Security for Enterprise Resource Planning Systems

@article{She2007SecurityFE,
  title={Security for Enterprise Resource Planning Systems},
  author={Wei She and Bhavani M. Thuraisingham},
  journal={Information Systems Security},
  year={2007},
  volume={16},
  pages={152 - 163}
}
Enterprise Resource Planning (ERP) is the technology that provides the unified business function to the organization by integrating the core processes. ERP now is experiencing the transformation that will make it highly integrated, more intelligent, more collaborative, web-enabled, and even wireless. The ERP system is becoming the system with high vulnerability and high confidentiality in which the security is critical for it to operate. Many ERP vendors have already integrated their security… 

ERP systems and data security

  • Radoslav Hrischev
  • Computer Science
    IOP Conference Series: Materials Science and Engineering
  • 2020
This paper introduces ERP technology regarding the data security point of view and new security solutions for ERP systems are present.

Authentication Model for Enterprise Resource Planning Network

This chapter presents a new security model for ERP software that consists of the following layers: Role base, Data mining, Risk-based access control, and PKI.

Enterprise Resource Planning (ERP) Systems: Emergence, Importance and Challenges

This paper is dedicated to discuss enterprise resource planning, its emergence, implementation, importance of using it within organizations and the different challenges related to its implementation.

Enhancing Data Security in ERP Projects Using XML

The authors introduce basic features and security of ERP System using Extensible Mark-up Language XML technology and explore XML Signature specification from W3C and its implementation in.NET.

Homomorphic Security Automation in CloudMesh Enterprise Resource Planing Systems

The proposed scheme improves ERP security and enhances the automation of production processes in both vertical and horizontal enterprises.

Enterprise Information Systems Security: A Conceptual Framework

This paper reviews the relevant literature related to the security policies that are associated with the use of enterprise information systems within organizations and identifies four major issues which are security policy documentation, employee awareness, top management support, and access control.

A Novel Security Integration for Vulnerability Avoidance in Enterprise Cloud Applications (CloudERP)

A Cloud based Enterprise Resource Planning System (CloudERP) is developed while reengineering a second (Layer-2) security appliance called Advanced Encryption Validation Key (AEVK) which is an authentication scheme based on Advanced MD5 Encryption (A-MD5) algorithm.

The Impact of the Implementation of an Enterprise Resource Planning System on a Typical Governmental Office

Enterprise Resource Planning (ERP) systems are part of Information Systems which organisations depend on when conducting business. An ERP system offers useful functionality in the smooth running of

Web-Based Enterprise Resource Planning (ERP) Systems

It can be concluded that there have been different opinions and responses on ERP systems performance in this company and its implementation by using Qualitative Case Study Research in a catering industry company.

A framework for efficient enterprise resource planning (ERP) implementation in technical educational institutions

The study uses a survey of 900 users in four categories in technical educational institutes in India to gain feedback in their experience of applying ERP, and identifies the success factors for efficient ERP implementation and suggests a framework for efficient implementation of ERP inTechnical educational institutions.
...

References

SHOWING 1-10 OF 50 REFERENCES

Security moving from database systems to ERP systems

It is shown that by moving the security from the database level to the ERP level, advantages by having centrally defined and maintained security rules get lost, but on the other hand it is possible to exploit WorkFlow Management techniques to define security procedures more properly, such that the "separation of duty" principle can be applied.

The Evolution of ERP Systems: A Historical Perspective

ERP systems are now ubiquitous in large businesses and the current move by vendors is to repackage them for small to medium enterprises (SMEs). This migration has many consequences that have to be

Security in enterprise resource planning systems and service-oriented architectures

IT systems and applications based on security services are heterogeneous: the various individual components may be built using different technology and run in different environments, but their interaction takes place in highly dynamic environments where the composition of services can be undertaken at runtime.

Enterprise resource planning: a review and a STOPE view

This review provides a comprehensive understanding of ERP systems, including illustrating their main components and clarifying their basic and extended features, and includes a STOPE view, which illustrates the integration of ERp systems with the overall enterprise network.

Enterprise resource planning: An integrative review

A comprehensive review of the research literature (1990‐2003) concerning ERP systems is presented and proposals for future research are formulated to identify topics where fruitful opportunities exist.

Observations on the role life-cycle in the context of enterprise security management

This work proposes a life-cycle model that is based on an iterative-incremental process similar to those found in the area of software development and provides an initial discussion on such a role life- cycle, based on the experiences and observations in enterprise security management.

Enterprise resource planning: componentizing the enterprise application packages

It is observed with interest that enterprise application providers such as SAP, Peoplesoft, Oracle, Baan, JD Edwards, and many others have been investing heavily to upgrade the architecture of their applications over the past two years.

Database and Applications Security: Integrating Information Security and Data Management

Supporting technologies for database and applicationsSecurity, data warehousing, data mining, security, and privacy.

Collaborative process patterns for e-Business

This work identifies a number of problems that hinder an effective application of the Language Action approach and proposes modeling techniques and methodological guidelines that can contribute to the solution of these problems.

Electronic Data Interchange and Small Organizations: Adoption and Impact of Technology

It is suggested that EDI initiators pursue promotional efforts to improve partners' perceptions of EDI benefits, provide financial and technological assistance to partners with low organizational readiness, and carefully select and enact influence strategies to reduce resistance.