skip to main content
article
Free Access

Working paper on functional specifications for an EDI cryptoserver

Published:01 June 1991Publication History
Skip Abstract Section

Abstract

As more and more business information is transmitted between computer systems we are seeing an increased need to protect these Electronic Data Interchange (EDI) encoded transactions from unauthorized viewing and/or alteration. EDI transactions carry market intelligence such as item name, quantity, purchase price, delivery dates, etc. Unauthorized viewing can provide competitive information we may not want disclosed. With the advent of the Payment Order/Remittance Advice transactions, sensitive payment information such as payment amount, bank identification and bank account numbers can be carried in an EDI transaction. Alteration of any of these fields can result in an improper payment being made.

Index Terms

  1. Working paper on functional specifications for an EDI cryptoserver

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in

        Full Access

        • Published in

          cover image ACM SIGSAC Review
          ACM SIGSAC Review  Volume 9, Issue 3
          Summer 1991
          41 pages
          ISSN:0277-920X
          DOI:10.1145/127024
          Issue’s Table of Contents

          Copyright © 1991 Author

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 1 June 1991

          Check for updates

          Qualifiers

          • article
        • Article Metrics

          • Downloads (Last 12 months)7
          • Downloads (Last 6 weeks)2

          Other Metrics

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader