Role-Based Access Control Models
Computer
Enterprise resource planning--breakthrough and/or term problem?
ACM SIGMIS Database
Enterprise resource planning: introduction
Communications of the ACM
Enterprise resource planning: componentizing the enterprise application packages
Communications of the ACM
Observations on the role life-cycle in the context of enterprise security management
SACMAT '02 Proceedings of the seventh ACM symposium on Access control models and technologies
ALE, EDI, & IDoc Technologies for SAP
ALE, EDI, & IDoc Technologies for SAP
Collaborative process patterns for e-Business
ACM SIGGROUP Bulletin
Security Moving from Database Systems to ERP Systems
DEXA '98 Proceedings of the 9th International Workshop on Database and Expert Systems Applications
The UCONABC usage control model
ACM Transactions on Information and System Security (TISSEC)
Selective and Authentic Third-Party Distribution of XML Documents
IEEE Transactions on Knowledge and Data Engineering
Enterprise resource planning: a review and a STOPE view
International Journal of Network Management
Security in enterprise resource planning systems and service-oriented architectures
Proceedings of the eleventh ACM symposium on Access control models and technologies
Security standards for the semantic web
Computer Standards & Interfaces
Internal control framework for a compliant ERP system
Information and Management
Hi-index | 0.00 |
Enterprise Resource Planning (ERP) is the technology that provides the unified business function to the organization by integrating the core processes. ERP now is experiencing the transformation that will make it highly integrated, more intelligent, more collaborative, web-enabled, and even wireless. The ERP system is becoming the system with high vulnerability and high confidentiality in which the security is critical for it to operate. Many ERP vendors have already integrated their security solution, which may work well internally; while in an open environment, we need new technical approaches to secure an ERP system. This paper introduces ERP technology from its evolution through architecture to its products. The security solution in ERP as well as directions for secure ERP systems is presented.