Authentication Model for Enterprise Resource Planning Network

Authentication Model for Enterprise Resource Planning Network

Wasim A. Al-Hamdani
ISBN13: 9781466665835|ISBN10: 1466665831|EISBN13: 9781466665842
DOI: 10.4018/978-1-4666-6583-5.ch005
Cite Chapter Cite Chapter

MLA

Al-Hamdani, Wasim A. "Authentication Model for Enterprise Resource Planning Network." Handbook of Research on Threat Detection and Countermeasures in Network Security, edited by Alaa Hussein Al-Hamami and Ghossoon M. Waleed al-Saadoon, IGI Global, 2015, pp. 66-79. https://doi.org/10.4018/978-1-4666-6583-5.ch005

APA

Al-Hamdani, W. A. (2015). Authentication Model for Enterprise Resource Planning Network. In A. Al-Hamami & G. Waleed al-Saadoon (Eds.), Handbook of Research on Threat Detection and Countermeasures in Network Security (pp. 66-79). IGI Global. https://doi.org/10.4018/978-1-4666-6583-5.ch005

Chicago

Al-Hamdani, Wasim A. "Authentication Model for Enterprise Resource Planning Network." In Handbook of Research on Threat Detection and Countermeasures in Network Security, edited by Alaa Hussein Al-Hamami and Ghossoon M. Waleed al-Saadoon, 66-79. Hershey, PA: IGI Global, 2015. https://doi.org/10.4018/978-1-4666-6583-5.ch005

Export Reference

Mendeley
Favorite

Abstract

Enterprise Resource Planning (ERP) software is business-management software that allows an organization to use a system of integrated applications to manage the business. ERP software often contains highly confidential information that is vital to a firm's competitiveness, so it is critically important that appropriate security be implemented to reduce its vulnerability. In this chapter, security issues are presented that could arise when ERP software is integrated with many systems and with web environments. The security issue is one of the major issues with ERP software, and it has not been a major focus of the developers of the software, who leave this issue to different components of the system and to vendor implementation. In this chapter, The author presents a new security model for ERP software. The author also presents a new authentication model that consists of the following layers: Role base, Data mining, Risk-based access control, and PKI.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.