Secure Network in Business-to-Business application by using Access Control List (ACL) and Service Level Agreement (SLA).
Abdul Ahad AbroSafeeullah SoomroZainab AlansariMohammad Riyaz BelgaumAbdul Baqi Khan KhakwaniPublished in: CoRR (2016)
Keyphrases
- access control
- business applications
- service level agreements
- business processes
- business process
- trust relationships
- data security
- security architecture
- identity management
- security requirements
- security mechanisms
- security policies
- rbac model
- access control mechanism
- web services
- cloud computing
- service providers
- data mining
- quality of service
- service level
- role based access control
- grid services
- web applications
- authentication and access control
- service oriented
- computer networks
- database applications
- information systems
- resource management
- access control policies
- peer to peer
- computing resources
- service quality
- network traffic
- cloud services
- operating system
- computer systems
- wireless sensor networks
- database