Managing Impacts of Security Protocol Changes in Service-Oriented Applications.
Halvard SkogsrudBoualem BenatallahFabio CasatiFarouk ToumaniPublished in: ICSE (2007)
Keyphrases
- service oriented
- security protocols
- web services
- artificial immune algorithm
- highly dynamic
- security services
- service oriented architecture
- authentication protocol
- workflow management
- service selection
- key management
- model driven
- service composition
- security mechanisms
- service oriented computing
- case study
- virtual enterprise
- rfid tags
- information systems
- security requirements
- grid services