Security Consequences of Messaging Hubs in Many-to-Many E-procurement Solutions.
Eva PonceAlfonso DuránTeresa SánchezPublished in: ICCSA (1) (2004)
Keyphrases
- intrusion detection
- information security
- optimal solution
- security systems
- social networks
- security issues
- buffer overflow
- information assurance
- negative consequences
- security patterns
- publish subscribe
- data security
- cyber security
- computer security
- key management
- functional requirements
- security policies
- benchmark problems
- solution space
- fault tolerant
- evolutionary algorithm