{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,2]],"date-time":"2025-08-02T17:52:39Z","timestamp":1754157159344,"version":"3.41.2"},"reference-count":30,"publisher":"Emerald","issue":"5","license":[{"start":{"date-parts":[[2005,6,1]],"date-time":"2005-06-01T00:00:00Z","timestamp":1117584000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005,6,1]]},"abstract":"<jats:sec><jats:title content-type=\"abstract-heading\">Purpose<\/jats:title><jats:p>The paper aims to propose a model that attempts to build an innovative common gateway compliant with RosettaNet Standards for the secure message exchange between electronic businesses in this age of internet economy.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Design\/methodology\/approach<\/jats:title><jats:p>The use of RosettaNet Standards is to achieve the effectiveness and efficiency of message exchange, and consequently gain mutual benefits by means of agile response for cross\u2010organizational co\u2010operation. This common message gateway is built and implemented as an organization's front\u2010end interface, but is seamlessly integrated with business's back\u2010end information systems for the message exchange with the business partners of the organization. The proposed common gateway service model provides organizations with low cost, high efficiency, high security of message exchange and transmission over the internet. A prototyping system is also built and tested in a local network devices manufacturing company with its suppliers to examine its feasibility and efficiency.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Findings<\/jats:title><jats:p>The result shows that the service model can help the company to achieve a new level of efficiency and effectiveness of streamlining data flow and creating a seamless link with its business partners in this era of internet economy.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Originality\/value<\/jats:title><jats:p>The paper presents a common gateway service system for secure data exchange and transmission over the internet between business partners to build a value\u2010added supply network.<\/jats:p><\/jats:sec>","DOI":"10.1108\/02635570510600019","type":"journal-article","created":{"date-parts":[[2005,6,7]],"date-time":"2005-06-07T10:25:37Z","timestamp":1118139937000},"page":"662-681","source":"Crossref","is-referenced-by-count":12,"title":["A generic service model for secure data interchange"],"prefix":"10.1108","volume":"105","author":[{"given":"Ruey\u2010Kei","family":"Chiu","sequence":"first","affiliation":[]},{"given":"Jason C.H.","family":"Chen","sequence":"additional","affiliation":[]}],"member":"140","reference":[{"key":"key2022021520104076700_b14","doi-asserted-by":"crossref","unstructured":"Adams, C. and Farrel, S. (1999), \u201cInternet X.509 Public key infrastructure certificate management protocols\u201d, RFC1421 of IETF, available at: www.ietf.org\/rfc\/rfc2510.txt\/.","DOI":"10.17487\/rfc2510"},{"key":"key2022021520104076700_b16","doi-asserted-by":"crossref","unstructured":"Balenson, D. (1993), \u201cPrivacy enhancement for internet electronic mail. Part III: Algorithms, modes, and identifiers\u201d, RFC1423 of IETF, available at: \/\/www.ietf.org\/rfc.html\/.","DOI":"10.17487\/rfc1423"},{"key":"key2022021520104076700_b1","doi-asserted-by":"crossref","unstructured":"Berry, W.L. and Cooper, M.C. (1999), \u201cManufacturing flexibility: methods for measuring the impact of product variety on performance in process industries\u201d, Journal of Operations Management, Vol. 17, pp. 163\u201078.","DOI":"10.1016\/S0272-6963(98)00033-3"},{"key":"key2022021520104076700_b3","doi-asserted-by":"crossref","unstructured":"Coles, A.M., Harris, L. and Dickson, K. (2003), \u201cTesting goodwill: conflict and cooperation in new product development networks\u201d, International Journal of Technology Management, Vol. 25 Nos. 1\/2, pp. 51\u201064.","DOI":"10.1504\/IJTM.2003.003089"},{"key":"key2022021520104076700_b17","doi-asserted-by":"crossref","unstructured":"Crocker, D. (1995), \u201cMIME encapsulation of EDI objects\u201d, RFC1767 of IETF, available at: \/\/www.ietf.org\/rfc.html\/.","DOI":"10.17487\/rfc1767"},{"key":"key2022021520104076700_b5","doi-asserted-by":"crossref","unstructured":"Gulledge, T.R. and Sommer, R.A. (2003), \u201cPublic sector enterprise resource planning\u201d, Industrial Management & Data Systems, Vol. 103 No. 7, pp. 471\u201083.","DOI":"10.1108\/02635570310489179"},{"key":"key2022021520104076700_b6","doi-asserted-by":"crossref","unstructured":"Ho, C.K., Au, K.F. and Newton, E. (2003), \u201cThe process and consequences of supply chain virtualization\u201d, Industrial Management & Data Systems, Vol. 103 No. 6, pp. 423\u201033.","DOI":"10.1108\/02635570310479990"},{"key":"key2022021520104076700_b18","doi-asserted-by":"crossref","unstructured":"Hoffman, P. (1999), \u201cEnhanced security services for S\/MIME\u201d, RFC2634 of IETF, available at: \/\/www.ietf.org\/rfc.html\/.","DOI":"10.17487\/rfc2634"},{"key":"key2022021520104076700_b7","doi-asserted-by":"crossref","unstructured":"Holtjona, G. and Fiona, F. (2004), \u201cU\u2010commerce: emerging trends and research issues\u201d, Industrial Management & Data Systems, Vol. 104 No. 9, pp. 744\u201055.","DOI":"10.1108\/02635570410567739"},{"key":"key2022021520104076700_b19","doi-asserted-by":"crossref","unstructured":"Housley, R. (1999), \u201cPKCS#7: cryptographic message syntax\u201d, RFC2630 of Internet Engineering Task Force (IETF), available at: www.ietf.org\/rfc.html\/.","DOI":"10.17487\/rfc2630"},{"key":"key2022021520104076700_b8","unstructured":"Kalakota, R. and Robinson, M. (2001), E\u2010Business 2.0: Road\u2010map for Success, Addison\u2010Wesley Publishing Company, Glenview, IL, pp. 273\u20105."},{"key":"key2022021520104076700_b21","doi-asserted-by":"crossref","unstructured":"Kaliski, B. (1993), \u201cPrivacy enhancement for internet electronic mail. Part IV: Key certification and related services\u201d, RFC1424 of IETF, available at: www.ietf.org\/rfc.html\/.","DOI":"10.17487\/rfc1424"},{"key":"key2022021520104076700_b10","doi-asserted-by":"crossref","unstructured":"Lyons, A., Coleman, J., Kehoe, D. and Coronado, A. (2004), \u201cPerformance observation and analysis of an information re\u2010engineered supply chain\u201d, Industrial Management & Data Systems, Vol. 104 No. 8, pp. 658\u201066.","DOI":"10.1108\/02635570410561645"},{"key":"key2022021520104076700_b11","doi-asserted-by":"crossref","unstructured":"Olla, P. and Atkinson, C. (2004), \u201cDeveloping a wireless reference model for interpreting complexity in wireless project\u201d, Industrial Management & Data Systems, Vol. 104 No. 3, pp. 262\u201072.","DOI":"10.1108\/02635570410525807"},{"key":"key2022021520104076700_b12","doi-asserted-by":"crossref","unstructured":"Pujawan, N. (2004), \u201cAssessing supply chain flexibility: a conceptual framework and case study\u201d, International Journal of Integrated Supply Management, Vol. 1 No. 1, pp. 79\u201097.","DOI":"10.1504\/IJISM.2004.004599"},{"key":"key2022021520104076700_b25","unstructured":"Ramsdell, B. (Ed.) (2001a), \u201cS\/MIME version 3 certificate handling\u201d, RFC2632 of IETF, available at: www.ietf.org\/rfc.html\/."},{"key":"key2022021520104076700_b24","unstructured":"Ramsdell, B. (Ed.) (2001b), \u201cS\/MIME version 3 message specification\u201d, RFC2633 of IETF, available at: www.ietf.org\/rfc.html\/."},{"key":"key2022021520104076700_b26","doi-asserted-by":"crossref","unstructured":"Rescorla, E. (1999), \u201cDiffie\u2010Hellman key agreement method\u201d, RFC2631 of IETF, available at: www.ietf.org\/rfc.html\/.","DOI":"10.17487\/rfc2631"},{"key":"key2022021520104076700_b28","unstructured":"Rosetta Net Overview (2003), available at: www.rosettanet.org\/."},{"key":"key2022021520104076700_b27","unstructured":"Rosetta Net Technical Reports (n.d.), available at: \/\/xml.coverpages.org\/rosettaNet.html."},{"key":"key2022021520104076700_b13","doi-asserted-by":"crossref","unstructured":"Rudberg, M. (2004), \u201cLinking competitive priorities and manufacturing networks: a manufacturing strategy perspective\u201d, International Journal of Manufacturing Technology and Management, Vol. 6 Nos. 1\/2, pp. 55\u201080.","DOI":"10.1504\/IJMTM.2004.004506"},{"key":"key2022021520104076700_b30","unstructured":"W3C (1998), \u201cGuide to the W3C XML specification (\u2018XMLspec\u2019) DTD, version 2.1\u201d, available at: \/\/www.w3.org\/XML\/1998\/06\/xmlspec\u2010report.htm\/."},{"key":"key2022021520104076700_frd1","doi-asserted-by":"crossref","unstructured":"Alkins, M. (1996), \u201cMIME security with pretty and privacy (PGP)\u201d, RFC2631 of IETF, available at: www.ietf.org\/rfc.html\/.","DOI":"10.17487\/rfc2015"},{"key":"key2022021520104076700_frd2","unstructured":"Cantillon, D.M. (2001), Rosetta Net PIP Implementation, Supply Chain eBusiness Manager, Compaq Computer Corporation, Palo Alto, CA."},{"key":"key2022021520104076700_frd3","unstructured":"Davenport, T.H. (1993), Process Innovation\u2010reengineering Work Through Information Technology, Harvard Business School Press, Boston, MA."},{"key":"key2022021520104076700_frd4","unstructured":"Internet Mail Consortium (IMC) (n.d.), available at: www.imc.org\/s_mime.html and www.imc.org\/smime\u2010pgpmime.html."},{"key":"key2022021520104076700_frd5","doi-asserted-by":"crossref","unstructured":"Kent, S. (1993), \u201cPrivacy enhancement for internet electronic mail. Part II: Certificate\u2010based key management\u201d, RFC1422 of IETF, available at: www.ietf.org\/rfc.html\/.","DOI":"10.17487\/rfc1422"},{"key":"key2022021520104076700_frd6","doi-asserted-by":"crossref","unstructured":"Lambert, D.M., Cooper, M.C. and Pagh, J.D. (1998), \u201cSupply chain management: implementation issues and research opportunities\u201d, The International Journal of Logistics Management, Vol. 9 No. 2, pp. 1\u201019.","DOI":"10.1108\/09574099810805807"},{"key":"key2022021520104076700_frd7","unstructured":"Microsoft Inc., IIS Server (n.d.), available at: www.microsoft.com\/products\/servers\/iis\/products\u20105.htm."},{"key":"key2022021520104076700_frd8","unstructured":"Supply\u2010Chain Council (2002), \u201cSCOR overview\u201d, available at: supply\u2010chain.nidhog.com\/default.htm\/."}],"container-title":["Industrial Management &amp; Data Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/02635570510600019","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/02635570510600019\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/02635570510600019\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,24]],"date-time":"2025-07-24T23:37:33Z","timestamp":1753400253000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/imds\/article\/105\/5\/662-681\/184777"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005,6,1]]},"references-count":30,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2005,6,1]]}},"alternative-id":["10.1108\/02635570510600019"],"URL":"https:\/\/doi.org\/10.1108\/02635570510600019","relation":{},"ISSN":["0263-5577"],"issn-type":[{"type":"print","value":"0263-5577"}],"subject":[],"published":{"date-parts":[[2005,6,1]]}}}