{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,20]],"date-time":"2025-10-20T10:29:09Z","timestamp":1760956149165,"version":"3.40.3"},"publisher-location":"Cham","reference-count":16,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030996185"},{"type":"electronic","value":"9783030996192"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-030-99619-2_31","type":"book-chapter","created":{"date-parts":[[2022,3,30]],"date-time":"2022-03-30T05:19:48Z","timestamp":1648617588000},"page":"324-333","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Two-Tier Trust Structure Model for Dynamic Supply Chain Formulation"],"prefix":"10.1007","author":[{"given":"Shigeaki","family":"Tanimoto","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Yudai","family":"Watanabe","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Hiroyuki","family":"Sato","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Atsushi","family":"Kanai","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2022,3,31]]},"reference":[{"key":"31_CR1","unstructured":"IPA: 10 Major Threats to Information Security 2021 (2021). (in Japanese), https:\/\/www.ipa.go.jp\/security\/vuln\/10threats2021.html"},{"key":"31_CR2","unstructured":"Kubo, T., et al.: Study of information security in the supply chain. IPSJ, DPS 161(3), 1\u20138 (2014). (in Japanese)"},{"key":"31_CR3","unstructured":"IPA: Information Security White Paper 2019 (2019). https:\/\/www.ipa.go.jp\/security\/publications\/hakusyo\/2019.html"},{"issue":"756","key":"31_CR4","doi-asserted-by":"publisher","first-page":"2351","DOI":"10.1299\/kikaic.75.2351","volume":"75","author":"Y Tanimizu","year":"2009","unstructured":"Tanimizu, Y., et al.: A study on development of adaptive strategies in dynamic supply chains (proposal of a framework and two-layered models). Trans. JSME 75(756), 2351\u20132358 (2009). (in Japanese)","journal-title":"Trans. JSME"},{"key":"31_CR5","unstructured":"METI: The 2021 edition of the White Paper on Trade and Commerce, p. 91 (2021). (in Japanese), https:\/\/www.meti.go.jp\/report\/tsuhaku2021\/pdf\/02-01-02.pdf"},{"key":"31_CR6","unstructured":"Sato, K., et al.: Study of dynamic supply chain model for improvement of efficiency in inter-business trading. In: Proceedings of the School of Information and Telecommunication Engineering, Tokai University, Vol. 10, No. 1, pp. 36\u201344 (2017). (in Japanese), https:\/\/www.ipa.go.jp\/security\/publications\/hakusyo\/2019.html"},{"key":"31_CR7","unstructured":"IPA: Research Report on Security Incidents and Management in Outsourced IT Supply Chain Operations (2018). https:\/\/www.ipa.go.jp\/security\/fy29\/reports\/scrm\/index.html"},{"issue":"4","key":"31_CR8","doi-asserted-by":"publisher","first-page":"550","DOI":"10.1287\/mnsc.1030.0173","volume":"50","author":"CJ Corbett","year":"2004","unstructured":"Corbett, C.J., et al.: Designing supply contracts: contract type and information asymmetry. Manag. Sci. 50(4), 550\u2013559 (2004)","journal-title":"Manag. Sci."},{"key":"31_CR9","doi-asserted-by":"crossref","unstructured":"Manuj, I., et al.: Global supply chain risk management. J. Bossiness Logist. 29(1), 133\u2013155 (2008)","DOI":"10.1002\/j.2158-1592.2008.tb00072.x"},{"key":"31_CR10","doi-asserted-by":"crossref","unstructured":"Zhang, H., et al.: Security and trust issues on digital supply chain. In: CyberSciTech 2019 (2019)","DOI":"10.1109\/DASC\/PiCom\/CBDCom\/CyberSciTech.2019.00069"},{"issue":"2","key":"31_CR11","doi-asserted-by":"publisher","first-page":"254","DOI":"10.1108\/09574090810895988","volume":"19","author":"Z Williams","year":"2008","unstructured":"Williams, Z., et al.: Supply chain security: an overview and research agenda. Int. J. Logist. Manag. 19(2), 254\u2013281 (2008)","journal-title":"Int. J. Logist. Manag."},{"issue":"4","key":"31_CR12","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1080\/13675560310001627016","volume":"6","author":"U Juttner","year":"2003","unstructured":"Juttner, U., et al.: Supply chain risk management: outlining an agenda for future research. Int. J. Logist. Res. Appl. 6(4), 197\u2013210 (2003)","journal-title":"Int. J. Logist. Res. Appl."},{"issue":"4","key":"31_CR13","doi-asserted-by":"publisher","first-page":"427","DOI":"10.1108\/SCM-02-2019-0074","volume":"25","author":"H Aslam","year":"2020","unstructured":"Aslam, H., et al.: Determining the antecedents of dynamic supply chain capabilities. Supply Chain Manag. Int. J. 25(4), 427\u2013442 (2020)","journal-title":"Supply Chain Manag. Int. J."},{"issue":"7","key":"31_CR14","doi-asserted-by":"publisher","first-page":"1046","DOI":"10.1016\/j.engappai.2008.09.001","volume":"22","author":"M Wang","year":"2009","unstructured":"Wang, M., et al.: Agent-based negotiation and decision making for dynamic supply chain formation. Eng. Appl. Artif. Intell. 22(7), 1046\u20131055 (2009)","journal-title":"Eng. Appl. Artif. Intell."},{"key":"31_CR15","doi-asserted-by":"crossref","unstructured":"Palmo, Y., et al.: IoT reliability improvement method for secure supply chain management. In: GCCE2021, pp. 390\u2013391 (2021)","DOI":"10.1109\/GCCE53005.2021.9622088"},{"key":"31_CR16","unstructured":"CSA: Software Defined Perimeter Working Group, SDP Specification 1.0 (2014). https:\/\/cloudsecurityalliance.org\/artifacts\/sdp-specification-v1-0\/"}],"container-title":["Lecture Notes in Networks and Systems","Advanced Information Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-99619-2_31","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,3,30]],"date-time":"2022-03-30T06:12:21Z","timestamp":1648620741000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-99619-2_31"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783030996185","9783030996192"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-99619-2_31","relation":{},"ISSN":["2367-3370","2367-3389"],"issn-type":[{"type":"print","value":"2367-3370"},{"type":"electronic","value":"2367-3389"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"31 March 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"AINA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Advanced Information Networking and Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Sydney, NSW","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Australia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 April 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 April 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"aina2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/voyager.ce.fit.ac.jp\/conf\/aina\/2022\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}