2008 Third International Conference on Convergence and Hybrid Information Technology 2008
DOI: 10.1109/iccit.2008.173
|View full text |Cite
|
Sign up to set email alerts
|

Use of Data Mining to Enhance Security for SOA

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2008
2008
2022
2022

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(2 citation statements)
references
References 9 publications
0
2
0
Order By: Relevance
“…In mobile and web applications, the SOA approach is widely used to develop several components for secure communication [ 26 ]. There are various messaging protocols to establish secure communication from one end to another.…”
Section: Security Requirements In Tele-covidmentioning
confidence: 99%
“…In mobile and web applications, the SOA approach is widely used to develop several components for secure communication [ 26 ]. There are various messaging protocols to establish secure communication from one end to another.…”
Section: Security Requirements In Tele-covidmentioning
confidence: 99%
“…With the introduction of Web 2.0, Web 3.0 and second generation internet based services, the traditional security approaches such as Secure Socket Layer / Transport Layer Service (SSL/TLS), and Virtual Private Network (VPN) become obsolete. Hence the organization should extend SOA security framework to adopt with these new generation technologies [47,48].…”
Section: Need Of Security For Soamentioning
confidence: 99%