By Topic

Security moving from database systems to ERP systems

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

3 Author(s)
van de Riet, R. ; CASC-Deloitte & Touche, Amsterdam, Netherlands ; Janssen, W. ; de Gruijter, P.

Usage of Information Systems moves from a central database system with many application programs to fully integrated systems with which an enterprise is handling many of its information and communication problems (ERP). In this paper we study how these systems deal with the security issue; we see that on the one hand by moving the security from the database level to the ERP level, advantages by having centrally defined and maintained security rules get lost, on the other hand it is possible to exploit WorkFlow Management (WFM) techniques to define security procedures more properly, such that the “separation of duty” principle can be applied. We demonstrate this on the tricky security rules for the security employees themselves

Published in:

Database and Expert Systems Applications, 1998. Proceedings. Ninth International Workshop on

Date of Conference:

25-28 Aug 1998