期刊文献+

基于ML—FCM的供应链内企业间信任构建模型 被引量:3

A Trust-building Model within the Supply Chain Based on ML-FCM
下载PDF
导出
摘要 本文分析了在21世纪市场环境下构建供应链的必要性,指出培养企业间的相互信任是提高供应链管理水平,增加企业合作效率的有效方式。通过对影响供应链内企业间信任的因素进行分析,构建了供应链内企业间信任模型,并在此基础上提出了基于ML—FCM的供应链内企业间信任构建模型。 This paper analyses the necessity of constructing supply chain under the marker environment in 21st century ,indicating that cultivating the mutual trust between enterprises is the effective method to promote the managerial level of supply chain, and improve the cooperative efficiency between enterprises. Through the analyses of the elements influencing the trust between enterprises with in the supply chain, the trust model is built, on whose basis proposed is the trust-building model within the supply chain based on ML-FCM.
作者 王欣欣
出处 《中国市场》 北大核心 2007年第23期68-69,共2页 China Market
关键词 供应链 关系型信任 功利型信任 supply chain relations trust utility trust
  • 相关文献

参考文献2

  • 1廖俊国,洪帆,朱更明,杨秋伟.基于信任度的授权委托模型[J].计算机学报,2006,29(8):1265-1270. 被引量:30
  • 2[3]Sherrie Xiao Komiak.Understanding Customer Trust in Agent-Mediated Electronic Commerce,Web-Mediated Electronic Commerce,and Traditional Commerce,Information Technology and Management 2004,5:181-207.

二级参考文献16

  • 1Clarke D. , Elien J. E. , Ellison C. et al. Certificate chain discovery in SPKI/SDSI. Journal of Computer Security, 2001, 9(4):285-322
  • 2Li N. , Winsborough W. H. , Mitchell J. C.. Distributed credential chain discovery in trust management. Journal of Computer Security, 2003, 11(1): 35-86
  • 3Zhu Xian, Wang Shao-Bin, Hong Fan et al. Distributed credential chain discovery in trust-management with parameterized roles. In:Proceedings of the 4th International Conference on Cryptology and Network Security (CANS05). Xiamen, China,2005, 334-348
  • 4Beth T. , Boreherding M. , Klein B.. Valuation of trust in open networks. In: Gollmann D. ed. Proceedings of the 3rd European Symposium on Research in Computer Security (ESORICS 94), Brighton, UK: Springer-Verlag, 1994, 3-18
  • 5Wang Lun-Wei, Liao Xiang-Ke, Wang Huai-Min. AT-PAM:Authentication Trustworthiness-based PAM. In: Proceedings of the 3rd International Conference on Information Security,Shanghai, China, 2004, 204-209
  • 6Jφsang A. , Pope S.. Semantic constraints for trust transitivity. In: Proceedings of the 2nd Asia-Pacific Conference on Conceptual Modelling(APCCM2005), Newcastle, NSW, Australia, Australian Computer Society, 2005, 59-68
  • 7Kapadia A. , Al-Muhtadi J. , Campbell R. H. , Mickunas D..IRBAC 2000: Secure interoperability using dynamic role translation. University of Illinois, DeKalb, Ill. , USA: Technical Report UIUCDCS-R-2000-2162, 2000
  • 8Shehab M. , Bertino E. , Ghafoor A.. SERAT: SEcure Rolem Appling Technique for decentralized secure interoperability.In: Proceedings of the 10th ACM Symposium on Access Control Models and Technologies, Stockholm, Sweden, 2005, 159-167.
  • 9Blaze M. , Feigenbaum J. , Lacy J.. Decentralized trust management. In: Proceedings of the 1996 IEEE Symposium on Security and Privacy, Washington, DC, USA, 1996, 164-173
  • 10Blaze M. , Feigenbaum J. , Ioannidis J. , Keromytis A. D..The KeyNote Trust-Management Version 2. RFC 2704, 1999.http://www.faqs.org/rfcs/rfc2704.html

共引文献29

同被引文献9

引证文献3

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部