메뉴 건너뛰기




Volumn 16, Issue 3, 2007, Pages 152-163

Security for enterprise resource planning systems

Author keywords

Authorization; Enterprise Resource Planning; Exchange infrastructure; Policies; RBAC; Web services

Indexed keywords


EID: 84995946668     PISSN: 1065898X     EISSN: None     Source Type: Journal    
DOI: 10.1080/10658980701401959     Document Type: Article
Times cited : (25)

References (29)
  • 1
  • 4
  • 5
    • 85024085295 scopus 로고    scopus 로고
    • Security evaluation and management for the sap r/3 environment
    • Goodman, E. (2004). –Security Evaluation and Management for the SAP R/3 Environment,— GSEC Certification Practical.
    • (2004) GSEC Certification Practical
    • Goodman, E.1
  • 6
    • 39749159243 scopus 로고
    • Electronic data interchange and small organizations: Adoption and impact of technology
    • Iacovou, L., Benbasat, I., and Dexter, A. S. (1995). –Electronic Data Interchange and Small Organizations: Adoption and Impact of Technology,— MIS Quarterly, 19: 4, pp. 465-485.
    • (1995) MIS Quarterly , vol.19 , Issue.4 , pp. 465-485
    • Iacovou, L.1    Benbasat, I.2    Dexter, A.S.3
  • 16
    • 0001784070 scopus 로고    scopus 로고
    • Componentizing the enterprise application packages
    • Sprott, D. (2000). –Componentizing the Enterprise Application Packages,— Communications of the ACM, 43:4.
    • (2000) Communications of the ACM , vol.43 , pp. 4
    • Sprott, D.1
  • 26
    • 85024066197 scopus 로고    scopus 로고
    • Sap exchange infrastructure 2.0
    • White Paper. (2002). SAP Exchange Infrastructure 2.0, SAP AG and Sun Microsystems.
    • (2002) SAP AG and Sun Microsystems


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.