Font Size: a A A

Edifact, The Text In The Enterprise Security And Implementation

Posted on:2008-07-27Degree:MasterType:Thesis
Country:ChinaCandidate:F YangFull Text:PDF
GTID:2208360242977063Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
This article is based on the EDI system environment of the specific company A. The EDI management software had been used to collect and transport the transaction data to another EDI system or Non EDI system from the EDI equipment which support the UN/EDIFACT standard. The article introduces message level of safety the basis on UN/EDIFACT and analyses the security strategy and model, and examines the security technology of UN/EDIFACT message units It researches some safe methods to support the automatic processing of business transaction. Company A will only trade electronically with companies where an interchange agreement has been singed with the company, Each Group/BU will negotiate with its own technical format on UN/EDIFACT.
Keywords/Search Tags:EDI (Electronic Data Interchange), UN/EDIFACT (Electronic Data Interchange For Administration Commerce and Transport), UN/EDIFACT message system
PDF Full Text Request
Related items