The Challenge of Cyber Supply Chain Security to Research and Practice
The tremendous potential to assist or degrade economic and national security performance make security in the cyber supply chain a topic of critical importance. This is reflected by the tremendous activity in the public and private sector to better understand the myriad of cyber challenges, identifying existing gaps and needs and closing these gaps as quickly and firmly as possible through government policy initiatives, public/private partnerships, and legal/insurance penalty and incentive regimes. However when we examine the academic literature, the research and publications in this area are rather sparse. Consequently, this issue is intended to act as a resource to practitioners and as a call to research.
One of the main goal of any industrial company is making profit by producing high quality and competitive products. Mostly, the production of meat industry enterprises are not a complete cycle, companies are divided into farms which are specialized in cultivation of livestock and poultry, slaughters and meet processing plants. The latters are the final link in the chain of supply of animal origin raw materials. For these companies it is important to establish a procurement process so that to have a sufficient number of fresh high-quality resources for production and to minimize losses releated with forced sales, often with a discount, the damage of excessive amount of purchased raw materials and also avoid unnecessary costs associated with their storage. This problem will be discussed in this article.
Supply chain management is rather new scientific field that reflects the concept of integrated business planning. This concept should be experts and practitioners in logistics and strategic management. Today, integrated planning to become a reality thanks to the development of information technology and computer technology. At the same time to achieve a competitive advantage is not enough high-speed, low-cost data transfer process. In order to effectively apply information technology tools necessary to develop a quantitative analysis of the effectiveness of supply chain management. The mam element of this tool are optimization models that reveal the complex interactions, the wave and the synergies that arise in supply chain management. In this article we consider one of the classes of such models - the so-called dynamic models of conveyor systems, processing of applications.
This article reviews the modern approaches to the analysis of conflict situations in a supply chain. Four main areas of conflict analysis are identified and discussed in the paper: mathematical methods, hierarchical analysis, total cost modeling business processes.
According to various estimates global GDP is about 60-70 trillion dollars, at the same time the costs of logistics in the world accounts for 12 trillion dollars per year. These figures are comparable to costs associated with armaments, public health service and other important areas of human activity.
Consequently, the search of practical ways and development of effective mechanisms for reducing logistics costs is a major problem, the solving of which will improve efficiency and competitiveness of enterprises. Thus, the purpose of this paper is the development of methods and models for EOQ calculation in supply chains as well as development of matrix of decision-making for the design of new modified EOQ models, designed to optimize logistics costs of companies in supply chains.
It is well-known that the Dolev-Yao adversary is a powerful adversary. Besides acting as the network, intercepting, sending, and composing messages, he can remember as much information as he needs. That is, his memory is unbounded.
We recently proposed a weaker Dolev-Yao like adversary, which also acts as the network, but whose memory is bounded. We showed that this Bounded Memory Dolev-Yao adversary, when given enough memory, can carry out many existing protocol anomalies. In particular, the known anomalies arise for bounded memory protocols, where there is only a bounded number of concurrent sessions and the honest participants of the protocol cannot remember an unbounded number of facts nor an unbounded number of nonces at a time. This led us to the question of whether it is possible to infer an upper-bound on the memory required by the Dolev-Yao adversary to carry out an anomaly from the memory restrictions of the bounded protocol. This paper answers this question negatively (Theorem 2).
The second contribution of this paper is the formalization of Progressing Collaborative Systems that may create fresh values, such as nonces. In this setting there is no unbounded adversary, although bounded memory adversaries may be present. We prove the NP-completeness of the reachability problem for Progressing Collaborative Systems that may create fresh values.
Recent work on structure-preserving signatures studies optimality of these schemes in terms of the number of group elements needed in the verification key and the signature, and the number of pairing-product equations in the verification algorithm. While the size of keys and signatures is crucial for many applications, another important aspect to consider for performance is the time it takes to verify a given signature. By far, the most expensive operation during verification is the computation of pairings. However, the concrete number of pairings that one needs to compute is not captured by the number of pairing-product equations considered in earlier work. To fill this gap, we consider the question of what is the minimal number of pairings that one needs to compute in the verification of structure-preserving signatures. First, we prove lower bounds for schemes in the Type II setting that are secure under chosen message attacks in the generic group model, and we show that three pairings are necessary and that at most one of these pairings can be precomputed. We also extend our lower bound proof to schemes secure under random message attacks and show that in this case two pairings are still necessary. Second, we build an automated tool to search for schemes matching our lower bounds. The tool can generate automatically and exhaustively all valid structure-preserving signatures within a user-specified search space, and analyze their (bounded) security in the generic group model. Interestingly, using this tool, we find a new randomizable structure-preserving signature scheme in the Type II setting that is optimal with respect to the lower bound on the number of pairings, and also minimal with respect to the number of group operations that have to be computed during verification.
Smoking is a problem, bringing signifi cant social and economic costs to Russiansociety. However, ratifi cation of the World health organization Framework conventionon tobacco control makes it possible to improve Russian legislation accordingto the international standards. So, I describe some measures that should be taken bythe Russian authorities in the nearest future, and I examine their effi ciency. By studyingthe international evidence I analyze the impact of the smoke-free areas, advertisementand sponsorship bans, tax increases, etc. on the prevalence of smoking, cigaretteconsumption and some other indicators. I also investigate the obstacles confrontingthe Russian authorities when they introduce new policy measures and the public attitudetowards these measures. I conclude that there is a number of easy-to-implementanti-smoking activities that need no fi nancial resources but only a political will.
One of the most important indicators of company's success is the increase of its value. The article investigates traditional methods of company's value assessment and the evidence that the application of these methods is incorrect in the new stage of economy. So it is necessary to create a new method of valuation based on the new main sources of company's success that is its intellectual capital.
портовый менеджмент, показатели деятельности, анализ эффективности, система учета, распределение издержек, методы анализа деятельности портовой системы
At present many industries reveal tendency for setting up of vertically integrated companies (VIC) the structure of which unites all technological processes. This tendency proved its efficiency in oil industry where coordination of all successive stages of technological process, namely, oil prospecting and production -oil transportation - oil processing - oil chemistry - oil products and oil chemicals marketing, is necessary. The article considers specific features of introduction of "personnel management" module at enterprises of oil and gas industry.
vertically integrated companies; personnel management