|
REFERENCES
Note: OCR errors may be found in this Reference List extracted from the full text article. ACM has opted to expose the complete List rather than only correct and linked references.
1 Cohen, F. Your firewall won't save you. Forbes ASAP Supplement (June 3, 1996).
2 Arthur E. Hutt , Douglas B. Hoyt , Seymour Bosworth, Computer Security Handbook, John Wiley & Sons, Inc., New York, NY, 1995
3 Lawrence Livermore National Laboratory. Financial Electronic Data Interchange Pilot Project. Lawrence Livermore National Laboratory, Finance Department, UCRL-AR-124103, (May 1, 1996).
4 Segev, A., Porra, J., and Roldan, M. Internet-Based Financial EDI: The Case of Bank of America and Lawrence Livermore National Laboratory Pilot. The Fisher Center for Information Technology and Management, Institute of Management, Innovation and Organization, University of California, Berkeley, Working Paper CITM-96-WP, (Dec. 1996).
5 Arie Segev , Jaana Porra , Malu Roldan, Internet-based EDI strategy, Decision Support Systems, v.21 n.3, p.157-170, Nov. 1997
6 Segev, A., Wan, D., Beam, C., Toma, B., and Weinrot, D. Internet-Based Financial EDI: A Case Study. The Fisher Center for Information Technology and Management, Institute of Management, Innovation and Organization, University of California, Berkeley, Working Paper CITM- 95-WP-1006, (Aug. 1995).
7 John R. Vacca, Internet Security Secrets, IDG Books Worldwide, Inc., Foster City, CA, 1995
INDEX TERMS
Primary Classification:
K. Computing Milieux
K.4 COMPUTERS AND SOCIETY
K.4.4 Electronic Commerce
Subjects: Security
Additional Classification:
H. Information Systems
H.4 INFORMATION SYSTEMS APPLICATIONS
H.4.3 Communications Applications
Nouns: Internet
J. Computer Applications
J.1 ADMINISTRATIVE DATA PROCESSING
Subjects: Financial (e.g., EFTS)
General Terms:
Management, Reliability, Security
Collaborative Colleagues: Jaana Porra: Michiel De Boer
Frans A. J. Van Den Bosch
James F. Courtney
Rudy Hirschheim
Kalle Lyytinen
David B. Paradice
Michael S. Parks
Malu Roldan
Arie Segev
Henk W. Volberda
Malu Roldan: Michael J. Gallivan
Judith Gebauer
Judith Gebaur
Amir Hartman
Timothy R. Hill
Ephraim McLean
Jo Ellen Moore
Jaana Porra
Nulu Roldan
Arie Segev Louise Soe
James Ware
Elaine K. Yakura
Arie Segev: Tamer 謟su
Ilsoo Ahn
Gad Ariav
Gadi Ariav
Don Batory
Caroline Beam
Carrie Beam
Martin Bichler
Michael Bloch
Rakesh Chandra
Abhirup Chatterjee
James Clifford
Umeshwar Dayal
Soumitra Dutta
Curtis Dyreson
Curtis E. Dyreson
Ramez Elmasri
Opher Etzion
Weiping Fang Shashi Gadia
Avigdor Gal
Bezalel Gavish
Judith Gebauer
Fabio Grandi
Himawan Gunadhi
Sushil Jajodia
Christian S. Jensen
Wolfgang K鋐er
Larry Kerschberg
Jin Baek Kim
Nick Kline
Ramayya Krishnan
Krishna Kulkarni
Akhil Kumar
J. Leon Zhao
T. Y. Cliff Leung
Nikos Lorentzos
Yannis Mitsopoulos Angelo Montanari
Inderpal S. Mumick
Daniel Nonen
Jooseok Park
Ajit K. Patankar
Ajit Krishna Patankar
Elisa Peressi
Barbara Pernici
Niki Pissinou
Jaana Porra
Zbigniew W. Ras
John F. Roddick
Malu Roldan
Ellen Rose
Ellen Ann Rose
Doron Rotem
Nandlal L. Sarda
Maria Rita Scalas
J. George Shanthikumar Michael Shaw
Arie Shoshani
Richard Snodgrass
Richard Thomas Snodgrass
Michael D. Soo
Mike D. Soo
Suryanarayana M. Sripada
Michael Stonebraker
Abdullah Tansel
Abdullah Uz Tansel
Babis Theodoulidis
Paolo Tiberio
Vijay K. Vaishnavi
Dadong Wan
Andrew B. Whinston
Gio Wiederhold
Maria Zemankova
J. Leon Zhao
Peer to Peer - Readers of this Article have also read:
Constructing reality Proceedings of the 11th annual international conference on Systems documentation
Douglas A. Powell , Norman R. Ball , Mansel W. Griffiths
The effect of latency on user performance in Warcraft III Proceedings of the 2nd workshop on Network and system support for games
Nathan Sheldon , Eric Girard , Seth Borg , Mark Claypool , Emmanuel Agu
Learning subjective relevance to facilitate information access Proceedings of the fourth international conference on Information and knowledge management
James R. Chen , Nathalie Mathé
Data structures for quadtree approximation and compression Communications of the ACM 28, 9
Hanan Samet
A hierarchical single-key-lock access control using the Chinese remainder theorem Proceedings of the 1992 ACM/SIGAPP Symposium on Applied computing
Kim S. Lee , Huizhu Lu , D. D. Fisher |
|