Enhancing Data Security in ERP Projects Using XML

Enhancing Data Security in ERP Projects Using XML

T. Chandrakumar, S. Parthasarathy
Copyright: © 2012 |Pages: 15
DOI: 10.4018/jeis.2012010104
(Individual Articles)
No Current Special Offers


Enterprise resource planning (ERP) is integrated packaged software, which addresses most fundamental business processing functionality across different functional areas and business units, in a single software system, with single database and accessible through a unified interface and channel of communication. Meeting security requirements for privacy, confidentiality and integrity is essential in order to move business online ERP System requires an accurate, precise and Data security in business concepts of the enterprise. The authors introduce basic features and security of ERP System using Extensible Mark-up Language (XML) technology. Traditionally, XML security has developed along two distinct though related lines of research, corresponding to two facts of the XML security notion. The first fact defines XML security as a set of security techniques (encryption, digital signature) tightly coupled with XML to maintain the main features of the XML semi-structured data model while adding to it all necessary security capabilities. In this paper we will explore XML Signature specification from W3C and its implementation in .NET.
Article Preview

Data Security In Erp

Web-based enterprise systems are based on collaborating environments that integrate business operations, partners, suppliers and employees. Enterprises are increasingly faced with the climate change challenge and with having to take measures to adapt (Pappis, 2011). With the growing security threats escalating each year achieving the balance of usability and security is getting more difficult for ERP software vendors (htpp://www.articlesbase.com/software-articles/erp-software-and-data-security).

Enterprise system features that focus on data security are gateways that focus on managing and analyzing a user profile from the sign up, data modification and end phases. The wide diffusion and usage of social networking Web sites in the last years have made publicly available a huge amount of possible sensitive information, which can be used by third-parties with purposes different from the ones of the owners of such information (Carminati, 2008). All data that has to be managed is contained within one back end application system and its database (Bussler, 2011).With respect to user experience these enterprise system security features ensure that within the enterprise system, authorized users have access to the information they need when they need it. Companies big and small are all faced with the issues of data security threats. The problem is so huge that the data security business and the resources required from businesses to address their data security issues are a significant cost burden (Brehm, 2007). Security is critical for ERP systems, as they are used in numerous industries including defense, intelligence, medical, and financial. First, we need to develop a security policy and a model for ERP systems. Many of the current systems focus on confidentiality aspects of security (WeiShe, 2007).

Complete Article List

Search this Journal:
Volume 20: 1 Issue (2024): Forthcoming, Available for Pre-Order
Volume 19: 1 Issue (2023)
Volume 18: 4 Issues (2022): 1 Released, 3 Forthcoming
Volume 17: 4 Issues (2021)
Volume 16: 4 Issues (2020)
Volume 15: 4 Issues (2019)
Volume 14: 4 Issues (2018)
Volume 13: 4 Issues (2017)
Volume 12: 4 Issues (2016)
Volume 11: 4 Issues (2015)
Volume 10: 4 Issues (2014)
Volume 9: 4 Issues (2013)
Volume 8: 4 Issues (2012)
Volume 7: 4 Issues (2011)
Volume 6: 4 Issues (2010)
Volume 5: 4 Issues (2009)
Volume 4: 4 Issues (2008)
Volume 3: 4 Issues (2007)
Volume 2: 4 Issues (2006)
Volume 1: 4 Issues (2005)
View Complete Journal Contents Listing