Security for Enterprise Resource Planning Systems

@article{She2007SecurityFE,
  title={Security for Enterprise Resource Planning Systems},
  author={Wei She and Bhavani M. Thuraisingham},
  journal={Information Systems Security},
  year={2007},
  volume={16},
  pages={152 - 163}
}
Enterprise Resource Planning (ERP) is the technology that provides the unified business function to the organization by integrating the core processes. ERP now is experiencing the transformation that will make it highly integrated, more intelligent, more collaborative, web-enabled, and even wireless. The ERP system is becoming the system with high vulnerability and high confidentiality in which the security is critical for it to operate. Many ERP vendors have already integrated their security… Expand
ERP systems and data security
TLDR
This paper introduces ERP technology regarding the data security point of view and new security solutions for ERP systems are present. Expand
Authentication Model for Enterprise Resource Planning Network
Enterprise Resource Planning (ERP) software is business-management software that allows an organization to use a system of integrated applications to manage the business. ERP software often containsExpand
Business Role Security in Enterprise Resource Planning System
Enterprise Resource Planning, a collective integrated approach for all business solutions, has been broadly accepted across various industries since 1990 as the upcoming generation of ManufacturingExpand
Enterprise Resource Planning (ERP) Systems: Emergence, Importance and Challenges
The Enterprise Resource Planning (ERP) has dawned as a tool to facilitate the flow of information and allow information sharing among different business partners. It appears as a response to theExpand
Enhancing Data Security in ERP Projects Using XML
TLDR
The authors introduce basic features and security of ERP System using Extensible Mark-up Language XML technology and explore XML Signature specification from W3C and its implementation in.NET. Expand
Homomorphic Security Automation in CloudMesh Enterprise Resource Planing Systems
ith smart process innovation in today’s industries, enterprise resource planning (ERP) systems is currently been used for hyper-scale digital automation (HDA). The major issue is data securityExpand
Enterprise Information Systems Security: A Conceptual Framework
TLDR
This paper reviews the relevant literature related to the security policies that are associated with the use of enterprise information systems within organizations and identifies four major issues which are security policy documentation, employee awareness, top management support, and access control. Expand
A Novel Security Integration for Vulnerability Avoidance in Enterprise Cloud Applications (CloudERP)
Studies have shown that some existing enterprise applications including bussiness ERPs, Social Networks, etc implements a single layer security scheme which can easily be hacked. Also, theseExpand
The Impact of the Implementation of an Enterprise Resource Planning System on a Typical Governmental Office
Enterprise Resource Planning (ERP) systems are part of Information Systems which organisations depend on when conducting business. An ERP system offers useful functionality in the smooth running ofExpand
Web-Based Enterprise Resource Planning (ERP) Systems
ERP systems is an information technology that is designed to integrate and automate all business processes and business functions of a company. This study is aimed at knowing the analysis of ERPExpand
...
1
2
3
4
5
...

References

SHOWING 1-10 OF 50 REFERENCES
Security moving from database systems to ERP systems
TLDR
It is shown that by moving the security from the database level to the ERP level, advantages by having centrally defined and maintained security rules get lost, but on the other hand it is possible to exploit WorkFlow Management techniques to define security procedures more properly, such that the "separation of duty" principle can be applied. Expand
The Evolution of ERP Systems: A Historical Perspective
ERP systems are now ubiquitous in large businesses and the current move by vendors is to repackage them for small to medium enterprises (SMEs). This migration has many consequences that have to beExpand
Security in enterprise resource planning systems and service-oriented architectures
TLDR
IT systems and applications based on security services are heterogeneous: the various individual components may be built using different technology and run in different environments, but their interaction takes place in highly dynamic environments where the composition of services can be undertaken at runtime. Expand
Enterprise resource planning: a review and a STOPE view
TLDR
This review provides a comprehensive understanding of ERP systems, including illustrating their main components and clarifying their basic and extended features, and includes a STOPE view, which illustrates the integration of ERp systems with the overall enterprise network. Expand
Enterprise resource planning: An integrative review
TLDR
A comprehensive review of the research literature (1990‐2003) concerning ERP systems is presented and proposals for future research are formulated to identify topics where fruitful opportunities exist. Expand
Observations on the role life-cycle in the context of enterprise security management
TLDR
This work proposes a life-cycle model that is based on an iterative-incremental process similar to those found in the area of software development and provides an initial discussion on such a role life- cycle, based on the experiences and observations in enterprise security management. Expand
Enterprise resource planning: componentizing the enterprise application packages
TLDR
It is observed with interest that enterprise application providers such as SAP, Peoplesoft, Oracle, Baan, JD Edwards, and many others have been investing heavily to upgrade the architecture of their applications over the past two years. Expand
Database and Applications Security: Integrating Information Security and Data Management
Supporting technologies for database and applications security. Discretionary security for database systems. Mandatory security for database systems. Multilevel secure relational database systems.Expand
Collaborative process patterns for e-Business
TLDR
This work identifies a number of problems that hinder an effective application of the Language Action approach and proposes modeling techniques and methodological guidelines that can contribute to the solution of these problems. Expand
Electronic Data Interchange and Small Organizations: Adoption and Impact of Technology
TLDR
It is suggested that EDI initiators pursue promotional efforts to improve partners' perceptions of EDI benefits, provide financial and technological assistance to partners with low organizational readiness, and carefully select and enact influence strategies to reduce resistance. Expand
...
1
2
3
4
5
...