2013
DOI: 10.13189/wjcat.2013.010402
|View full text |Cite
|
Sign up to set email alerts
|

Security Trade-off Analysis of Service-oriented Software Architecture

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(1 citation statement)
references
References 11 publications
0
1
0
Order By: Relevance
“…Regarding the need for a secure exchange between interlocking, the choice of SOA is supported by the safety evidence confirmed through previous studies [28], [29] and recommendations emanating from [30]. Then, the design of SOA for an interface on borders must respect security requirements [28]: identity requirements, authentication and authorization requirements, confidentiality, and integrity requirements and availability.…”
Section: Security Of Soa Interfacesmentioning
confidence: 86%
“…Regarding the need for a secure exchange between interlocking, the choice of SOA is supported by the safety evidence confirmed through previous studies [28], [29] and recommendations emanating from [30]. Then, the design of SOA for an interface on borders must respect security requirements [28]: identity requirements, authentication and authorization requirements, confidentiality, and integrity requirements and availability.…”
Section: Security Of Soa Interfacesmentioning
confidence: 86%