{"title":"Security in value added networks-security requirements for EDI","authors":"B. Jerman-Blazic","doi":"10.1109/ITS.1990.175628","DOIUrl":null,"url":null,"abstract":"The author describes the security requirements for the electronic data interchange (EDI) service. The existing security services and mechanisms of X.400 are evaluated in view of the EDI security requirement. Specific security services which appear to be a necessary part of the EDI model are briefly described. The work presented is based on the security concepts in the ISO/IEC JTC1/SWG-EDI documents.<<ETX>>","PeriodicalId":405932,"journal":{"name":"SBT/IEEE International Symposium on Telecommunications","volume":"26 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1990-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"SBT/IEEE International Symposium on Telecommunications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ITS.1990.175628","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
The author describes the security requirements for the electronic data interchange (EDI) service. The existing security services and mechanisms of X.400 are evaluated in view of the EDI security requirement. Specific security services which appear to be a necessary part of the EDI model are briefly described. The work presented is based on the security concepts in the ISO/IEC JTC1/SWG-EDI documents.<>