Font Size: a A A

Information Security Management Of Supply Chain

Posted on:2008-07-08Degree:MasterType:Thesis
Country:ChinaCandidate:W Y LiuFull Text:PDF
GTID:2189360212474798Subject:Management Science and Engineering
Abstract/Summary:PDF Full Text Request
Accompany the increasing competition and the separation of society work, many enterprises combine together. In this case, the firm can enhance its own advantages in competition. This paper presents different authentication models, according to the different characterizes of the supply chain alliance in its forming and practicing. The model ensures the transmission and share of the supply information. Besides, it optimizes the structure of recourses as much as possible. The author puts forward a authentication model based on industry, in the stage of the supply chain alliance forming. We suggest use a layer model inside one industry, while use a web model among industries. In this way, the authentication quality can be promised, in the meantime, the resources can be saved. During the supply chain alliance practicing stage, a trusty third organization is introduced into this system to build up a new CA. Therefore, the authentication process is simplified.In addition, this paper also suggest a form of application——ASP (Application Service Provider). The main idea is choosing a credible and competent application service provider, which can implement the authentication and other everyday words, so that the enterprises can develop their core competitive ability. Father it can promote the market competitive ability of the whole supply chain alliance. Besides all above, the author also analyzes the information security management of the supply chain alliance. The management has been separate into two parts: one is about the alliance member's management; the other is the whole supply chain alliance's management. The different measures have been suggested for different organizations. It is suggested that established information security policy should combine with BS7799 and other standards. For the alliance, we can use encrypt and decrypt technique, the data signature and secret sharing technique, to promise the security of the information in the supply chain alliance.
Keywords/Search Tags:Supply chain alliance, Authentication model, Security of Information
PDF Full Text Request
Related items