Development and Application of EDI-DT System
|
|
- Daniel Ball
- 8 years ago
- Views:
Transcription
1 DEVELOPMENT AND APPLICATIONS OF EDI-DT SYSTEM Development and Application of EDI-DT System Guangming WANG, Guiyi WEI College of Computer and Information Engineering, Hangzhou University of Commerce, ABSTRACT: EDI is an important type of B2B electronic commerce practices. Basing on the result of a successful national research program on EDI, the paper presents the development philosophy and applications of an EDI system focusing on domestic trading. The techniques utilized to achieve high adaptability and flexibility, and the measures adopted to insure high security are discussed in detail. Key Words: EDI; UN/EDIFACT; domestic trading; business forms 1. Fundamentals of EDI-DT EDI (electronic data interchange) is an important type of B2B electronic commerce practices worldwide. Chinese government set up a key research program series on EDI (96-A20) during the last five year s planning involving international trading, domestic trading, commodity inspection, customs, etc. The above works have been done successfully, and have passed the national evaluation earlier As a part of the above program (96-A20-03), and basing on wide investigation and analysis, the authors and their research team have determined work flow of domestic trading, a set of standard business forms for it, and have developed a EDI system for domestic trading (EDI-DT). EDI-DT System has been adapted for daily operation by a number of companies in Shanghai and Hangzhou. The paper here presents the ideas and techniques utilized to achieve high adaptability and flexibility for EDI-DT, and the measures adopted to insure high security to realize system s high vitality. 2. High Flexibility and Adaptability Although some business forms have been defined during the period of system development, new forms are possibly required in the future, and the appearance of existent forms could be reshaped for different users, it is important to make EDI-DT flexible and adaptable to keep the system alive longer. The ability for customers to define new types of business forms and the ability to change the form of existent forms interactively without program rewriting are the techniques adapted by EDI-DT, and the ability for customers to redefine data dictionary therefore to guarantee correct form translation automatically without programmers' help is also realized. 2.1 Defining New Types Of Business Forms By selecting the menu item Setting of Business Forms users could define new types of business forms. Considering some data items, even a big share of data are possibly identical between two different forms, the system provides customers options to develop a new type of form starting from scratch, or picking up an existent form as template. This ability not only raises the flexibility and adaptability, but also speeds up system development because program coding and business form defining could be done parallelly.
2 DEVELOPMENT AND APPLICATIONS OF EDI-DT SYSTEM Redefining of Forms' Appearances Each business form consists of two documents: master and slave, which are related by compound key of form series number, form date, supplier ID code and demander ID code. User may decide which document to be updated or both. Redefining could be happened on the structure and shape of the form, font selection, character size and color setting, etc. In addition, the printing format of forms could also be readjusted according to users wish without programmers' help. 2.3 Adaptability of Message Translation In EDI-DT system business documents (for example, an order) are transferred from one place to another business partner in a precisely predefined data stream complied with UN/EDIFACT standards. Special measurements must be taken to make the translation module still workable when a new type of forms has been defined or the interfaces of existent forms have been changed. The technique of data dictionary is therefore used. Each type of forms has a related dictionary, in which each record corresponds to one simple data element of the form, showing its UN/EDIFACT s code, statement ordinal number, its position in the statement, etc. Translation will be done automatically according to the dictionary contents. It is required to create a new data dictionary or modify the corresponding one whenever a new type of form has been created or an old one has been changed. In many cases a closely similar template of dictionary is provided to users for updating reference, therefore, most of users will be able to update dictionaries after training, which is not a hard job, and the high adaptability of message translation is therefore achieved 3. Communication The EDI communication mode could be in one of the following ways: PTP(point to point), VAN(value added network) equipped with X.400, and Internet/intranet. Communication for EDI-DT is based on VAN obeyed with X.400 (picture 1).
3 DEVELOPMENT AND APPLICATIONS OF EDI-DT SYSTEM 国 家 EDI 服 务 中 心 x.400 x.435 国 际 EDI 其 它 省 市 EDI 服 务 中 心 x.25+ x.400 CHINAEDI 大 型 EDI 用 户 本 地 EDI 服 务 中 心 DDN 本 地 PSTN 大 型 EDI 用 户 一 般 EDI 用 户 一 般 EDI 用 户 Picture 1 EDI Communication Mode Picture 1 EDI Communication Mode The EDI center uses EDISwitch developed by GEIS company, it provides Intercept-Connect for client communication. The model is referenced by means of "esconnec my_para.par my_sta.sta'. Here, my_para.par is a parameter file containing all the information for communication port initialization and operations (such as sending, receiving message, updating transaction password, etc) for this connection. My_sta.sta is a status file, into which all the information about successfulness of the connection, receiving and sending messages will be written after the connection has been done. The system may judge the consequences of the connection and related operations. 4. Security of EDI-DT To make EDI transactions highly reliable some secure measurements must be taken to avoid disavowing, unauthorized interception and interpolation. Encryption/decryption and digital signature are used to achieve the above goal. Here, the EDI center acts as certificate authority, provides each registered user a pair of keys (a private and a public), and the public key of EDI center is open to all of users. Let us use M to represent the message to be sent over network, Kpuba, Kpria to represent the public and private key of user A, and Enc, Dec, H to represent the action of encryption, decryption and one way hash transform respectively, and use C for EDI center. Then Enc(H(M))Ppria means perform HASH transfer first, and then make encryption with the private key of B. Now secure message T transfer from A to B through C would be described as below.
4 DEVELOPMENT AND APPLICATIONS OF EDI-DT SYSTEM B:public Random Key(RK) Random Key(RK) Random Key PlainText PlainText Symmentric Text Text Internet Hash Func Digest Digital A:private s Pic 2 and Secure Text Transfer B:private Random Key Random Key(RK) Internet Text -- Text Symmentric PlainText Hash Func Digest Digital A:public Same? Digest' No Yes Verified Verification Failed Pic 3 Secure Text Receiving a. A sends a request R signed with Kpria to C requesting communication with B; b. After receiving the request C performs Enc on it with Kpuba, verifies the result; then signs Kpubb with Kpric, then performs Enc with Kpuba, and then sends the result to A; C does Enc on Ppuba with Ppric, Enc with Ppubb, and then sends the result to B; c. After receiving above message from C, A applies Dec with Ppria, then performs Dec with Ppubc, after verifying A obtains Ppub; d. A performs Enc(M) Kr, here Kr is a randomly generated key, Enc(Kr) Ppubb, applies Enc(H(M)) Ppria to generate A's signature, finally, sends Enc(M) Kr, Enc(Kr) Ppubb, and Enc(H(M)) Ppria to B; The picture 2 shows the above work flow; e. After receiving message from A, B performs reverse transfer described in picture 3. A may verify is the message received from is actually sent by A and without interpolation. Here, you may see that business document T (which could be long) is encrypted by using symmetric algorithm (which is fast), and the signature is realized by means of asymmetric encryption/decryption algorithm (which is relatively slow, but higher
5 DEVELOPMENT AND APPLICATIONS OF EDI-DT SYSTEM reliable). Hash is a one-way function turning T with variable length into a short and fixed length text for signature generation. The combination use of symmetrical and asymmetrical encryption technique is a good practice to achieve high security and efficiency. 5. Applications of EDI-DT The system has been used in Shanghai and Hangzhou in scale. Shanghai Lianhua Supermarket Group, Hangzhou Beida Department Store have adapted the system to exchange business documents on line with a number of their business partners. The business scope includes price asking, price reporting, ordering, ordering confirming, delivery noticing, delivery listing, etc. It makes the ordering practices, previously secrete, more regulated and open-eyed. Besides, due to a special characteristic provided by the system: manufacturers are able to examine dynamic movement of the goods supplied by them on line, they may reduce the number of sales persons dispatched previously in the department stores selling their products. It improves economic efficiency greatly. Furthermore, EDI-DT supports department stores to switch from two stage ordering to centralized ordering, which is considered one helpful approach to enhance enterprise competitive capability in the case of China is going to join WTO. Basing on the performances described above, the system was passed national checking and accepting, and technical appraisal separately in the year Further Work Much work has to be done in the future. Beside of expanding the business circle using EDI-DT, it is wise to develop new EDI system on Internet, due to the fact that XML (expansible markup language) supports additional capabilities in data type definition, display and linking abilities, making information exchange easier between web pages and databases. Developing XML/EDI applications is the preferable choice. REFERENCES 1. Guangming WANG, EDI Research and EDI development in domestic trading, Business Economics and Administration, Guangming WANG, Tang YONG, Principles of EDI Client System--Realization of Message Translation and Packing, Computer Engineering and Design, GE Information Services,Enterprise System and EDISwitch Administration and Support Guide,GE Information Services,Inc,USA, Robert L. Sullivan,Electronic Commerce with EDI,Twain, Inc., Jan C.A.VAN DER LUBBE, Basic Methods of ography, Cambridge University Press, Digital Standard, NISTCSL bulletin, Nov Guiyi WEI, Guangming WANG, Communication Security for Internet based MIS, Proceeding of 14 th National MIS conference, Ming WANG, Guangming WANG, Security and Digital for EDI System, Proceeding of 14 th National MIS conference,
6 DEVELOPMENT AND APPLICATIONS OF EDI-DT SYSTEM Guangming WANG Male, Born in 1945, Professor, Hangzhou University of Commerce Director of Institute of Information Engineering and Electronic Commerce Deputy chairman, Provincial Expert Group on Information Progress 1968, graduated from Qinghua University with bachelor degree, majored in electrical engineering , graduated from Polytechnic University of New York, USA, with master degree, majored in computer science , university lecturer, computer science, Governors State University, USA , technician in factories and mine 1980-present, lecturer, associate professor, professor, Hangzhou University of Commerce Guiyi Wei Male, Born in 1972, Instructor, Hangzhou University of Commerce 1973, Graduated from Hangzhou University of Commerce with bachelor degree, majored in MIS graduated from Hangzhou University of Commerce with Master degree, majored in economic information management
ELECTRONIC COMMERCE OBJECTIVE QUESTIONS
MODULE 13 ELECTRONIC COMMERCE OBJECTIVE QUESTIONS There are 4 alternative answers to each question. One of them is correct. Pick the correct answer. Do not guess. A key is given at the end of the module
More informationA Digital Signature Scheme in Web-based Negotiation Support System
A Digital Signature Scheme in Web-based Negotiation Support System Yuxuan Meng 1 and Bo Meng 2 1 Department of Computer Science, University of Saskatchewan, Saskatoon, Saskatchewan, S7N 5C9, Canada yxmeng68@yahoo.ca
More informationNetwork Security. Computer Networking Lecture 08. March 19, 2012. HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23
Network Security Computer Networking Lecture 08 HKU SPACE Community College March 19, 2012 HKU SPACE CC CN Lecture 08 1/23 Outline Introduction Cryptography Algorithms Secret Key Algorithm Message Digest
More informationCIS 6930 Emerging Topics in Network Security. Topic 2. Network Security Primitives
CIS 6930 Emerging Topics in Network Security Topic 2. Network Security Primitives 1 Outline Absolute basics Encryption/Decryption; Digital signatures; D-H key exchange; Hash functions; Application of hash
More informationHow encryption works to provide confidentiality. How hashing works to provide integrity. How digital signatures work to provide authenticity and
How encryption works to provide confidentiality. How hashing works to provide integrity. How digital signatures work to provide authenticity and non-repudiation. How to obtain a digital certificate. Installing
More informationCEFACT AD HOC WORKING GROUP ON SIMPL-EDI AND FORMS AND WEB BASED EDI (SIMAC) Proposal for a UN Repository for XML/EDI
5 June 1998 CEFACT AD HOC WORKING GROUP ON SIMPL-EDI AND FORMS AND WEB BASED EDI (SIMAC) Proposal for a UN Repository for XML/EDI SOURCE: Dick Raman STATUS: CONTRIBUTION ACTION: FOR DISCUSSION page 2.
More informationChapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography
Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography What Is Steganography? Steganography Process of hiding the existence of the data within another file Example:
More informationCS 348: Computer Networks. - Security; 30 th - 31 st Oct 2012. Instructor: Sridhar Iyer IIT Bombay
CS 348: Computer Networks - Security; 30 th - 31 st Oct 2012 Instructor: Sridhar Iyer IIT Bombay Network security Security Plan (RFC 2196) Identify assets Determine threats Perform risk analysis Implement
More informationThe Mathematics of the RSA Public-Key Cryptosystem
The Mathematics of the RSA Public-Key Cryptosystem Burt Kaliski RSA Laboratories ABOUT THE AUTHOR: Dr Burt Kaliski is a computer scientist whose involvement with the security industry has been through
More informationSecure Network Communications FIPS 140 2 Non Proprietary Security Policy
Secure Network Communications FIPS 140 2 Non Proprietary Security Policy 21 June 2010 Table of Contents Introduction Module Specification Ports and Interfaces Approved Algorithms Test Environment Roles
More informationLecture 6 - Cryptography
Lecture 6 - Cryptography CSE497b - Spring 2007 Introduction Computer and Network Security Professor Jaeger www.cse.psu.edu/~tjaeger/cse497b-s07 Question 2 Setup: Assume you and I don t know anything about
More informationClient Server Registration Protocol
Client Server Registration Protocol The Client-Server protocol involves these following steps: 1. Login 2. Discovery phase User (Alice or Bob) has K s Server (S) has hash[pw A ].The passwords hashes are
More informationOOo Digital Signatures. Malte Timmermann Technical Architect Sun Microsystems GmbH
OOo Digital Signatures Malte Timmermann Technical Architect Sun Microsystems GmbH About the Speaker Technical Architect in OpenOffice.org/StarOffice development OOo/StarOffice developer since 1991/94 Main
More informationCSCE 465 Computer & Network Security
CSCE 465 Computer & Network Security Instructor: Dr. Guofei Gu http://courses.cse.tamu.edu/guofei/csce465/ Public Key Cryptogrophy 1 Roadmap Introduction RSA Diffie-Hellman Key Exchange Public key and
More informationBy Koji MIYAUCHI* ABSTRACT. XML is spreading quickly as a format for electronic documents and messages. As a consequence,
Falsification Prevention and Protection Technologies and Products XML Signature/Encryption the Basis of Web Services Security By Koji MIYAUCHI* XML is spreading quickly as a format for electronic documents
More informationSales CRM Customer Relation Management System. Presented By: Chattary Ajwan Infotech Pvt. Ltd
Customer Relation Management System Presented By: Chattary Ajwan Infotech Pvt. Ltd Objective To provide Platform to Sales Team to improve Performance in every activities done at the time dealing with customers.
More informationPGP - Pretty Good Privacy
I should be able to whisper something in your ear, even if your ear is 1000 miles away, and the government disagrees with that. -- Philip Zimmermann PGP - Pretty Good Privacy - services - message format
More informationSoftware Tool for Implementing RSA Algorithm
Software Tool for Implementing RSA Algorithm Adriana Borodzhieva, Plamen Manoilov Rousse University Angel Kanchev, Rousse, Bulgaria Abstract: RSA is one of the most-common used algorithms for public-key
More informationNetwork Security. Security Attacks. Normal flow: Interruption: 孫 宏 民 hmsun@cs.nthu.edu.tw Phone: 03-5742968 國 立 清 華 大 學 資 訊 工 程 系 資 訊 安 全 實 驗 室
Network Security 孫 宏 民 hmsun@cs.nthu.edu.tw Phone: 03-5742968 國 立 清 華 大 學 資 訊 工 程 系 資 訊 安 全 實 驗 室 Security Attacks Normal flow: sender receiver Interruption: Information source Information destination
More informationHW/Lab 1: Email Security with PGP, and Crypto CS 336/536: Computer Network Security DUE 09/28/2015 (11am)
HW/Lab 1: Email Security with PGP, and Crypto CS 336/536: Computer Network Security DUE 09/28/2015 (11am) This HW/Lab assignment covers Lectures 2 to 4. Please review these thoroughly before starting to
More informationSavitribai Phule Pune University
Savitribai Phule Pune University Centre for Information and Network Security Course: Introduction to Cyber Security / Information Security Module : Pre-requisites in Information and Network Security Chapter
More informationCryptography & Network Security
Cryptography & Network Security Lecture 1: Introduction & Overview 2002. 3. 27 chlim@sejong.ac.kr Common Terms(1) Cryptography: The study of mathematical techniques related to aspects of information security
More informationPart I. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai 2001. Siemens AG 2001, ICN M NT
Part I Contents Part I Introduction to Information Security Definition of Crypto Cryptographic Objectives Security Threats and Attacks The process Security Security Services Cryptography Cryptography (code
More informationVoteID 2011 Internet Voting System with Cast as Intended Verification
VoteID 2011 Internet Voting System with Cast as Intended Verification September 2011 VP R&D Jordi Puiggali@scytl.com Index Introduction Proposal Security Conclusions 2. Introduction Client computers could
More informationMathematical Model Based Total Security System with Qualitative and Quantitative Data of Human
Int Jr of Mathematics Sciences & Applications Vol3, No1, January-June 2013 Copyright Mind Reader Publications ISSN No: 2230-9888 wwwjournalshubcom Mathematical Model Based Total Security System with Qualitative
More informationLecture 31 SSL. SSL: Secure Socket Layer. History SSL SSL. Security April 13, 2005
Lecture 31 Security April 13, 2005 Secure Sockets Layer (Netscape 1994) A Platform independent, application independent protocol to secure TCP based applications Currently the most popular internet crypto-protocol
More informationIntroduction to Computer Security
Introduction to Computer Security Hash Functions and Digital Signatures Pavel Laskov Wilhelm Schickard Institute for Computer Science Integrity objective in a wide sense Reliability Transmission errors
More informationHow To Encrypt Data With Encryption
USING ENCRYPTION TO PROTECT SENSITIVE INFORMATION Commonwealth Office of Technology Security Month Seminars Alternate Title? Boy, am I surprised. The Entrust guy who has mentioned PKI during every Security
More informationE-business Management System Based on Coordinated Center for Dealer
The Fourth International Conference on Electronic Business (ICEB2004) / Beijing 533 E-business Based on Coordinated Center for Dealer Ding Zhang 1, Jingwen An 1, Zhongqing Cheng 2 1 School of Management,
More informationChapter 10. Network Security
Chapter 10 Network Security 10.1. Chapter 10: Outline 10.1 INTRODUCTION 10.2 CONFIDENTIALITY 10.3 OTHER ASPECTS OF SECURITY 10.4 INTERNET SECURITY 10.5 FIREWALLS 10.2 Chapter 10: Objective We introduce
More informationTrustKey Tool User Manual
TrustKey Tool User Manual 1 Table of Contents 1 Introduction... 5 2 TrustKey Product...6 2.1 TrustKey Tool... 6 2.2 TrustKey function modules...7 2.3 TrustKey using environment...7 3 TrustKey Tool Installation...
More informationEncryption Mechanism Software Requirement Specifications changed to Dokumentation Version 1.3.0
Encryption Mechanism Software Requirement Specifications changed to Dokumentation Version 1.3.0 Page 1 of 13 Table of Contents 1. Introduction... 3 2. System work flow and terminology... 3 3. User Descriptions...
More informationMessage Authentication Codes
2 MAC Message Authentication Codes : and Cryptography Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 28 October 2013 css322y13s2l08, Steve/Courses/2013/s2/css322/lectures/mac.tex,
More informationAn approach of detecting structure emergence of regional complex network of entrepreneurs: simulation experiment of college student start-ups
An approach of detecting structure emergence of regional complex network of entrepreneurs: simulation experiment of college student start-ups Abstract Yan Shen 1, Bao Wu 2* 3 1 Hangzhou Normal University,
More informationModule 8. Network Security. Version 2 CSE IIT, Kharagpur
Module 8 Network Security Lesson 2 Secured Communication Specific Instructional Objectives On completion of this lesson, the student will be able to: State various services needed for secured communication
More informationCryptography and Network Security
Cryptography and Network Security Spring 2012 http://users.abo.fi/ipetre/crypto/ Lecture 9: Authentication protocols, digital signatures Ion Petre Department of IT, Åbo Akademi University 1 Overview of
More informationE-commerce. Security. Learning objectives. Internet Security Issues: Overview. Managing Risk-1. Managing Risk-2. Computer Security Classifications
Learning objectives E-commerce Security Threats and Protection Mechanisms. This lecture covers internet security issues and discusses their impact on an e-commerce. Nov 19, 2004 www.dcs.bbk.ac.uk/~gmagoulas/teaching.html
More informationIntroduction to E-commerce
i Zheng Qin Introduction to E-commerce With 98 figures Springer Contents Part 1 Fundamentals 1 Fundamentals of E-commerce 3 1.1 The Origin and Development of E-commerce 4 1.1.1 The Origin and Development
More informationCertificate Authorities and Public Keys. How they work and 10+ ways to hack them.
Certificate Authorities and Public Keys How they work and 10+ ways to hack them. -- FoxGuard Solutions Www.FoxGuardSolutions.com melkins@foxguardsolutions.com Version.05 9/2012 1 Certificate Use Overview
More informationDigital Signatures on iqmis User Access Request Form
Digital Signatures on iqmis User Access Request Form When a user clicks in the User Signature block on the iqmis Access Form, the following window appears: Click Save a Copy and rename it with your name,
More informationSMPTE Standards Transition Issues for NIST/FIPS Requirements v1.1
SMPTE Standards Transition Issues for NIST/FIPS Requirements v1.1 Contents 2010.8.23 DRM inside, Taehyun Kim ETRI, Kisoon Yoon 1 Introduction NIST (National Institute of Standards and Technology) published
More informationB U S I N E S S G U I D E
VeriSign Microsoft Office/Visual Basic for Applications (VBA) Code Signing Digital Certificates Realizing the Possibilities of Internet Software Distribution CONTENTS + What Is Developer Code Signing?
More informationSecureMessageRecoveryandBatchVerificationusingDigitalSignature
Global Journal of Computer Science and Technology: F Graphics & Vision Volume 14 Issue 4 Version 1.0 Year 2014 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals
More informationProject #2: Secure Email System Due: Tues, November 29 th in class
Project #2: Secure Email System Due: Tues, November 29 th in class (CAETE students may email their project to Martin) As advertised, in this project you will provide a secure email system for use within
More informationPROXKey Tool User Manual
PROXKey Tool User Manual 1 Table of Contents 1 Introduction...4 2 PROXKey Product... 5 2.1 PROXKey Tool... 5 2.2 PROXKey function modules...6 2.3 PROXKey using environment...6 3 PROXKey Tool Installation...7
More informationDr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010
CS 494/594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010 1 Introduction to Cryptography What is cryptography?
More informationFIPS 140-2 SECURITY POLICY FOR
FIPS 140-2 SECURITY POLICY FOR SPECTRAGUARD ENTERPRISE SERVER August 31, 2011 FIPS 140-2 LEVEL-1 SECURITY POLICY FOR AIRTIGHT NETWORKS SPECTRAGUARD ENTERPRISE SERVER 1. Introduction This document describes
More informationComputer Networks. Network Security and Ethics. Week 14. College of Information Science and Engineering Ritsumeikan University
Computer Networks Network Security and Ethics Week 14 College of Information Science and Engineering Ritsumeikan University Security Intro for Admins l Network administrators can break security into two
More informationThree attacks in SSL protocol and their solutions
Three attacks in SSL protocol and their solutions Hong lei Zhang Department of Computer Science The University of Auckland zhon003@ec.auckland.ac.nz Abstract Secure Socket Layer (SSL) and Transport Layer
More informationKy Vu DeVry University, Atlanta Georgia College of Arts & Science
Ky Vu DeVry University, Atlanta Georgia College of Arts & Science Table of Contents - Objective - Cryptography: An Overview - Symmetric Key - Asymmetric Key - Transparent Key: A Paradigm Shift - Security
More informationPGP Encryption Software
PGP Encryption Software Shuhan Wang Technology, Communication and Transport Degree Programme in Information Technology 2014 Abstract of Thesis Technology, Communication and Transport Degree Programme in
More informationKey Management Interoperability Protocol (KMIP)
(KMIP) Addressing the Need for Standardization in Enterprise Key Management Version 1.0, May 20, 2009 Copyright 2009 by the Organization for the Advancement of Structured Information Standards (OASIS).
More informationFeature and Technical
BlackBerry Mobile Voice System for SIP Gateways and the Avaya Aura Session Manager Version: 5.3 Feature and Technical Overview Published: 2013-06-19 SWD-20130619135120555 Contents 1 Overview...4 2 Features...5
More informationCryptosystems. Bob wants to send a message M to Alice. Symmetric ciphers: Bob and Alice both share a secret key, K.
Cryptosystems Bob wants to send a message M to Alice. Symmetric ciphers: Bob and Alice both share a secret key, K. C= E(M, K), Bob sends C Alice receives C, M=D(C,K) Use the same key to decrypt. Public
More informationFixity Checks: Checksums, Message Digests and Digital Signatures Audrey Novak, ILTS Digital Preservation Committee November 2006
Fixity Checks: Checksums, Message Digests and Digital Signatures Audrey Novak, ILTS Digital Preservation Committee November 2006 Introduction: Fixity, in preservation terms, means that the digital object
More informationMETI s Program for Efficient Distribution and Logistics - focusing on the use of information technology -
METI s Program for Efficient Distribution and Logistics - focusing on the use of information technology - Distribution and Logistics Policy Division Ministry of Economy, Trade and Industry 1 Contents 1.
More informationAS2 AND EDI OVER THE INTERNET FAQ
AS2 AND EDI OVER THE INTERNET FAQ A SoftCare EC Inc. White Paper ABOUT SOFTCARE Founded in 1989 and headquartered in British Columbia, SoftCare EC Inc. develops e-business software. Our OpenEC product
More information12/8/2015. Review. Final Exam. Network Basics. Network Basics. Network Basics. Network Basics. 12/10/2015 Thursday 5:30~6:30pm Science S-3-028
Review Final Exam 12/10/2015 Thursday 5:30~6:30pm Science S-3-028 IT443 Network Security Administration Instructor: Bo Sheng True/false Multiple choices Descriptive questions 1 2 Network Layers Application
More informationGuide to Data Field Encryption
Guide to Data Field Encryption Contents Introduction 2 Common Concepts and Glossary 3 Encryption 3 Data Field Encryption 3 Cryptography 3 Keys and Key Management 5 Secure Cryptographic Device 7 Considerations
More informationISM/ISC Middleware Module
ISM/ISC Middleware Module Lecture 13: Security for Middleware Applications Dr Geoff Sharman Visiting Professor in Computer Science Birkbeck College Geoff Sharman Sept 07 Lecture 13 Aims to: 2 Show why
More informationUsing etoken for SSL Web Authentication. SSL V3.0 Overview
Using etoken for SSL Web Authentication Lesson 12 April 2004 etoken Certification Course SSL V3.0 Overview Secure Sockets Layer protocol, version 3.0 Provides communication privacy over the internet. Prevents
More informationXML Encryption Syntax and Processing. Duan,Limiao 07,12,2006
XML Encryption Syntax and Processing Duan,Limiao 07,12,2006 Agenda Introduction Encryption Overview and Examples - An XML Element - XML Element Content (Elements) - XML Element Content (Character Data)
More informationMultifactor Graphical Password Authentication System using Sound Signature and Handheld Device
Multifactor Graphical Password Authentication System using Sound Signature and Handheld Device Jyoti Rao *1,Kishan Mistry #2, Bhumika Mistry #3, Divya Malviya #4, Devesh Gudway #5 # Student & Department
More informationSecuring your Microsoft Internet Information Services (MS IIS) Web Server with a thawte Digital Certificate thawte thawte thawte thawte thawte 10.
Securing your Microsoft Internet Information Services (MS IIS) Web Server with a thawte Digital Certificate A STEP-BY-STEP GUIDE to test, install and use a thawte Digital Certificate on your MS IIS Web
More informationLukasz Pater CMMS Administrator and Developer
Lukasz Pater CMMS Administrator and Developer EDMS 1373428 Agenda Introduction Why do we need asymmetric ciphers? One-way functions RSA Cipher Message Integrity Examples Secure Socket Layer Single Sign
More informationAS DNB banka. DNB Link specification (B2B functional description)
AS DNB banka DNB Link specification (B2B functional description) DNB_Link_FS_EN_1_EXTSYS_1_L_2013 Table of contents 1. PURPOSE OF THE SYSTEM... 4 2. BUSINESS PROCESSES... 4 2.1. Payment for goods and services...
More informationLatticeXP2 Configuration Encryption and Security Usage Guide
April 2013 Introduction Technical Note TN1142 Unlike a volatile FPGA, which requires an external boot-prom to store configuration data, the LatticeXP2 devices are non-volatile and have on-chip configuration
More informationNETWORK SECURITY. Farooq Ashraf. Department of Computer Engineering King Fahd University of Petroleum and Minerals Dhahran 31261, Saudi Arabia
NETWORK SECURITY Farooq Ashraf Department of Computer Engineering King Fahd University of Petroleum and Minerals Dhahran 31261, Saudi Arabia O u t l i n e o f t h e P r e s e n t a t i o n What is Security
More informationSteganos Secure E-Mail Step by Step Instructions. Introduction STEP 1: INSTALLATION
Steganos Secure E-Mail Step by Step Instructions Introduction Although more and more PC users learn that an e-mail can be read by a third party as easily as a postcard, e-mail encryption is still quite
More informationAdvanced Authentication
White Paper Advanced Authentication Introduction In this paper: Introduction 1 User Authentication 2 Device Authentication 3 Message Authentication 4 Advanced Authentication 5 Advanced Authentication is
More informationUsing ASP-Based Message Encryption Project To Teach Information Security Concepts
Using ASP-Based Message Encryption Project To Teach Information Security Concepts Qidong Cao College of Business Administration, Winthrop University Rock Hill, SC 29733, USA caoq@winthrop.edu John S. Davis
More informationSecure Email. SOFTWAR INC. PO Box 325 Manquin, VA 23106 Information Security
Secure Email SOFTWAR INC. PO Box 325 Manquin, VA 23106 Information Security Softwar Choctaw Secure Email Application 2015 Softwar Inc. all rights reserved. CHOCTAW Secure Email application Choctaw provides
More informatione-business Frameworks based on MDA
e-business Frameworks based on MDA Haeng-Kon Kim Abstract In this paper, we survey and analyze the actual conditions of EDI system for B2B business of transport companies in Korea. As the result of our
More informationAN IMPLEMENTATION OF HYBRID ENCRYPTION-DECRYPTION (RSA WITH AES AND SHA256) FOR USE IN DATA EXCHANGE BETWEEN CLIENT APPLICATIONS AND WEB SERVICES
HYBRID RSA-AES ENCRYPTION FOR WEB SERVICES AN IMPLEMENTATION OF HYBRID ENCRYPTION-DECRYPTION (RSA WITH AES AND SHA256) FOR USE IN DATA EXCHANGE BETWEEN CLIENT APPLICATIONS AND WEB SERVICES Kalyani Ganesh
More informationCHAPTER 1 INTRODUCTION
CHAPTER 1 INTRODUCTION 1.0 Introduction Voice over Internet Protocol (VoIP) is the most popular in telecommunication technology. Nowadays, three million users use VoIP. It is estimated that the number
More informationMicrosoft Dynamics TM NAV 5.00. Installation & System Management: Employee Portal for Microsoft Dynamics NAV
Microsoft Dynamics TM NAV 5.00 Installation & System Management: Employee Portal for Microsoft Dynamics NAV INSTALLATION AND SYSTEM MANAGEMENT: EMPLOYEE PORTAL FOR MICROSOFT DYNAMICS NAV Information
More informationEntrust Managed Services PKI. Getting started with digital certificates and Entrust Managed Services PKI. Document issue: 1.0
Entrust Managed Services PKI Getting started with digital certificates and Entrust Managed Services PKI Document issue: 1.0 Date of issue: May 2009 Copyright 2009 Entrust. All rights reserved. Entrust
More informationAuditing Encryption in Oracle Databases
Auditing Encryption in Oracle Databases Prepared and presented by: Tanya Baccam SANS Institute Senior Certified Instructor CPA, CITP, CISSP, CISA, CISM, GSEC, GPPA, GCIH, OCP DBA Baccam Consulting LLC
More informationPulse Secure, LLC. January 9, 2015
Pulse Secure Network Connect Cryptographic Module Version 2.0 Non-Proprietary Security Policy Document Version 1.1 Pulse Secure, LLC. January 9, 2015 2015 by Pulse Secure, LLC. All rights reserved. May
More informationCD180 CeMOS/Cedar Software Package Management and Release Management Cloud Services
P/N:900-1005-20 CD180 CeMOS/Cedar Software Package Management and Release Management Cloud Services CD180 CeMOS/Cedar Software Package Management and Release Management Cloud Services (hereinafter referred
More informationWhat Are Certificates?
The Essentials Series: Code-Signing Certificates What Are Certificates? sponsored by by Don Jones W hat Are Certificates?... 1 Digital Certificates and Asymmetric Encryption... 1 Certificates as a Form
More informationStandardised Electronic Invoicing for the Increased Efficiency of Australian Small Business
Standardised Electronic Invoicing for the Increased Efficiency of Australian Small Business 31st May 2015 - Revision 0 Author: James Dwyer About the Author Introduction Immediate Benefits of a Nationally
More informationChapter 16: Authentication in Distributed System
Chapter 16: Authentication in Distributed System Ajay Kshemkalyani and Mukesh Singhal Distributed Computing: Principles, Algorithms, and Systems Cambridge University Press A. Kshemkalyani and M. Singhal
More informationDashlane Security Whitepaper
Dashlane Security Whitepaper November 2014 Protection of User Data in Dashlane Protection of User Data in Dashlane relies on 3 separate secrets: The User Master Password Never stored locally nor remotely.
More informationFunction and Structure Design for Regional Logistics Information Platform
, pp. 223-230 http://dx.doi.org/10.14257/ijfgcn.2015.8.4.22 Function and Structure Design for Regional Logistics Information Platform Wang Yaowu and Lu Zhibin School of Management, Harbin Institute of
More informationWeb Payment Security. A discussion of methods providing secure communication on the Internet. Zhao Huang Shahid Kahn
Web Payment Security A discussion of methods providing secure communication on the Internet Group Members: Peter Heighton Zhao Huang Shahid Kahn 1. Introduction Within this report the methods taken to
More informationNetwork Security CS 5490/6490 Fall 2015 Lecture Notes 8/26/2015
Network Security CS 5490/6490 Fall 2015 Lecture Notes 8/26/2015 Chapter 2: Introduction to Cryptography What is cryptography? It is a process/art of mangling information in such a way so as to make it
More informationCS 393 Network Security. Nasir Memon Polytechnic University Module 11 Secure Email
CS 393 Network Security Nasir Memon Polytechnic University Module 11 Secure Email Course Logistics HW 5 due Thursday Graded exams returned and discussed. Read Chapter 5 of text 4/2/02 Module 11 - Secure
More informationCryptography Lecture 8. Digital signatures, hash functions
Cryptography Lecture 8 Digital signatures, hash functions A Message Authentication Code is what you get from symmetric cryptography A MAC is used to prevent Eve from creating a new message and inserting
More informationSecurity Goals Services
1 2 Lecture #8 2008 Freedom from danger, risk, etc.; safety. Something that secures or makes safe; protection; defense. Precautions taken to guard against crime, attack, sabotage, espionage, etc. An assurance;
More informationAccellion Secure File Transfer Cryptographic Module Security Policy Document Version 1.0. Accellion, Inc.
Accellion Secure File Transfer Cryptographic Module Security Policy Document Version 1.0 Accellion, Inc. December 24, 2009 Copyright Accellion, Inc. 2009. May be reproduced only in its original entirety
More informationChapter 10. Cloud Security Mechanisms
Chapter 10. Cloud Security Mechanisms 10.1 Encryption 10.2 Hashing 10.3 Digital Signature 10.4 Public Key Infrastructure (PKI) 10.5 Identity and Access Management (IAM) 10.6 Single Sign-On (SSO) 10.7 Cloud-Based
More informationE-Commerce Security. The Client-Side Vulnerabilities. Securing the Data Transaction LECTURE 7 (SECURITY)
E-Commerce Security An e-commerce security system has four fronts: LECTURE 7 (SECURITY) Web Client Security Data Transport Security Web Server Security Operating System Security A safe e-commerce system
More informationINVOICES 5-5. The world s most popular gateway to electronic invoice processing
INVOICES 5-5 The world s most popular gateway to electronic invoice processing Electronic invoice processing is extremely profitable Can your company afford the traditional, manual handling of supplier
More informationOn the Interaction and Integration of Cross Selling and Customer Relationship Management
On the Interaction and Integration of Cross Selling and Customer Relationship Management SUN Shaofu School of Management, Dalian Jiaotong University, Dalian, Liaoning, China, 116028 sunshaofudl@163.com
More informationElectronic Permit Submittals
Central District Water Permitting Electronic Permit Submittals November 19, 2014 Electronic Submittal of Documents You can submit electronic applications and comply with the PE Sign, Seal, and Requirements.
More informationELECTRONIC COMMERCE WORKED EXAMPLES
MODULE 13 ELECTRONIC COMMERCE WORKED EXAMPLES 13.1 Explain B2B e-commerce using an example of a book distributor who stocks a large number of books, which he distributes via a large network of book sellers.
More informationJournal of Chemical and Pharmaceutical Research, 2014, 6(5): 647-651. Research Article
Available online www.jocpr.com Journal of Chemical and Pharmaceutical Research, 2014, 6(5): 647-651 Research Article ISSN : 0975-7384 CODEN(USA) : JCPRC5 Comprehensive colliery safety monitoring system
More information1. PORTAL TIE ENTERPRISE
1. PORTAL TIE ENTERPRISE 1 The ideal open environment for B2B ecommerce Working efficiently, that is what it is all about in B2B ecommerce. Integration of your company s applications with those of your
More informationThe Feasibility and Application of using a Zero-knowledge Protocol Authentication Systems
The Feasibility and Application of using a Zero-knowledge Protocol Authentication Systems Becky Cutler Rebecca.cutler@tufts.edu Mentor: Professor Chris Gregg Abstract Modern day authentication systems
More information