英文摘要
|
Cloud ERP system is formed by the integration techniques between cloud computing and traditional ERP functionality, both technology. This system faces to a deep degree difficulty of security problems due to a significant amount of messaging. In order to evaluate the current cloud ERP technology, it is necessary to plan and analyze the detailed information security considering completion issue. Cloud ERP must support a complete security protection mechanism, including intrusion detection services and security node detection. This mechanism can provide physical security and virtual security. For physical security, storage media data center is considered on the engine room safety. For virtual security, it is the most important security to achieve transmission security and access data security. Regarding to transmission security, encryption security algorithm can improve the capability for HTTPS encryption mechanism. Regarding to the security of access data, three main factors can be considered, including access security, data security, and user authentication. The research is to construct client-based user authentication mode that has client-based user authentication and cloud-based user authentication mechanisms. The major purpose of this mode is to resist inside and outside attacks for achieving the security of access control agent, and satisfy with security certification requirements for multiple users in the cloud.
|
参考文献
|
-
蔡一郎(2010)。雲端運算與雲端安全架構。資訊安全通訊,16(4),84-93。
連結:
-
ISACA (2010), Security, Audit and Control Features Oracle E-Business Suite, Available at: http://www.isaca.org/Knowledge-Center/Research/Documents/Oracle-EBS-3rd-Ed-Excerpt-17June2010-Research.pdf
-
鼎新電腦,http://www.dsc.com.tw/,2013/10/24
-
海量雲端ERP,http://www.erpsoft.com.tw/about.html
-
IBM.(2011), Security and High Availability in Cloud Computing Environments. , (June), pp.1–12.Available at: http://www-935.ibm.com/services/za/gts/cloud/Security_and_ high_availability_in_cloud_computing_environments.pdf
-
SimplySecurity.com.(2011), Survey: Most companies moving to the cloud. Available at: http://www.simplysecurity.com/2011/05/10/survey-most-companies-moving-to-the-cloud/.
-
Castellina, N. (2011). SaaS and Cloud ERP Trends , Observations , and Performance 2011, Available at: http://www.distributionerpdelivered.com/wp-content/uploads/Avanade--ERP-Aberdeen-Report-SaaS-and-Cloud-ERP-Trends.pdf
-
AlZain, M.A.,Pardede, E.(2012).Cloud Computing Security: From Single to Multi-Clouds.Proc. 45th Hawaii International Conf. on System Science (HICSS),Maui, Hawaii:
-
Bezemer, C.,Zaidman, A(2010).Multi-tenant SaaS applications: maintenance dream or nightmare?.Proceedings of the Joint ERCIM Workshop on
-
Hughes, J.,Beer, R.(2007).A Security Checklist for ERP Implementations.Educause Quarterly,4,7-10.
-
Khan, A.U.,Oriol, M.,Kiran, M.,Jiang, M.,Djemame, K.(2012).Security Risks and their Management in Cloud Computing.Proc. IEEE 4th International Conf. on Cloud Computing Technology and Science (CloudCom),Taipei, Taiwan:
-
Møller, C.(2003).ERP II extended enterprise resource planning.7th World Multi-Conference on Systemics, Cybernetics and Informatics,Orlando, F.L:
-
Mozammel-Bin-Motalab,Shohag, S. A. M.(2011).Cloud Computing and the Business Consequences of ERP Use.International Journal of Computer Application,28(8),31-37.
-
Rittinghouse, John W.,Ransome, James F.(2012).Cloud computing-implementation, Management and security.CRC press.
-
Zhang, F. Q.,Han, D. Y.(2012).Applying Agents to the Data Security in Cloud Computing.Proc International Conf. on Computer Science and Information Processing (CSIP),Shaanxi, China:
-
梁文耀(2010)。碩士論文(碩士論文)。國立彰化師範大學資訊管理研究所。
-
梁文耀、許惠渝(2010)。CloudERP 組合的評選。產業資訊管理學暨新興科技實務研討會
-
莊曼、陳正雄(2011)。雲端服務協助中小企業導入SAP Business One 探討。萬能科技大學商學院學報,16,59-80。
-
陳瀅(2010)。雲端策略,雲端運算與虛擬化技術。台北:天下出版。
|