IDEAS home Printed from https://ideas.repec.org/a/igg/jeis00/v8y2012i1p51-65.html
   My bibliography  Save this article

Enhancing Data Security in ERP Projects Using XML

Author

Listed:
  • T. Chandrakumar

    (Thiagarajar College of Engineering, Madurai, India)

  • S. Parthasarathy

    (Thiagarajar College of Engineering, Madurai, India)

Abstract

Enterprise resource planning (ERP) is integrated packaged software, which addresses most fundamental business processing functionality across different functional areas and business units, in a single software system, with single database and accessible through a unified interface and channel of communication. Meeting security requirements for privacy, confidentiality and integrity is essential in order to move business online ERP System requires an accurate, precise and Data security in business concepts of the enterprise. The authors introduce basic features and security of ERP System using Extensible Mark-up Language (XML) technology. Traditionally, XML security has developed along two distinct though related lines of research, corresponding to two facts of the XML security notion. The first fact defines XML security as a set of security techniques (encryption, digital signature) tightly coupled with XML to maintain the main features of the XML semi-structured data model while adding to it all necessary security capabilities. In this paper we will explore XML Signature specification from W3C and its implementation in .NET.

Suggested Citation

  • T. Chandrakumar & S. Parthasarathy, 2012. "Enhancing Data Security in ERP Projects Using XML," International Journal of Enterprise Information Systems (IJEIS), IGI Global, vol. 8(1), pages 51-65, January.
  • Handle: RePEc:igg:jeis00:v:8:y:2012:i:1:p:51-65
    as

    Download full text from publisher

    File URL: http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/jeis.2012010104
    Download Restriction: no
    ---><---

    More about this item

    Statistics

    Access and download statistics

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:igg:jeis00:v:8:y:2012:i:1:p:51-65. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    We have no bibliographic references for this item. You can help adding them by using this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Journal Editor (email available below). General contact details of provider: https://www.igi-global.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.