Amira El-Sayed, Ahmed Ali (Author)
Amira F. Khalil and Khaled M. Rashad (Author)
Elena García-Ramos, Juan Carlos Sánchez-López, Marco Antonio Martínez-Ruiz (Author)
Jesus M. Gonzalez-Barahona (Author)
Maria Rodriguez and Liam Chen (Author)
Emine Nur Ozdemir, Canan Aydin (Author)
University of Kentucky, USA. USA. (Author)
Duc-Huy Le, Nguyen-Thi Hong Nguyen, Duc-Manh Bui, Thomas R. Bui, Phuong-Thai Nguyen, Nguyen-Van Tho, Minh-Duc Tran, Viet-Hung Nguyen, Anh-Thu Do, and Thi-Binh Tran (Author)
Nneoma A. Okoro1, & Chukwuma J. Iwu2 (Author)
Ana Isabel García-Valverde and Juan Francisco Hernández-Gómez (Author)
R. K. Patel and A. R. Jensen (Author)
Evangelos Stavropoulos, Ioanna Karampela, Arjun Singh, Maria K. N. Fountoulakis, Andreas A. Economou, Georgios P. Theodorou, Dimitra T. Chatziparadis, Ioannis G. Vrettos (Author)
Rohan K. Desai and Leila A. Jensen (Author)
Aisha Malik, Sophia Khan, and Omar Ali (Author)
Priyanka R. Desai, Kunal A. Chavan (Author)
Ali Fatemi
University of Memphis, USA. USA. (Author)
Shurooq Al-Majidi (Author)
Rohan Kumar Patel & Kunal Arora (Author)
S. K. Singh, R. K. Jain, P. K. Mishra (Author)
Elena Rodriguez-Gonzalez, Juan Carlos Sanchez-Alvarez, Lucia Moreno-Dominguez, and Ana Maria Sanchez-Lopez (Author)
Rohan Patel & Aarav Jain (Author)
Tanveer Ahmed Chowdhury, Md. Rakibul Hasan Khan (Author)
Rukmini Sengupta and Kavita Jain (Author)
Sophia Patel, Olivia Martin, Julianne Chen, Emilia Garcia, Alexander Brown (Author)
Alessandro Bianchi, Sofia Rodriguez, and Lorenzo Ferrari (Author)
Elena Vasquez, Sofia Rodriguez, Julian Styles (Author)
Alessandro De Luca, Maria Grazia Mancuso, Laura Di Giorgio, Elena Rizzo, and Gabriele Esposito (Author)
S. K. Nirmalan*, M. N. Suresh Kumar, A. K. Sofia Maria, P. A. Gino Vettori, and M. J. Ali Rezaei (Author)
Elena Vasquez, Leonardo Marquez (Author)
University of Leeds, United Kingdom. (Author)
Alessia Bianchi, Giovanni Rossi, Marco Esposito, Andrea Marzo, and Francesco Carbone (Author)
Krystian Mikolajczyk
Imperial College London, UK. UK. (Author)
Lorenzo Bianchi, Alessandro De Santis, Martina Ferrante, Riccardo Gennaro, and Elena Rizzo (Author)
Agnieszka W. Jastrzębowska, * *, Mateo V. García-Rodríguez, 2 2, Alessia Del Re3, 4 4, Gianluca Bencivenga3 and Paweł K. Woźniak1 (Author)
Elena Bianchi and Luca Rossi (Author)
Elena Vasquez and Leonardo Bianchi (Author)
Riya V. Shah and Kunal S. Deshmukh (Author)
Rukmini Rao and Kaitlyn Lee (Author)
Maria Rodriguez, Sofia Jensen, and Ethan Kim (Author)
Rukmini Rao, Arjun Varma, and Kaitlyn Lee (Author)
Rohan Desai and Leela Rao (Author)
Nalini S. Rao and Rohan K. Patel (Author)
Kavita Patel, Aryan Desai (Author)
Julian A. Moreno-Martínez, Sofia I. Hernández-González, Pablo R. Morales-Rodríguez, Laura M. Gómez-López, and Ricardo A. Díaz-Pérez (Author)
Ana María Sánchez and Javier Moreno (Author)
Rachel L. Everett, Michael R. Jenkins, Julian A. Reyes, Emily J. Lee, Olivia P. Santos, David A. Moreno, Nadav P. Cohen (Author)
Elijah Thompson and Sofia Rodriguez (Author)
Rukmini N. Patel and Liam J. Fraser (Author)
Aisha R. Patel and Liam T. McCormick (Author)
Abstract—The case study method in this paper shows the implementation of Information Technology (IT) and the Serial Shipping Container Code (SSCC) in a Croatian company that deals with logistics operations and provides logistics services in the cold chain segment. This company is aware of the sensitivity of the goods entrusted to them by the user of the service, as well as of the importance of speed and accuracy in providing logistics services. To that end, it has implemented and used the latest IT to ensure the highest standard of high-quality logistics services to its customers. Looking for efficiency and optimization of supply chain management, while maintaining a high level of quality of the products that are sold, today's users of outsourced logistics services are open to the implementation of new IT products that ultimately deliver savings. By analysing the positive results and the difficulties that arise when using this technology, we aim to provide an insight into the potential of this approach of the logistics service provider. (Author)
Amira Al-Khaled, Khaled A. Al-Rawi, and Yiqing Liu (Author)
Muhammad Raza Ali, Amira El-Sayed Ibrahim, and Jianwei Zhang (Author)
Ádám Varga, Maria Rodriguez, Simeon Todorov, Catalin Dumitrescu, Giuseppe La Rosa, Hafid Boudaoud, Tibor Nagy, János Szabó, Barna Fodor (Author)
Duc Huy Tran and Sofia Eriksson (Author)
University College London (UCL), United Kingdom. (Author)
Muhammad Faisal, Farah Zainal Abidin (Author)
University of Southern California (USC), USA. USA. (Author)
Sofia Rodriguez, Julian Blackwood (Author)
Elara V. Patel, Ethan J. Lee (Author)
Anurag S. Rao, Rohan K. Patel, Aarav V. Mehta (Author)
Rohan Desai, Sophia Patel, Ethan Kim (Author)
Maya Jensen and Kaitlyn Patel (Author)
Ji-Hoon Lee, Hyeon-Gyu Kim (Author)
Emily J. Miller, Alexander R. Thompson, Elena V. Petrova, Lucas T. Brooks (Author)
Sofia A. Rodriguez, Julian A. Castillo (Author)
Aurélien Marchand, Elsa Rivoire, Laurent Fournier, Sophie Dupont, Tristan Lefebvre, Caroline Moreau, Olivier Leclerc, Hervé Guérin (Author)
Amira J. Patel, Liam C. McCormick, Ethan A. Reyes, Rachel E. Langley (Author)
Ethan M. Thompson, Sofia Rodriguez-Mendoza (Author)
Tenzin Lhamo, Elliot Thompson, Kaitlyn Wong (Author)
Sofia Jensen, Liam Chen (Author)
Rohan V. Patel, Kavita R. Kumar (Author)
Fatemeh Rouhani, Parisa Jafari, Vladimir Kuznetsov (Author)
Sofia Jensen and Julian Lee (Author)
Ava Moreno, Liam Flynn, Zara Saeed (Author)
Alessandro Marini and Matteo Bianchi (Author)
Abstract—Biba model can protect information integrity but might deny various non-malicious access requests of the subjects, thereby decreasing the availability in the system. Therefore, a mechanism that allows exceptional access control is needed. Break the Glass (BTG) strategies refer an efficient means for extending the access rights of users in exceptional cases. These strategies help to prevent a system from stagnation. An approach is presented in this work for integrating Break the Glass strategies into the Biba model. This research proposes a model, BTG-Biba BTG-Biba, which provides both an original Biba model used in normal situations and a mechanism used in emergency situations. The proposed model is context aware, can implement a fine-grained type of access control and primarily solves cross-domain access problems. Finally, the flexibility and availability improvement with the use of the proposed model is illustrated. (Author)
Sofia Jensen and Liam Chen (Author)
Sophia Patel, Ethan Thompson (Author)
Leila Rostami and Kamil Zawadzki (Author)
Rohan K. Patel, Leela N. Rao (Author)
Sophia Patel, Ethan Kim (Author)
Ethan Thompson, Sophia Patel (Author)
Rukmini Rao, Liam Chen, Sofia Jensen, Ethan Kim, Kavita Desai (Author)
Elena Vasquez, Liam Chen (Author)
Maya K. Jensen, Ethan T. Russell (Author)
Sofia Patel, Rohan Jain, Leela Ranganathan (Author)
Sofia Elena Rodriguez, Julian Marcelo Santos, Eliana Maria Garcia, Ethan Alexander Lee (Author)
Rukmini R. Rao, Francesco T. Bianchi (Author)
Katarzyna R. Kowalska, Piotr B. Świątkowski (Author)
Emily J. Martin, Rohan K. Patel (Author)
Leila Jafari, Muhammad Khalid (Author)
Smita Desai, Rohan Patel (Author)
Xingchen Chen, Yuanyuan Wang (Author)
Sofia Jensen, Ethan Patel, Liya Zhang (Author)
Kavita Patel, Professor Amara O. Daramola, Nalini R. Srinivasan (Author)
Rohan Jain and Leela Rao (Author)
Rohan V. Patel and Maya K. Shah (Author)
Maria Elena Garcia-Ruiz, Ammar Ali-Khan (Author)
Francisco Javier García-Navarro and Emilio Manuel Sánchez-García (Author)
Alexander N. Petrov and Sofia M. Vasileva (Author)