

Author: Hains David
Publisher: Emerald Group Publishing Ltd
ISSN: 0968-5227
Source: Information Management & Computer Security, Vol.2, Iss.1, 1994-01, pp. : 25-27
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Abstract
As data communication grows in importance, so the security aspects of this area demand greater attention. Of all the security issues affecting EDI, electronic authentication is a kingpin. Without the legal safeguards of authentication, the promise of electronic trading cannot be realized. Standardization and appropriate technology are the two essentials for successful authentication. Describes some packaged products which facilitate application of encryption-based software and hardware authenticity for EDI systems. The belief that the facilities of X.400 will protect EDI are ill-founded.
Related content


User-aided data authentication
International Journal of Security and Networks, Vol. 4, Iss. 1-2, 2009-02 ,pp. :






Data Communications for Internet Robots
By Liu P.X.
Autonomous Robots, Vol. 15, Iss. 3, 2003-01 ,pp. :