Advertisement

Introduction

  • Matthieu-P. Schapranow
Chapter
Part of the In-Memory Data Management Research book series (IMDM)

Abstract

The given work addresses an organizational and a technical issue. Both are considered individually throughout my dissertation.

Keywords

Supply Chain Open Supply Chain Supply Chain Partner Electronic Product Code Security Extension 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

References

  1. 1.
    IP Crime Group, IP Crime Report, (2008)Google Scholar
  2. 2.
  3. 3.
    P.N. Newton et al., Poor quality vital anti-malarials in Africa—an urgent neglected public health priority. Malaria J. 10(1), 352 (2011)Google Scholar
  4. 4.
    J. Jenkins, P. Mills, R. Maidment, M. Profit, Pharma Traceability Bus. Case Rep. (2007)Google Scholar
  5. 5.
    Food and Drug Administration, FDA notifies health care providers about the risks of purchasing unapproved injectable cancer medications from unlicensed source (2012), http://www.fda.gov/downloads/Drugs/DrugSafety/DrugIntegrityandSupplyChainSecurity/UCM287717.pdf. Accessed 8 Mar 2012
  6. 6.
    Food and Drug Administration. Unapproved Versions of Injectable Cancer Medications Could Result in Serious Harm to Your Patients; One Counterfeit Version Found (2012), http://www.fda.gov/downloads/Drugs/DrugSafety/DrugIntegrityandSupplyChainSecurity/UCM287717.pdf. Accessed 8 Mar 2012
  7. 7.
    ICC Policy Statement. The Fight against Piracy and Counterfeiting of Intellectual Property (2003), http://www.iccwbo.org/home/intellectual_property/fight_against_piracy.pdf. Accessed 8 Mar 2012
  8. 8.
    T. Staake, F. Thiesse, E. Fleisch, Extending the EPC network: the potential of RFID in anti-counterfeiting, in Proceedings of the ACM Symposium on Applied Computing (ACM, New York, 2005) pp. 1607–1612Google Scholar
  9. 9.
    J. Müller et al., A simulation of the pharmaceutical supply chain to provide realistic test data, in Proceedings of 1st International Conference on Advances in System Simulation. IEEE, (2009)Google Scholar
  10. 10.
    European Commission, Delegated Act on the Detailed Rules for a Unique Identifier for Medical Products for Human Use and its Verification (2011), http://ec.europa.eu/health/files/counterf_par_trade/safety_2011-11.pdf. Accessed 8 Mar 2012
  11. 11.
    Bundesverband Informationswirtschaft, Telekommunikation und neue Medien. White Paper RFID Technologie, Systeme und Anwendungen (2005), http://www.bitkom.org/files/documents/White_Paper_RFID_deutsch_11.08.2005__final.pdf. Accessed 8 Mar 2012
  12. 12.
    Fosstrak, Project License (2009), http://www.fosstrak.org/epcis/license.html. Accessed 8 Mar 2012
  13. 13.
    IMPACT Secretariat at AIFA, The handbook, in Proceedings of the International Medical Products Anti-Counterfeiting, 2011, Taskforce ed. by IMPACT. Accessed 8 Mar 2012Google Scholar
  14. 14.
    M-P. Schapranow, J. Müller, A. Zeier, H. Plattner, RFID event data processing: an architecture for storing and searching, in Proceedings of the 4th International Workshop on RFID Technology—Concepts, Applications, Challenges 2010Google Scholar
  15. 15.
    A. Knöpfel, B. Gröne, P. Tabeling, Fundamental Modeling Concepts Effective Communication of IT Systems, (John, Hoboken, 2005)Google Scholar
  16. 16.
    M. Davison, Pharmaceutical Anti-Counterfeiting: Combating the Real Danger from Fake Drugs. (John, Hoboken, 2011)Google Scholar
  17. 17.
    M-P. Schapranow et al., What are Authentic Pharmaceuticals Worth? Chapter 13, (INTECH Press, 2011), pp. 203–220Google Scholar
  18. 18.
    M-P. Schapranow, M. Lorenz, A. Zeier, Ha. Plattner, License-based Access Control in EPCglobal Networks, in Proceedings of 7th European Workshop on Smart Objects: Systems, Technologies and Applications. VDE, 2011Google Scholar
  19. 19.
    Global Standards 1. EPCIS Standard 1.0.1 (2007), http://www.gs1.org/gsmp/kc/epcglobal/epcis/epcis_1_0_1-standard-20070921.pdf. Accessed 8 Mar 2012
  20. 20.
    C.C. Blance, Pharmaceutical counterfeiting: the effect of technology, regulation, and legislation on manufacturer liability. Mass Torts. 8(2), (2010)Google Scholar
  21. 21.
    F.G, Knolmayer, P. Mertens, A. Zeier, Supply Chain Management Based on SAP Systems: Architecture and Planning Processes SAP Excellence (Springer, London, 2009)Google Scholar
  22. 22.
    Federal Office for Information Security, BSI Standard 100–1: Information Security Management, System V. 1.5, (2008)Google Scholar
  23. 23.
    M-P. Schapranow, A. Zeier, H. Plattner, Security extensions for improving data security of event repositories in EPCglobal networks, in Proceedings of the 9th International Conference on Ubiquitous, Computing 2011Google Scholar
  24. 24.
    Global Standards 1. The EPCglobal Architecture Framework 1.4 (2010), http://www.gs1.org/gsmp/kc/epcglobal/architecture/architecture_1_4-framework-20101215.pdf. Accessed 8 Mar 2012
  25. 25.
    I. Sommerville, Software Engineering (Addison-Wesley, Boston, 2007)Google Scholar
  26. 26.
    Phillip A. Laplante, What Every Engineer Should Know about Software Engineering. (Taylor & Francis, New York, 2007)Google Scholar
  27. 27.
    B. Boehm, A View of 20th and 21st Century Software Engineering: ICSE 2006 Keynote Address (2006)Google Scholar
  28. 28.
    A.R. Hevner, S.T. March, J. Park, S. Ram, Design science in information systems research. MIS Q. 28(1), 75–105 (2004)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2014

Authors and Affiliations

  1. 1.Hasso Plattner InstitutePotsdamGermany

Personalised recommendations