【24h】

Characterization of the Security Implications of Alternative E-procurement Topologies

机译:替代电子采购拓扑的安全隐患特征

获取原文
获取原文并翻译 | 示例

摘要

In this communication we propose a classification of alternative e-procurement topologies that can be characterized in terms of their security implications. In order to establish these alternative topologies we consider how the two main participants (buyer and supplier) could access to the e-procurement solution (i.e. through the Internet or through a Virtual Private Network -VPN-). From the point of view of the buyer, we consider two main possibilities, to use a third party intermediary that hosts the solution or to host it in the buyer information system. In the first case, we describe different situations when a third party intermediary is used, and we characterize the security implications in each case. Finally, we use this classification of topologies to analyze the security implications of different e-procurement solutions offered by Opciona (Spanish e-procurement solution provider).
机译:在本交流中,我们提出了一种替代性电子采购拓扑的分类,这些分类可以根据其安全隐患来表征。为了建立这些替代拓扑,我们考虑两个主要参与者(买方和供应商)如何访问电子采购解决方案(即通过Internet或通过虚拟专用网络-VPN-)。从买方的角度来看,我们考虑两种主要的可能性,即使用托管该解决方案的第三方中介或将其托管在买方信息系统中。在第一种情况下,我们描述了使用第三方中介程序时的不同情况,并描述了每种情况下的安全隐患。最后,我们使用这种拓扑分类来分析Opciona(西班牙电子采购解决方案提供商)提供的不同电子采购解决方案的安全隐患。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号