2013
DOI: 10.1016/j.dss.2012.05.049
|View full text |Cite
|
Sign up to set email alerts
|

Secure federation of semantic information services

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Year Published

2015
2015
2021
2021

Publication Types

Select...
4
2

Relationship

1
5

Authors

Journals

citations
Cited by 7 publications
(4 citation statements)
references
References 62 publications
0
4
0
Order By: Relevance
“…Architectural research examines frameworks for the deployment of operational information security processes and technical implementations. We identified a small number of papers in this area (Djordjevic et al , 2007; Fabian et al , 2013; Moradian, 2008; Wangwe et al , 2012; Eigeles, 2006). For example, Wangwe et al (2012) developed a framework for collaboration between government agencies.…”
Section: Resultsmentioning
confidence: 99%
See 2 more Smart Citations
“…Architectural research examines frameworks for the deployment of operational information security processes and technical implementations. We identified a small number of papers in this area (Djordjevic et al , 2007; Fabian et al , 2013; Moradian, 2008; Wangwe et al , 2012; Eigeles, 2006). For example, Wangwe et al (2012) developed a framework for collaboration between government agencies.…”
Section: Resultsmentioning
confidence: 99%
“…A closer analysis of Figure 3 shows that there are few papers in each research topic. The largest topics are technology (Kayem et al , 2011; Li and Ding, 2007; Yuan et al , 2009), organisational design/strategy (Khidzir et al , 2010a; Khidzir et al , 2010b; Robertson et al , 2010) and architecture (Djordjevic et al , 2007; Fabian et al , 2013; Wangwe et al , 2012). Together they constitute 77 per cent of research on theory testing (ten papers).…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…In combination, this would allow us to look at implementing a comprehensive system for the individual supply chain players. If all partners provide selected data to a central system, a wide range of further applications for analyzing and evaluating the data will arise (Fabian et al, 2013). Some of these applications could also be developed by recent decentralized approaches such as Federated Learning.…”
Section: Discussionmentioning
confidence: 99%