{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,24]],"date-time":"2026-03-24T07:57:38Z","timestamp":1774339058787,"version":"3.50.1"},"reference-count":53,"publisher":"Informa UK Limited","issue":"4","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Journal of Computer Information Systems"],"published-print":{"date-parts":[[2006,6]]},"DOI":"10.1080\/08874417.2006.11645910","type":"journal-article","created":{"date-parts":[[2026,3,6]],"date-time":"2026-03-06T01:02:53Z","timestamp":1772758973000},"page":"18-24","source":"Crossref","is-referenced-by-count":2,"title":["Secure Information Sharing in Internet-Based Supply Chain Management Systems"],"prefix":"10.1080","volume":"46","author":[{"given":"Chen","family":"Zhang","sequence":"first","affiliation":[{"name":"Bryant University Smithfield, Rhode Island 02917-1238"}]},{"given":"Suhong","family":"Li","sequence":"additional","affiliation":[{"name":"Bryant University Smithfield, Rhode Island 02917-1238"}]}],"member":"301","published-online":{"date-parts":[[2016,1,5]]},"reference":[{"key":"e_1_2_1_2_1","volume-title":"\u201cHigh Performance Enabled Through Radio Frequency Identification-Accenture Research on Maufacturer Perspectives,\u201d","author":"Accenture Report","year":"2004","unstructured":"Accenture Report. \u201cHigh Performance Enabled Through Radio Frequency Identification-Accenture Research on Maufacturer Perspectives,\u201d April 2004. http:\/\/www.accenture.com\/xdoc\/en\/services\/rfid\/insights\/rfid_ionsights_epc.pdf, accessed August 16, 2004."},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1383-7621(00)00017-5"},{"key":"e_1_2_1_4_1","volume-title":"\u201cThe CERTreg; Guide to System and Network Security Practices,\u201d","author":"Allen J.H.","year":"2004","unstructured":"Allen, J.H. \u201cThe CERTreg; Guide to System and Network Security Practices,\u201d 2001. http:\/\/www.cert.org\/security-improvement, accessed August 2004."},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1080\/08874417.2002.11647498"},{"key":"e_1_2_1_6_1","first-page":"10","volume-title":"Performance Advantage","author":"APICS","year":"2003","unstructured":"APICS. \u201cWho's Driving the RFID Market?\u201d Performance Advantage, October 2003, p. 10."},{"key":"e_1_2_1_7_1","volume-title":"Proceedings of the IEEE International Conference on E-commerce","author":"Atallah M.J.","year":"2003","unstructured":"Atallah, M.J., H.G. Elmongui, V. Deshpande, and L.B. Schwartz. \u201cSecure Supply-Chain Protocols,\u201d Proceedings of the IEEE International Conference on E-commerce, June 24\u201327, 2003, Newport Beach, California, USA."},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.47.10.1326.10260"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.46.8.1032.12029"},{"key":"e_1_2_1_10_1","volume-title":"CNet Asia","author":"Chai W.","year":"2003","unstructured":"Chai, W. \u201cEuro Notes May be Radio Tagged,\u201d CNet Asia, May 22, 2003. http:\/\/news.zdnet.co.uk\/business\/0,39020645,2135074,00.htm, accessed August 2004."},{"key":"e_1_2_1_11_1","volume-title":"23rd National Information Systems Security Conference","author":"Chandramouli R.","year":"2000","unstructured":"Chandramouli, R. \u201cBusiness Process Driven Framework for Defining an Access Control Service based on Roles and Rules,\u201d 23rd National Information Systems Security Conference, October 16\u201319, 2000, Baltimore, Maryland."},{"key":"e_1_2_1_12_1","volume-title":"21\u201d National Information Systems Security Conference","author":"Chandramouli R.","year":"1998","unstructured":"Chandramouli, R. and R. Sandhu. \u201cRole Based Access Control Features in Commercial Database Management Systems,\u201d 21\u201d National Information Systems Security Conference, October 6\u20139, 1998, Crystal City, Virginia."},{"key":"e_1_2_1_13_1","volume-title":"5th\n                      ACM Workshop on Role-based Access Control","author":"Chandramouli R.","year":"2000","unstructured":"Chandramouli, R. \u201cApplication of XML Tools for Enterprise-wide RBAC Implementation Tasks,\u201d 5th ACM Workshop on Role-based Access Control, July 26\u201327, 2000, Berlin, Germany."},{"issue":"1","key":"e_1_2_1_14_1","first-page":"17","article-title":"\u201cSimplified Material Flow Holds the Key to Supply Chain Integration,\u201d","volume":"31","author":"Childhouse P.","year":"2003","unstructured":"Childhouse, P. and D.R. Towill. \u201cSimplified Material Flow Holds the Key to Supply Chain Integration,\u201d International Journal of Management Science, 31:1, 2003, pp. 17\u201327.","journal-title":"International Journal of Management Science"},{"key":"e_1_2_1_15_1","volume-title":"ACM SIGMOD Workshop on Data Mining and Knowledge Discovery","author":"Clifton C.","year":"2004","unstructured":"Clifton, C. and D. Marks. \u201cSecurity and Privacy Implications of Data Mining,\u201d ACM SIGMOD Workshop on Data Mining and Knowledge Discovery, Montreal, Canada, http:\/\/www.cs.purdue.edu\/homes\/clifton\/document\/dmkd.pdf., accessed August 2004."},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1006\/jcss.2001.1807"},{"key":"e_1_2_1_17_1","volume-title":"Washington Technology","author":"Emery G.R.","year":"2004","unstructured":"Emery, G.R. \u201cIT Execs Prepare for an RFID Revolution,\u201d Washington Technology, June 29, 2004. http:\/\/www.washingtontechnology.com\/news\/1_1\/industry\/23875-1.html, accessed August 2004."},{"key":"e_1_2_1_18_1","volume-title":"\u201cRisk in the Supply Chain-New E&Y Report,\u201d","author":"Ensom J.","year":"2004","unstructured":"Ensom, J. \u201cRisk in the Supply Chain-New E&Y Report,\u201d 2004. http:\/\/www.globalcontinuity.com\/article\/articleview\/10188\/1\/30\/, accessed August 2004."},{"key":"e_1_2_1_19_1","first-page":"241","volume-title":"11th IEEE Annual Computer Security Applications Conference","author":"Ferraiolo D.","year":"1995","unstructured":"Ferraiolo, D., J. Cugini, and D.R. Kuhn. \u201cRole Based Access Control: Features and Motivations,\u201d 11th IEEE Annual Computer Security Applications Conference, New Orleans, Louisiana, 1995, pp. 241\u2013248."},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1080\/08874417.2002.11646992"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/3516.974850"},{"issue":"11","key":"e_1_2_1_22_1","first-page":"58","article-title":"\u201cSupply Chain Economics,\u201d","volume":"11","author":"Jarrell J.L.","year":"1998","unstructured":"Jarrell, J.L. \u201cSupply Chain Economics,\u201d World Trade, 11:11, 1998, pp. 58\u201361.","journal-title":"World Trade"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1108\/09590550410524957"},{"key":"e_1_2_1_24_1","volume-title":"\u201cMinimalist Cryptography for Low-Cost RFID Tags","author":"Juels A.","unstructured":"Juels, A. \u201cRSA Laboratories,\u201d In submission, \u201cMinimalist Cryptography for Low-Cost RFID Tags, http:\/\/www.rsasecurity.com\/rsalabs\/staff\/bios\/ajuels\/publications\/minimalist\/Minimalist.pdf, retrieved August 2004."},{"key":"e_1_2_1_25_1","first-page":"103","volume-title":"10th ACM Conference on Computer and Communications Security","author":"Juels A.","year":"2003","unstructured":"Juels, A., R. Rivest, and M. Szydlo. \u201cThe Blocker Tag: Selective Blocking of RFID Tags for Consumer Privacy,\u201d 10th ACM Conference on Computer and Communications Security, October 27\u201331, 2003, Washington, DC, 2003, pp. 103\u2013111."},{"key":"e_1_2_1_26_1","first-page":"21","volume-title":"Frontline Solutions","author":"Kay E.","year":"2003","unstructured":"Kay, E. \u201cWhat's the Next Step for RFID?\u201d Frontline Solutions, March 2003, pp. 21\u201325."},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1080\/08874417.2005.11645829"},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.2307\/41166135"},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1080\/07421222.1999.11518221"},{"key":"e_1_2_1_30_1","volume-title":"\u201cInformation Sharing in a Supply Chain,\u201d","author":"Lee H.L.","year":"1998","unstructured":"Lee, H.L. and S. Whang. \u201cInformation Sharing in a Supply Chain,\u201d Research Paper No. 1549, Graduate School of Business, Stanford University, 1998."},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1080\/08874417.2002.11647612"},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/TEM.2002.803388"},{"key":"e_1_2_1_33_1","volume-title":"Fundamentals of Network Security, Part III: Security Technologies","author":"Maiwald E.","year":"2004","unstructured":"Maiwald, E. Fundamentals of Network Security, Part III: Security Technologies. Burr Ridge, IL: McGraw-Hill, 2004."},{"key":"e_1_2_1_34_1","volume-title":"\u201cDCOM Security Enhancements,\u201d","author":"Microsoft","year":"2004","unstructured":"Microsoft. \u201cDCOM Security Enhancements,\u201d 2004. http:\/\/msdn.microsoft.com\/security\/productinfo\/xpsp2\/networkprotection\/dcom.aspx, accessed August 2004."},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1108\/09600030210452431"},{"key":"e_1_2_1_36_1","volume-title":"ACM Conference on Computer and Communications Security","author":"Molnar D.","year":"2004","unstructured":"Molnar, D. and D. Wagner. \u201cPrivacy and Security in Library RFID: Issues, Practices, and Architectures,\u201d ACM Conference on Computer and Communications Security, October 25\u201329, 2004, Washington, DC, 004. http:\/\/www.cs.berkeley.edu\/\u223cdmolnar\/library.pdf, accessed August 2004."},{"key":"e_1_2_1_37_1","volume-title":"7th IEEE International Workshop on Object-oriented Real-Time Dependable Systems","author":"Obelheiro R.R.","year":"2002","unstructured":"Obelheiro, R.R. and J.S. Fraga. \u201cRole-based Access Control for CORBA Distributed Object Systems,\u201d 7th IEEE International Workshop on Object-oriented Real-Time Dependable Systems, San Diego, California, 2002."},{"key":"e_1_2_1_38_1","volume-title":"Object Management Group formal document: Formal\/98-12-17","author":"OMG","year":"1998","unstructured":"OMG. \u201cCORBA Services Security Service v1.2 Specification.\u201d Object Management Group formal document: Formal\/98-12-17, 1998. http:\/\/www.omg.org\/cgi-bin\/doc?formal\/98-12-17, accessed August 2004."},{"key":"e_1_2_1_39_1","volume-title":"\u201cRole-based Access Control on the Web using LDAP,\u201d 15th Annual Working Conference on Database and Application Security,\u201d","author":"Park J.S.","year":"2001","unstructured":"Park, J.S., G.J. Ahn, and R. Sandhu. \u201cRole-based Access Control on the Web using LDAP,\u201d 15th Annual Working Conference on Database and Application Security,\u201d Niagara, Ontario, Canada, 2001."},{"key":"e_1_2_1_40_1","volume-title":"IEEE International Engineering Management Conference","author":"Petrick I.J.","year":"2002","unstructured":"Petrick, I.J. and A.E. Echols. \u201cTechnology Choice and Pooled Investment Among Networkers: Supply Chain Roadmaps,\u201d IEEE International Engineering Management Conference, Cambridge, UK, 2002."},{"key":"e_1_2_1_41_1","volume-title":"\u201cDetecting Inference Attacks Using Association Rules,\u201d","author":"Raman S.","year":"2001","unstructured":"Raman, S. \u201cDetecting Inference Attacks Using Association Rules,\u201d Research Paper, Rutgers University, 2001. http:\/\/www.glennshafer.com\/courses\/expertsys_students,html, accessed August 2004."},{"key":"e_1_2_1_42_1","volume-title":"MIT Auto-ID Labs Research Workshop","author":"Ranasinghe D.C.","year":"2004","unstructured":"Ranasinghe, D.C., D.W. Engels, and P.H. Cole. \u201cLow-Cost RFID Systems: Confronting Security and Privacy,\u201d MIT Auto-ID Labs Research Workshop, 2004. http:\/\/lasecwww.epfl.ch\/\u223cgavoine\/rfid\/, accessed August 2004."},{"issue":"48","key":"e_1_2_1_43_1","first-page":"16","article-title":"\u201cThe Race for RFID,\u201d","volume":"4","author":"Seidman T.","year":"2004","unstructured":"Seidman, T. \u201cThe Race for RFID,\u201d Journal of Commerce, 4:48, 2004, pp. 16\u201318.","journal-title":"Journal of Commerce"},{"key":"e_1_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1080\/08874417.2004.11647583"},{"key":"e_1_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1108\/13598549810215379"},{"key":"e_1_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1108\/01443570210427659"},{"key":"e_1_2_1_47_1","volume-title":"2nd Workshop on Security in Ubiquitous Computing","author":"Vajda I.","year":"2003","unstructured":"Vajda, I. and L. Butty\u00e1n. \u201cLightweight Authentication Protocols for Low-Cost RFID Tags,\u201d 2nd Workshop on Security in Ubiquitous Computing, Seattle, Washington, USA, October 12, 2003."},{"key":"e_1_2_1_48_1","volume-title":"\u201cOnline Security not a Concern for Most Supply Chain Managers,\u201d","author":"Vigoroso M.W.","year":"2003","unstructured":"Vigoroso, M.W., T.A. Minahan. \u201cOnline Security not a Concern for Most Supply Chain Managers,\u201d March 2003. http:\/\/supplychain.aberdeen.com, accessed August 2004."},{"key":"e_1_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1108\/09600030010346521"},{"key":"e_1_2_1_50_1","volume-title":"\u201cSecurity and Privacy in Radio-Frequency Identification Devices,\u201d","author":"Weis S.A.","year":"2003","unstructured":"Weis, S.A. \u201cSecurity and Privacy in Radio-Frequency Identification Devices,\u201d M.S. Thesis, MIT, 2003. http:\/\/theory.les.mit.edu\/\u223ccis\/theses\/weis-maters.pdf, accessed August 2004."},{"key":"e_1_2_1_51_1","first-page":"201","volume-title":"Security in Pervasive Computing, Lecture Notes in Computer Science","author":"Weis S.A.","year":"2003","unstructured":"Weis, S.A., S.E. Sarma, R.L. Rivest, and D.W. Engels. \u201cSecurity and Privacy Aspects of Low-Cost Radio Frequency Identification Systems,\u201d Security in Pervasive Computing, Lecture Notes in Computer Science, 2802, 2003, pp. 201\u2013212. http:\/\/theory.les.mit\/edu\/\u223csweis\/spc-rfid.pdf. Accessed August 2004."},{"key":"e_1_2_1_52_1","first-page":"313","volume-title":"IEEE International Conference on E-commerce","author":"Yang C.","year":"2003","unstructured":"Yang, C. and C.N. Zhang. \u201cDesigning Secure E-commerce with Role-based Access Control,\u201d IEEE International Conference on E-commerce, Newport Beach, California, USA, 2003, p. 313."},{"key":"e_1_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1108\/13598540210414364"},{"key":"e_1_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1080\/08874417.2000.11646980"}],"container-title":["Journal of Computer Information Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/08874417.2006.11645910","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,6]],"date-time":"2026-03-06T01:03:01Z","timestamp":1772758981000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/08874417.2006.11645910"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006,6]]},"references-count":53,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2006,6]]}},"alternative-id":["10.1080\/08874417.2006.11645910"],"URL":"https:\/\/doi.org\/10.1080\/08874417.2006.11645910","relation":{},"ISSN":["0887-4417","2380-2057"],"issn-type":[{"value":"0887-4417","type":"print"},{"value":"2380-2057","type":"electronic"}],"subject":[],"published":{"date-parts":[[2006,6]]}}}