DOI QR코드

DOI QR Code

Open Trade Technical Model using ebXML for FTA with China and Korea

  • Received : 2014.04.15
  • Accepted : 2014.06.10
  • Published : 2014.06.30

Abstract

China and South Korea have effectively reached a free trade agreement. The deal now faces legal and parliament reviews in the two countries. We need to discuss the recommendations on XML conversion with UN / CEFACT electronic documents. To solve this problem of interworking between these standards, Two kinds of translation rules is proposed for exchanging to UN / CEFACT Tag smoothly. For development and distribution of electronic documents to be conformed to international standards, it is enough to have the role of international activities continue to supply part of the domestic industry and the trends in participation and international standard. Our principal focus is on facilitating national and international transactions, through the simplification and harmonization of processes, procedures and information flows, and so contributing to the growth of global commerce. The agreement with South Korea will be China's ninth bilateral FTA.

Keywords

References

  1. Adams, C., & Lloyd, S. (1999). Understanding public-key infrastructure: concepts, standards, and deployment considerations. Sams Publishing.
  2. Bruggink, D., Karsten, P., & de Meijer, C. R. (2012). The European cards environment and ISO 20022. Journal of Payments Strategy & Systems, 6(1), 80-99.
  3. Ferris, J. M. (2012). The ISO PIA Standard for Financial Services. In Privacy Impact Assessment (pp. 307-321). Springer Netherlands.
  4. Hartsink, G. (2014). Standardisation: A conditio sine qua non for efficient payment services. Journal of Payments Strategy & Systems, 8(1), 23-29.
  5. Hartsink, G. (2014). Standardisation: A conditio sine qua non for efficient payment services. Journal of Payments Strategy & Systems, 8(1), 23-29.
  6. Janssens, P. (2014). The implications of legal entity identifiers on payments systems. Journal of Payments Strategy & Systems, 8(2), 147-156.
  7. Preneel, B. (1993, January). Standardization of cryptographic techniques. In Computer Security and Industrial Cryptography (pp. 162-173). Springer Berlin Heidelberg.
  8. Sassone, V. (2014). ETAPS Award Laudatio for Kohei Honda. Bulletin of EATCS, 1(112).
  9. Stapleton, J. J. (2014). Security Without Obscurity: A Guide to Confidentiality, Authentication, and Integrity. CRC Press
  10. Yong-Gyu Jung, Dong-Won Lee, Seung-Bum Ahn (2002), Electronic Payment and Exchange Security Service under m-Logistics Environments, Proceeding of Korea Institute of Information Science, Vol. 29, No. 2, pp55-57
  11. Yong-Gyu Jung (2004), EDI Security Algorithm on UN/EDIFACT Messages, Proceeding of Korea Institute of Information Science, Vol. 31, No. 1, pp217-219N.
  12. Un-Seob, Yong-Gyu Jung (2008), XML mapping for UN/CEFACT standard electronic messages, Proceeding of 2008 Cross-Cultural Conference of Current Business Issues, Academy of Global Business Network, pp65-74