会议专题

Design of IAM Function in ERP Systems

This paper proposes a correct design method for the identification of the user identity in Enterprise Resource Planning (ERP) application system, aimed at the existence of the Identity and Access Management (IAM) in security field. Among this paper, this design method adopts multi-factor authentication technology to customize the firewall of ERP system, uses AES and MD5 algorithm to encrypt the preserved or transmitted data, and connect IAM system to ERP system smoothly by the communications of processes. Consequently, it will avoid the attacks from outside or inside the system, and provide a reliable guarantee for system resources of security management.

IAM ERP system design of system

Shi-sheng Zhu Tao Wang Ya-jun Deng Xiao-zhu Xie

Department of Computer, Shantou University, Shantou Guangdong 515063, China The Key Laboratory of Intelligent Manufacturing Technology, Ministry of Education at Shantou University, Shantou Guangdong Province 515063, China

国际会议

Second International Symposium on Electronic Commerce and Security(第二届电子商务与安全国际研究大会)(ISECS 2009)

南昌

英文

98-101

2009-05-22(万方平台首次上网日期,不代表论文的发表时间)