Skip to main content

EDI security

  • Conference paper
  • First Online:
Computer Security and Industrial Cryptography

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 741))

  • 201 Accesses

Abstract

Gordon Lennox is responsible for security activities in the TEDIS programme, a Community programme dealing with systems for the electronic transfer of trade data. He has also been involved in other EC projects: projects which dealt with the confidentiality and security of data, the protection of computer programmes, and the information society and its environment.

Please note that the text reflects the author's own views and does not commit the European Commission in any way.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Introduction to UN/EDIFACT,” published by the UN/EDIFACT Rapporteurs teams.

    Google Scholar 

  2. EEC report “Security in Open Networks,” SOGITS working document Nr 303, January 1989.

    Google Scholar 

  3. CEN/CENELEC workshop proceedings. “Security aspects in OSI functional standards,” Brussels, October 1989.

    Google Scholar 

  4. CEN/CENELEC Ad Hoc Group on Security Standards — “Towards a taxonomy for standardisation of security,” E.J.Humphreys, March 1990.

    Google Scholar 

  5. The TEDIS — EDI Security Workshop Report,”, Brussels, 1989. See also TEDIS legal workshop report.

    Google Scholar 

  6. X12.42, “Cryptographic service message transaction set.”

    Google Scholar 

  7. X12.58, “Electronic data interchange security structures.”

    Google Scholar 

  8. X.509, “The Directory — Authentication Framework.”

    Google Scholar 

  9. Official Journal C230 and S271 of 07.09.1989.

    Google Scholar 

  10. Security in directories,” John Draper, The Electronic Directories Conference, London, 1990.

    Google Scholar 

  11. CCITT Draft Recommendation X.43S, “Message Handling Systems: EDI Messaging System,” CCITT Draft Recommendation X.435. Message Handling: EDI Messaging Service.

    Google Scholar 

  12. ISO/IEC JTC1/SWG-EDI N 177. Report on the conceptual model for EDI (“Open EDI Model”).

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Bart Preneel René Govaerts Joos Vandewalle

Rights and permissions

Reprints and permissions

Copyright information

© 1993 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Lennox, G. (1993). EDI security. In: Preneel, B., Govaerts, R., Vandewalle, J. (eds) Computer Security and Industrial Cryptography. Lecture Notes in Computer Science, vol 741. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-57341-0_66

Download citation

  • DOI: https://doi.org/10.1007/3-540-57341-0_66

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-57341-8

  • Online ISBN: 978-3-540-48074-7

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics