. J. Prod. Econ. 103(2), 451\u2013488 (2006)","journal-title":"Int. J. Prod. Econ."},{"key":"12_CR28","unstructured":"Tian, F.: A supply chain traceability system for food safety based on HACCP, blockchain & Internet of Things. In: 2017 International Conference on Service Systems and Service Management, pp. 1\u20136, June 2017"},{"issue":"2","key":"12_CR29","doi-asserted-by":"publisher","first-page":"410","DOI":"10.1109\/JSYST.2014.2363161","volume":"10","author":"J Wang","year":"2016","unstructured":"Wang, J., et al.: Toward a resilient holistic supply chain network system: concept, review and future direction. IEEE Syst. J. 10(2), 410\u2013421 (2016)","journal-title":"IEEE Syst. J."},{"issue":"2","key":"12_CR30","doi-asserted-by":"publisher","first-page":"379","DOI":"10.1016\/j.ejor.2003.08.022","volume":"159","author":"YY Yusuf","year":"2004","unstructured":"Yusuf, Y.Y., Gunasekaran, A., Adeleye, E., Sivayoganathan, K.: Agile supply chain capabilities: determinants of competitive objectives. Eur. J. Oper. Res. 159(2), 379\u2013392 (2004)","journal-title":"Eur. J. Oper. Res."},{"key":"12_CR31","doi-asserted-by":"publisher","unstructured":"Zage, D., Glass, K., Colbaugh, R.: Improving supply chain security using big data. In: 2013 IEEE International Conference on Intelligence and Security Informatics, pp. 254\u2013259, June 2013. \nhttps:\/\/doi.org\/10.1109\/ISI.2013.6578830","DOI":"10.1109\/ISI.2013.6578830"}],"container-title":["Lecture Notes in Computer Science","Mobile Web and Intelligent Information Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-27192-3_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,18]],"date-time":"2019-08-18T23:13:25Z","timestamp":1566170005000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-27192-3_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030271916","9783030271923"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-27192-3_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"26 July 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"MobiWIS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Mobile Web and Intelligent Information Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Istanbul","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Turkey","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 August 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 August 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"mobiwis2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.mobiwis.org\/2019\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}