{"title":"增值网络中的安全——EDI的安全要求","authors":"B. Jerman-Blazic","doi":"10.1109/ITS.1990.175628","DOIUrl":null,"url":null,"abstract":"The author describes the security requirements for the electronic data interchange (EDI) service. The existing security services and mechanisms of X.400 are evaluated in view of the EDI security requirement. Specific security services which appear to be a necessary part of the EDI model are briefly described. The work presented is based on the security concepts in the ISO/IEC JTC1/SWG-EDI documents.<<ETX>>","PeriodicalId":405932,"journal":{"name":"SBT/IEEE International Symposium on Telecommunications","volume":"26 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1990-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Security in value added networks-security requirements for EDI\",\"authors\":\"B. Jerman-Blazic\",\"doi\":\"10.1109/ITS.1990.175628\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The author describes the security requirements for the electronic data interchange (EDI) service. The existing security services and mechanisms of X.400 are evaluated in view of the EDI security requirement. Specific security services which appear to be a necessary part of the EDI model are briefly described. The work presented is based on the security concepts in the ISO/IEC JTC1/SWG-EDI documents.<<ETX>>\",\"PeriodicalId\":405932,\"journal\":{\"name\":\"SBT/IEEE International Symposium on Telecommunications\",\"volume\":\"26 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1990-09-03\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"SBT/IEEE International Symposium on Telecommunications\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ITS.1990.175628\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"SBT/IEEE International Symposium on Telecommunications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ITS.1990.175628","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Security in value added networks-security requirements for EDI
The author describes the security requirements for the electronic data interchange (EDI) service. The existing security services and mechanisms of X.400 are evaluated in view of the EDI security requirement. Specific security services which appear to be a necessary part of the EDI model are briefly described. The work presented is based on the security concepts in the ISO/IEC JTC1/SWG-EDI documents.<>