Abstract | ||
---|---|---|
Security management of modern collaborative systems raises challenges to supply chain and enterprise management, demanding an integrated and holistic solution framework. In this article we concentrate on two fundamental instruments to support the pursuit of a security centric management (SCM) mission. Firstly the security taxonomy within the SCM context provides a comprehensive knowledge map of relevant artifacts and issues for players to communicate and collaborate in this special field. Ultimately it supplies building blocks for qualitative modeling required by security management. Secondly security management in SCM seeks practical computation and analysis capabilities, thus requiring a migration from qualitative models to quantitative models. We utilize dependency modeling as the bridging facility and probabilistic modeling as the inference engine in our solution to deal with complexity and uncertainty dominant in SCM. In addition we explore the proposition within essential application of healthcare security management. Noticing the enormous challenge presented by the new research mission, we emphasize identifying and examining generic issues and potential solutions, rather than particular problems or algorithms with limited usage and significance. |
Year | DOI | Venue |
---|---|---|
2008 | 10.1109/ICNSC.2008.4525468 | ICNSC |
Keywords | Field | DocType |
health care,security taxonomy,dependency modeling,inference mechanisms,collaborative system,probabilistic modeling,knowledge map,inference engine,healthcare security management,groupware,security centric management,security management modeling,security of data,collaboration,probabilistic model,security management,engines,supply chain management,taxonomy,security,supply chains,supply chain,uncertainty,quality management | ITIL security management,Computer science,Collaboration,Collaborative software,Knowledge management,Control engineering,Supply chain management,Supply chain,Security information and event management,Computer security model,Process management,Security management | Conference |
ISSN | ISBN | Citations |
1810-7869 | 978-1-4244-1686-8 | 0 |
PageRank | References | Authors |
0.34 | 6 | 2 |
Name | Order | Citations | PageRank |
---|---|---|---|
Xiangyang Li | 1 | 4 | 1.09 |
Jiun-Yan Shiau | 2 | 29 | 3.89 |