메뉴 건너뛰기




Volumn 18, Issue 5, 2003, Pages 419-430

A framework for separation of duties in an SAP R/3 environment

Author keywords

Access control; Enterprise resource planning; Financial accounting; Fraud; Security

Indexed keywords


EID: 84986037867     PISSN: 02686902     EISSN: None     Source Type: Journal    
DOI: 10.1108/02686900310476882     Document Type: Article
Times cited : (11)

References (28)
  • 4
    • 0001772218 scopus 로고
    • An experimental study of internal control judgements
    • Spring
    • Ashton, R. (1974), “An experimental study of internal control judgements”, Journal of Accounting Research, Vol. 12 No. 1, Spring, pp. 143-157.
    • (1974) Journal of Accounting Research , vol.12 , Issue.1 , pp. 143-157
    • Ashton, R.1
  • 5
    • 0002549014 scopus 로고
    • Descriptive modelling of auditor's internal control judgements: Replication and extension
    • Spring
    • Ashton, R. and Brown, R. (1980), “Descriptive modelling of auditor's internal control judgements: Replication and extension”, Journal of Accounting Research, Vol. 18 No. 1, Spring, pp. 269-277.
    • (1980) Journal of Accounting Research , vol.18 , Issue.1 , pp. 269-277
    • Ashton, R.1    Brown, R.2
  • 6
    • 0031382313 scopus 로고    scopus 로고
    • A flexible model supporting the specification and enforcement of role-based authorizations in workflow management systems
    • NIST VA
    • Bertino, E., Ferrari, E. and Atluri, V. (1997), “A flexible model supporting the specification and enforcement of role-based authorizations in workflow management systems”, Proceedings: Second ACM Workshop on Role-based Access Control, NIST, VA, pp. 1-12.
    • (1997) Proceedings: Second ACM Workshop on Role-based Access Control , pp. 1-12
    • Bertino, E.1    Ferrari, E.2    Atluri, V.3
  • 7
    • 34648817144 scopus 로고    scopus 로고
    • MIATA: A machine independent audit trail analyser
    • May
    • Best, P., Mohay, G. and Anderson, A. (1997), “MIATA: A machine independent audit trail analyser”, Australian Computer Journal, Vol. 29 No. 2, May, pp. 57-63.
    • (1997) Australian Computer Journal , vol.29 , Issue.2 , pp. 57-63
    • Best, P.1    Mohay, G.2    Anderson, A.3
  • 9
    • 0023266943 scopus 로고
    • A comparison of commercial and military computer security policies
    • IEEE Computer Society Press Oakland, CA
    • Clark, D. and Wilson, D. (1987), “A comparison of commercial and military computer security policies”, IEEE Symposium on Security and Privacy, IEEE Computer Society Press, Oakland, CA.
    • (1987) IEEE Symposium on Security and Privacy
    • Clark, D.1    Wilson, D.2
  • 12
    • 84986029175 scopus 로고    scopus 로고
    • Control & audit of SAP R/3 logical access security
    • Haelst, W. and Jansen, K. (1997), “Control & audit of SAP R/3 logical access security”, IS Audit & Control Journal, Vol. 3, pp. 37-44.
    • (1997) IS Audit & Control Journal , vol.3 , pp. 37-44
    • Haelst, W.1    Jansen, K.2
  • 13
    • 0003045704 scopus 로고
    • Internal control judgments and effects of experience: Replications and extensions
    • Autumn
    • Hamilton, R. and Wright, W. (1982), “Internal control judgments and effects of experience: Replications and extensions”, Journal of Accounting Research, Vol. 20 No. 2, Autumn, pp. 756-765.
    • (1982) Journal of Accounting Research , vol.20 , Issue.2 , pp. 756-765
    • Hamilton, R.1    Wright, W.2
  • 14
    • 0031346670 scopus 로고    scopus 로고
    • Mutual exclusion of roles as a means of implementing separation of duty in role-based access control systems
    • NIST VA
    • Kuhn, D. (1997), “Mutual exclusion of roles as a means of implementing separation of duty in role-based access control systems”, Proceedings: Second ACM Workshop on Role-based Access Control, NIST, VA, pp. 23-30.
    • (1997) Proceedings: Second ACM Workshop on Role-based Access Control , pp. 23-30
    • Kuhn, D.1
  • 15
    • 0027609384 scopus 로고
    • A survey of intrusion detection techniques
    • Lunt, T.F. (1993), “A survey of intrusion detection techniques”, Computers & Security, Vol. 12 No. 4, pp. 405-418.
    • (1993) Computers & Security , vol.12 , Issue.4 , pp. 405-418
    • Lunt, T.F.1
  • 17
    • 84961841379 scopus 로고
    • System implications of information privacy
    • Spring
    • Peterson, H.E. and Turn, R. (1967), “System implications of information privacy”, Proceedings AFIPS Conference, Vol. 30, Spring, pp. 291-300.
    • (1967) Proceedings AFIPS Conference , vol.30 , pp. 291-300
    • Peterson, H.E.1    Turn, R.2
  • 19
    • 84909718092 scopus 로고
    • Reflections on some recent widespread computer break-ins
    • Reid, B. (1987), “Reflections on some recent widespread computer break-ins”, Commun. ACM, Vol. 30 No. 2, pp. 103-105.
    • (1987) Commun. ACM , vol.30 , Issue.2 , pp. 103-105
    • Reid, B.1
  • 22
    • 0030086382 scopus 로고    scopus 로고
    • Role-based access control models
    • Sandhu, R.S. and Coyne, E.J. (1996), “Role-based access control models”, Computer, Vol. 29 No. 2, pp. 38-47.
    • (1996) Computer , vol.29 , Issue.2 , pp. 38-47
    • Sandhu, R.S.1    Coyne, E.J.2
  • 23
    • 0024683697 scopus 로고
    • Password cracking a game of wits
    • Seeley, D. (1989) “Password cracking a game of wits”, Commun. ACM, Vol. 32 No. 6, pp. 700-704.
    • (1989) Commun. ACM , vol.32 , Issue.6 , pp. 700-704
    • Seeley, D.1
  • 25
    • 0024681099 scopus 로고
    • The Internet worm: Crisis and aftermath
    • Spafford, E.H. (1989), “The Internet worm: Crisis and aftermath”, Commun. ACM, Vol. 32 No. 6, pp. 678-687.
    • (1989) Commun. ACM , vol.32 , Issue.6 , pp. 678-687
    • Spafford, E.H.1
  • 26
    • 84970207099 scopus 로고
    • The influence of segregation of duties on internal control judgements
    • Srinidhi, B. (1994), “The influence of segregation of duties on internal control judgements”, Journal of Accounting, Auditing & Finance, Vol. 9 No. 3, pp. 423-444.
    • (1994) Journal of Accounting, Auditing & Finance , vol.9 , Issue.3 , pp. 423-444
    • Srinidhi, B.1
  • 27
    • 0024011325 scopus 로고
    • Stalking the wiley hacker
    • Stoll, C. (1988), “Stalking the wiley hacker”, Commun. ACM, Vol. 31 No. 5, pp. 484-497.
    • (1988) Commun. ACM , vol.31 , Issue.5 , pp. 484-497
    • Stoll, C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.