Search the World's Largest Database of Information Science & Technology Terms & Definitions
InfInfoScipedia LogoScipedia
A Free Service of IGI Global Publishing House
Below please find a list of definitions for the term that
you selected from multiple scholarly research resources.

What is Authorization Check

Handbook of Research on Threat Detection and Countermeasures in Network Security
Used to protect the transactions or data and is embedded in the program logic.
Published in Chapter:
Authentication Model for Enterprise Resource Planning Network
Wasim A. Al-Hamdani (Kentucky State University, USA)
DOI: 10.4018/978-1-4666-6583-5.ch005
Abstract
Enterprise Resource Planning (ERP) software is business-management software that allows an organization to use a system of integrated applications to manage the business. ERP software often contains highly confidential information that is vital to a firm's competitiveness, so it is critically important that appropriate security be implemented to reduce its vulnerability. In this chapter, security issues are presented that could arise when ERP software is integrated with many systems and with web environments. The security issue is one of the major issues with ERP software, and it has not been a major focus of the developers of the software, who leave this issue to different components of the system and to vendor implementation. In this chapter, The author presents a new security model for ERP software. The author also presents a new authentication model that consists of the following layers: Role base, Data mining, Risk-based access control, and PKI.
Full Text Chapter Download: US $37.50 Add to Cart
eContent Pro Discount Banner
InfoSci OnDemandECP Editorial ServicesAGOSR