Login / Signup
Profiles for conveying the secure communication requirements of Web services.
Duane Merrill
Andrew S. Grimshaw
Published in:
Concurr. Comput. Pract. Exp. (2009)
Keyphrases
</>
secure communication
web services
smart card
secret key
key management
secret sharing
public key
digital signature
security protocols
ad hoc networks
network security
chaotic systems
business process
description language
resource constrained
computer networks
quality of service
business processes