Towards Security Case Run-Time Adaptation by System Decomposition into Services.
Elena LisovaAida CausevicPublished in: IECON (2018)
Keyphrases
- security services
- inter domain
- information security
- web services
- service providers
- service management
- mobile commerce
- end users
- network services
- intrusion detection
- service delivery
- mobile payment
- identity management
- communication protocols
- security issues
- service oriented
- access control
- public key infrastructure
- internet service providers
- network connection
- security risks
- security protocols
- key management
- statistical databases
- security policies