Abstract
As more and more business information is transmitted between computer systems we are seeing an increased need to protect these Electronic Data Interchange (EDI) encoded transactions from unauthorized viewing and/or alteration. EDI transactions carry market intelligence such as item name, quantity, purchase price, delivery dates, etc. Unauthorized viewing can provide competitive information we may not want disclosed. With the advent of the Payment Order/Remittance Advice transactions, sensitive payment information such as payment amount, bank identification and bank account numbers can be carried in an EDI transaction. Alteration of any of these fields can result in an improper payment being made.
Index Terms
- Working paper on functional specifications for an EDI cryptoserver
Recommendations
A ReScUE XML/EDI model
Since electronic data interchange (EDI) is one of the most important components in electronic commerce and since Extensible Markup Language (XML) provides Internet developers with a powerful vehicle for exchanging messages XML/EDI has received much ...
Working with XML
XML (Extensible Mark up language) is fast becoming a standard method for data organization, structure, and exchange on the Internet. The extensibility of XML allows web authors to create their own markup for any type of information. This extensibility ...
EDI, XML and e-business frameworks: A survey
Data formats and e-business frameworks are important standards for e-business. The ASC X12, EDIFACT and XML formats are utilized in e-business frameworks which are supported in information systems. The EDI formats have retained a position in cross-...
Comments