18.04.2013 Views

B2B Integration : A Practical Guide to Collaborative E-commerce

B2B Integration : A Practical Guide to Collaborative E-commerce

B2B Integration : A Practical Guide to Collaborative E-commerce

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

292 <strong>B2B</strong> <strong>Integration</strong> — A <strong>Practical</strong> <strong>Guide</strong> <strong>to</strong> <strong>Collaborative</strong> E-<strong>commerce</strong><br />

takes place between different companies, there is some risk involved.<br />

The major concerns are:<br />

• Someone may intercept the message and breach its privacy;<br />

• Someone may impersonate a company and send a message under its<br />

name and signature;<br />

• Someone may change the contents of the message in transit; and<br />

• The sending company may, later on, deny having sent the message.<br />

To reduce these risks, the following security services must be ensured<br />

during <strong>B2B</strong> communication:<br />

• Confidentiality — assurance that the message is private and its contents<br />

have not been disclosed <strong>to</strong> the outside world;<br />

• Authentication — proof that the message was indeed sent by the<br />

company with whom communication was taking place;<br />

• Integrity — complete assurance that the message was not tampered<br />

with or accidentally altered during transit; and<br />

• Non-repudiation — the message must be binding on the sending<br />

company so that it cannot deny having sent it at a later point.<br />

Failure in ensuring any of the above features will result in the whole<br />

transaction being compromised and ultimately undermine the confidence<br />

of businesses and consumers in <strong>B2B</strong>i technology.<br />

10.5.1. The strength of the chain is as strong as its<br />

weakest link<br />

Besides securing the data transaction, i.e., the data while it passes from<br />

one enterprise <strong>to</strong> the other, the data must be secure at the end-points as<br />

well. To elaborate further, the data resides in the sending company on<br />

some physical system, maybe its Web server, or some other server.<br />

Also, when the receiving company gets the data, it s<strong>to</strong>res it in some<br />

physical location. Unless strict measures are taken, this data can fall<br />

in<strong>to</strong> unauthorized hands, by someone breaking in<strong>to</strong> the internal LAN of<br />

either company, through the Web server or through the operating system.<br />

Therefore, each aspect of the system must be equally secured. There is

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!