Security implications for EDI | IET Conference Publication | IEEE Xplore