Browse Papers
From IFORS
Contact Us
English
Remember me
Login
Forgot password?
Keyword: security
Found
180 papers
in total
Date Descending
Date Ascending
Title Descending
Title Ascending
Toward a secure supply chain: A system's perspective
2008,
Chandra Charu
Security management has become a critical topic that supply systems have to handle on...
OR Forum – Homeland security: From mathematical models to policy implementation: The 2008 Philip McCord Morse Lecture
2009,
Wein Lawrence M
This paper is the archival record of the INFORMS Philip McCord Morse Lecture delivered...
Dynamics of organizational information security
2008,
Dutta Amitava
While technology is important, organizational and human factors also play a crucial...
If someone is watching, I'll do what I'm asked: mandatoriness, control, and information security
2009,
Angermeier Ingo
Information security has become increasingly important to organizations. Despite the...
Supply Chain Security Management: an overview
2009,
Hintsa Juha
Supply Chain Security Management (SCSM) is a relatively new research...
Managing user relationships in hierarchies for information system security
2007,
Vroblefski Mark
Hierarchies are an important concept in information protection systems. The uses of...
Design of robust business-to-business electronic marketplaces with guaranteed privacy
2006,
Basu Amit
Firms that set up electronic marketplaces to enhance their supply and/or distribution...
The value of intrusion detection systems in information technology security architecture
2005,
Raghunathan Srinivasan
The increasing significance of information technology (IT) security to firms is...
Perturbing nonnormal confidential attributes: The copula approach
2002,
Muralidhar Krishnamurty
Protecting confidential, numerical data in databases from disclosure is an important...
Privacy protection of binary confidential data against deterministic, stochastic, and insider threat
2002,
Garfinkel Robert
A practical model and an associated method are developed for providing consistent,...
A general additive data perturbation method for database security
1999,
Muralidhar Krishnamurty
The security of organizational databases has received considerable attention in the...
Guarding rectangular art galleries
1994,
Czyzowicz J.
Consider a rectangular art gallery divided into n rectangular rooms, such that any two...
First Page
6
7
8
Papers per page:
6 Papers
12 Papers
24 Papers
36 Papers
48 Papers