Access the full text.
Sign up today, get DeepDyve free for 14 days.
W. Berry, M. Cooper (1999)
Manufacturing flexibility: methods for measuring the impact of product variety on performance in process industriesJournal of Operations Management, 17
D. Crocker (1995)
MIME Encapsulation of EDI ObjectsRFC, 1767
D. Lambert, M. Cooper, J. Pagh (1998)
Supply Chain Management: Implementation Issues and Research OpportunitiesThe International Journal of Logistics Management, 9
Blake Ramsdell (1999)
S/MIME Version 3 Certificate HandlingRFC, 2632
R. Kalakota, Marcia Robinson (2001)
E-business 2.0 - roadmap for success (2. ed.)
J. Linn (1989)
Privacy enhancement for Internet electronic mail: Part III - algorithms, modes, and identifiersRFC, 1115
P. Olla, C. Atkinson (2004)
Developing a wireless reference model for interpreting complexity in wireless projectsInd. Manag. Data Syst., 104
R. Housley (1999)
Cryptographic Message SyntaxRFC, 2630
Martin Rudberg (2004)
Linking competitive priorities and manufacturing networks: a manufacturing strategy perspectiveInt. J. Manuf. Technol. Manag., 6
M. Elkins (1996)
MIME Security with Pretty Good Privacy (PGP)RFC, 2015
S. Chang, C. Ho (2006)
Organizational factors to the effectiveness of implementing information security managementInd. Manag. Data Syst., 106
Holtjona Galanxhi-Janaqi, F. Nah (2004)
U-commerce: emerging trends and research issuesInd. Manag. Data Syst., 104
(1999)
“ Diffie - Hellman key agreement method ” , RFC 2631 of IETF
T. Gulledge, Rainer Sommer (2003)
Public sector enterprise resource planningInd. Manag. Data Syst., 103
S. Kent, J. Linn (1987)
Privacy enhancement for Internet electronic mail: Part II - certificate-based key managementRFC, 1114
D. Ho, K. Au, E. Newton (2003)
The process and consequences of supply chain virtualizationInd. Manag. Data Syst., 103
P. Hoffman (1999)
Enhanced Security Services for S/MIMERFC, 2634
T. Davenport (1992)
Process Innovation: Reengineering Work Through Information Technology
I. Pujawan (2004)
Assessing supply chain flexibility: a conceptual framework and case studyInternational Journal of Integrated Supply Management, 1
(1995)
“ MIME encapsulation of EDI objects ” , RFC 1767 of IETF
A. Coles, Lisa Harris, K. Dickson (2003)
Testing goodwill: conflict and cooperation in new product development networksInt. J. Technol. Manag., 25
Marianne Rinza (2001)
Taiwan (Republic of China)
C. Adams, S. Farrell (1999)
Internet X.509 Public Key Infrastructure Certificate Management ProtocolsRFC, 2510
B. Kaliski (1993)
Privacy Enhancement for Internet Electronic Mail: Part IV: Key Certification and Related ServicesRFC, 1424
R. Housley
PKCS#7: cryptographic message syntax
(2001)
Rosetta Net PIP Implementation, Supply Chain eBusiness Manager
A. Lyons, J. Coleman, D. Kehoe, A. Coronado
Performance observation and analysis of an information re‐engineered supply chain
A. Lyons, J. Coleman, D. Kehoe, A. Mondragon (2004)
Performance observation and analysis of an information re-engineered supply chain: a case study of an automotive firmInd. Manag. Data Syst., 104
E. Rescorla (1999)
Diffie-Hellman Key Agreement MethodRFC, 2631
María Abad-Grau, Daniel Arias-Aranda (2006)
Operations strategy and flexibility: modeling with Bayesian classifiersInd. Manag. Data Syst., 106
Blake Ramsdell (1999)
S/MIME Version 3 Message SpecificationRFC, 2633
S. Chang, Chin-Shien Lin (2007)
Exploring organizational culture for information security managementInd. Manag. Data Syst., 107
Purpose – The paper aims to propose a model that attempts to build an innovative common gateway compliant with RosettaNet Standards for the secure message exchange between electronic businesses in this age of internet economy. Design/methodology/approach – The use of RosettaNet Standards is to achieve the effectiveness and efficiency of message exchange, and consequently gain mutual benefits by means of agile response for cross‐organizational co‐operation. This common message gateway is built and implemented as an organization's front‐end interface, but is seamlessly integrated with business's back‐end information systems for the message exchange with the business partners of the organization. The proposed common gateway service model provides organizations with low cost, high efficiency, high security of message exchange and transmission over the internet. A prototyping system is also built and tested in a local network devices manufacturing company with its suppliers to examine its feasibility and efficiency. Findings – The result shows that the service model can help the company to achieve a new level of efficiency and effectiveness of streamlining data flow and creating a seamless link with its business partners in this era of internet economy. Originality/value – The paper presents a common gateway service system for secure data exchange and transmission over the internet between business partners to build a value‐added supply network.
Industrial Management & Data Systems – Emerald Publishing
Published: Jun 1, 2005
Keywords: Electronic data interchange; Supply chain management; Data security
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.