exchanges. In IEEE Intelligent Systems, Vol. 23 Issue
4, p65-74.
Bharadwaj, S., Bharadwaj, A., Bendoly, E., 2007. The
performance effects of complementarities between
information systems, marketing, manufacturing, and
supply chain processes. In Information Systems
Research, Vol. 18 Issue 4, p437-453.
Briguet, C., 2009. Building a Secure Collaborative
Infrastructure. In ECN: Electronic Component News,
Vol. 53 Issue 2, p27-29.
Cao, J., Chen, J., Zhao, H., Li, M., 2009. A policy-based
authorization model for workflow-enabled dynamic
process management. In Journal of Network &
Computer Applications, Vol. 32 Issue 2, p412-422.
Cheswick, W.R., Bellovin, S.M., Rubin, A.D., 2003.
Firewalls and Internet Security: Repelling the Wily
Hacker, Addison-Wesley Professional. 2
nd
edition.
Chi, L., Holsapple, C.W., Srinivasan, C., 2007.
Competitive dynamics in electronic networks: a model
and the case of interorganizational systems. In
International Journal of Electronic Commerce, Vol.
11 Issue 3, p37-49.
Cook, N., Robinson, P., Shrivastava, S.K., 2006. Design
and Implementation of Web Services Middleware to
Support Fair Non-Repudiable Interactions. In
International Journal of Cooperative Information
Systems, Vol. 15 Issue 4, p565-597.
Dagorn, N., 2008. Politiques en matière de sécurité des
systèmes d'information inter-organisationnels: une
enquête dans dix grandes entreprises. In Systèmes
d’Information et Management, Vol. 13 Issue 2, p97-
125.
Dagorn, N., 2009. Sécurité des systèmes d’information
coopératifs. PhD Dissertation, Nancy-Université,
September (to appear).
Demchenko, Y., Mulmo, O., Gommans, L., de Laat, C.,
Wan, A., 2008. Dynamic security context management
in Grid-based applications. In Future Generation
Computer Systems, Vol. 24 Issue 5, p434-441.
Ekelhart, A., Fenz, S., Goluch, G., Steinkellner, M.,
Weippl, E., 2008. XML security: A comparative
literature review. In Journal of Systems & Software,
Vol. 81 Issue 10, p1715-1724.
Fenoulière, P., 2004. Vers une informatique ouverte :
enjeux et infrastructures, Hermes Science
Publications. Paris.
Graff, M.G., Van Wyk, K.R., 2003. Secure Coding:
Principles and Practices, O'Reilly Media.
Howard, M., LeBlanc, D., 2001. Writing Secure Code,
Microsoft Press.
Izza, S., 2009. Integration of industrial information
systems: from syntactic to semantic integration
approaches. In Enterprise Information Systems, Vol. 3
Issue 1, p1-57.
Khosrow, M., 2008. Web Technologies for Commerce and
Services Online, Information Science Reference.
Hershey, PA.
Lehtinen, R., 2006. Computer Security Basics, O’Reilly
Media. Sebastopol, CA, 2
nd
edition.
Lin, S.-J., Liu, D.-C., 2009. An incentive-based electronic
payment scheme for digital content transactions over
the Internet. In Journal of Network & Computer
Applications, Vol. 32 Issue 3, p589-598.
Malik, Z., Bouguettaya, A., 2005. Preserving trade secrets
between competitors in b2b interactions. In
International Journal of Cooperative Information
Systems, Vol.14 Issue 2-3, p265-297.
Mansfield-Devine, S., 2008. Danger in the clouds. In
Network Security, Vol. 2008 Issue 12, p9-11.
Menold, N., 2009. How to Use Information Technology
for Cooperative Work: Development of Shared
Technological Frames. In Computer Supported
Cooperative Work (CSCW), Vol. 18 Issue 1, p47-81.
Mortgage Banking, 2008. Elements of a Successful
Platform. In Mortgage Banking, Vol. 69 Issue 3, p71.
Narayanan, S., Marucheck, A.S., Handfield, R.B, 2009.
Electronic Data Interchange: Research Review and
Future Directions. In Decision Sciences, Vol. 40 Issue
1, p121-163.
Periorellis, P., 2007. Securing Web Services: Practical
Usage of Standards and Specifications, Information
Science Reference. Hershey, PA.
Saeed, K.A., Malhotra, M.K., Grover, V., 2005.
Examining the impact of interorganizational systems
on process efficiency and sourcing leverage in buyer-
supplier dyads. In Decision Sciences, Vol. 36 Issue 3,
p365-396.
Smith, M., Schmidt, M., Fallenbeck, N., Dörnemann, T.,
Schridde, C., Freisleben, B., 2009. Secure on-demand
grid computing. In Future Generation Computer
Systems, Vol. 25 Issue 3, p315-325.
Straub, D., Rai, A., Klein, R., 2004. Measuring firm
performance at the network level: a nomology of the
business impact of digital supply networks. In Journal
of Management Information Systems, Vol. 21 Issue 1,
p83-114.
Tsung-Yi, C., Yuh-Min, C., Chin-Bin, W., Hui-Chuan, C.,
2009. Flexible authorisation in dynamic e-business
environments using an organisation structure-based
access control model. In International Journal of
Computer Integrated Manufacturing, Vol. 22 Issue 3,
p225-244.
Wainer, J., Barthelmess, P., Kumar, A., 2003. W-RBAC:
A workflow security model incorporating controlled
overriding of constraints. In International Journal on
Cooperative Information Systems, Vol. 12 Issue 4,
p455-485.
Waters, J.K., 2009. Target: the web. In THE Journal, Vol.
36 Issue 2, p34-40.
Whittaker, J., Andrews, M., 2006. How to Break Web
Software: Functional And Security Testing of Web
Applications And Web Services, Addison-Wesley
Educational Publishers Inc.
Wortman, J., 2008. Seven Deadly Sins of IT Due
Diligence. In Buyouts, Vol. 21 Issue 5, p44-46.
SECRYPT 2009 - International Conference on Security and Cryptography
324