Methodology and Tools for End-to-End SOA Security Configurations.
Fumiko SatohYuichi NakamuraNirmal MukhiMichiaki TatsuboriKouichi OnoPublished in: SERVICES I (2008)
Keyphrases
- end to end
- admission control
- multipath
- congestion control
- access control
- content delivery
- security policies
- transport layer
- service oriented architecture
- web services
- ad hoc networks
- end users
- high bandwidth
- wireless ad hoc networks
- application layer
- information security
- internet protocol
- key management
- computational complexity