Model driven security frameworks for addressing security problems of Service Oriented Architecture
Service Oriented Architecture (SOA) based on Web Services technology gained popularity because business work flows can easily be executed as an orchestration of Web Services. These Web Services are independently developed and may be internal or external. With increase in connectivity among the Web S...
| Main Authors: | Saleem, M. Q., Jaafar, J., Hassan, M.F. |
|---|---|
| Format: | Conference or Workshop Item |
| Language: | English |
| Published: |
2010
|
| Subjects: | |
| Online Access: | http://scholars.utp.edu.my/id/eprint/2798/ http://scholars.utp.edu.my/id/eprint/2798/2/05561580.pdf |
Similar Items
Securing the Calea architecture against denial of service attacks
by: Lim, Kong Hua
Published: (2011)
by: Lim, Kong Hua
Published: (2011)
Developmental approaches covering context area mobile applications service oriented architecture and model driven architecture
by: Kim, Haeng Kon, et al.
Published: (2016)
by: Kim, Haeng Kon, et al.
Published: (2016)
Designing a logical security framework for enterprise service oriented architecture (ESOA)
by: Kalantari, Alaeddin
Published: (2009)
by: Kalantari, Alaeddin
Published: (2009)
Next generation security operation center framework
by: Mohamad Fadli, Zolkipli, et al.
Published: (2018)
by: Mohamad Fadli, Zolkipli, et al.
Published: (2018)
A Data-Driven and Modular Flask-Based Architecture for Secure and
Intelligent Programming Education Powered by LLMs
by: J., Ranjith, et al.
Published: (2025)
by: J., Ranjith, et al.
Published: (2025)
Towards Incorporation of Software Security Testing Framework in Software Development
by: Hassan, N. H., et al.
Published: (2011)
by: Hassan, N. H., et al.
Published: (2011)
Immune Inspired Framework for Ad Hoc Network Security
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2009)
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2009)
Immune Inspired Framework for Ad Hoc Network Security
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2009)
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2009)
Cybersecurity in Big Data Era: From Securing Big Data to Data-Driven Security
by: Manjunatha, V., et al.
Published: (2024)
by: Manjunatha, V., et al.
Published: (2024)
Addressing the Brittleness of Agent Interaction
by: Hassan, M.F., et al.
Published: (2008)
by: Hassan, M.F., et al.
Published: (2008)
Domain model as problem-oriented architecture application for mobile applications
by: Zaragoza, Mechelle Grace, et al.
Published: (2017)
by: Zaragoza, Mechelle Grace, et al.
Published: (2017)
An efficient PKC-based security architecture for wireless sensor networks
by: Haque, Md. Mokammel, et al.
Published: (2007)
by: Haque, Md. Mokammel, et al.
Published: (2007)
An asymmetric key-based security architecture for wireless sensor networks
by: Haque, Md. Mokammel, et al.
Published: (2008)
by: Haque, Md. Mokammel, et al.
Published: (2008)
Integrated Framework For Secure Distributed Management Of
Duplicated Ipv6 Address Detection
by: Ul Rehman, Shafiq
Published: (2017)
by: Ul Rehman, Shafiq
Published: (2017)
IPTV network security: threats and countermeasures
by: M. S. A., Noman Ranak, et al.
Published: (2018)
by: M. S. A., Noman Ranak, et al.
Published: (2018)
An efficient public key based security architecture for wireless sensor networks
by: Haque, Md. Mokammel, et al.
Published: (2007)
by: Haque, Md. Mokammel, et al.
Published: (2007)
A Study On AI-Driven Solutions for Cloud Security Platform
by: Menaga, Segar, et al.
Published: (2024)
by: Menaga, Segar, et al.
Published: (2024)
Inculcating secure coding for beginners
by: A. Aziz, Normaziah, et al.
Published: (2017)
by: A. Aziz, Normaziah, et al.
Published: (2017)
Smart home security
by: Mohammad Syafi Azim, Mohd Razam
Published: (2019)
by: Mohammad Syafi Azim, Mohd Razam
Published: (2019)
Addressing Constraint Failures in Agent Interaction Protocol
by: Hassan, M.F., et al.
Published: (2009)
by: Hassan, M.F., et al.
Published: (2009)
Securing e-learning environment: A study of security awareness and behavior of user
by: Wan Nurul Safawati, Wan Manan, et al.
Published: (2017)
by: Wan Nurul Safawati, Wan Manan, et al.
Published: (2017)
A secure audio steganography approach
by: Zamani, Mazdak, et al.
Published: (2009)
by: Zamani, Mazdak, et al.
Published: (2009)
Secure software architecture approach for role-based access control using aspect-oriented design
by: Saeed Hazaa, Muneer Abdullah
Published: (2010)
by: Saeed Hazaa, Muneer Abdullah
Published: (2010)
Service oriented model driven architecture for dynamic workflow changes
by: Pudhota, Leo, et al.
Published: (2005)
by: Pudhota, Leo, et al.
Published: (2005)
Enhancement of multicast network security
by: Ali, Sellami, et al.
Published: (2013)
by: Ali, Sellami, et al.
Published: (2013)
Case Study On Hewlett Packard (HP) : Service Oriented Architecture (SOA) To Achieve Business Competitiveness And Globalization
by: Ng, Mei Chin
Published: (2005)
by: Ng, Mei Chin
Published: (2005)
Data-Driven on Resilient Network Security Against SYN Flood Attacks at PT PUSRI
by: Misinem, ., et al.
Published: (2024)
by: Misinem, ., et al.
Published: (2024)
An overview of ATM systems security
by: Alharaki, Omarah Omar, et al.
Published: (2011)
by: Alharaki, Omarah Omar, et al.
Published: (2011)
Postprocessing algorithm for security features extraction
by: Rozita, Mohd Yusof, et al.
Published: (2012)
by: Rozita, Mohd Yusof, et al.
Published: (2012)
Multibiometric systems and template security survey
by: Khalaf, Emad Taha, et al.
Published: (2015)
by: Khalaf, Emad Taha, et al.
Published: (2015)
A review on cloud computing security
by: Teo, Marry, et al.
Published: (2018)
by: Teo, Marry, et al.
Published: (2018)
The Effect of Security and Privacy Perceptions on Customers' Trust to Accept Internet Banking Services An Extension of TAM
by: Mohamrned A, Al-Sharafi, et al.
Published: (2016)
by: Mohamrned A, Al-Sharafi, et al.
Published: (2016)
An Autonomic Service Oriented Architecture in Computational Engineering Framework
by: M. A. C., Bhakti, et al.
Published: (2010)
by: M. A. C., Bhakti, et al.
Published: (2010)
A review of challenges and security risks of cloud computing
by: Hussam Alddin S., Ahmed, et al.
Published: (2017)
by: Hussam Alddin S., Ahmed, et al.
Published: (2017)
An architecture framework for enhanced wireless sensor network security
by: Radmand, Pedram
Published: (2012)
by: Radmand, Pedram
Published: (2012)
Embedded processor security
by: d'Auriol, Brian J., et al.
Published: (2007)
by: d'Auriol, Brian J., et al.
Published: (2007)
Secure IPv6 address generation
by: -, Nashrul Hakiem, et al.
Published: (2011)
by: -, Nashrul Hakiem, et al.
Published: (2011)
Need to address and enhance food security
by: Khen, Han Ming
Published: (2016)
by: Khen, Han Ming
Published: (2016)
Blockchain technology for security issues and challenges in IoT
by: Kumar, Nallapaneni Manoj, et al.
Published: (2018)
by: Kumar, Nallapaneni Manoj, et al.
Published: (2018)
Data Security Issues In Cloud Computing: Review
by: Ahmed, Hussam Alddin Shihab, et al.
Published: (2016)
by: Ahmed, Hussam Alddin Shihab, et al.
Published: (2016)
Similar Items
-
Securing the Calea architecture against denial of service attacks
by: Lim, Kong Hua
Published: (2011) -
Developmental approaches covering context area mobile applications service oriented architecture and model driven architecture
by: Kim, Haeng Kon, et al.
Published: (2016) -
Designing a logical security framework for enterprise service oriented architecture (ESOA)
by: Kalantari, Alaeddin
Published: (2009) -
Next generation security operation center framework
by: Mohamad Fadli, Zolkipli, et al.
Published: (2018) -
A Data-Driven and Modular Flask-Based Architecture for Secure and
Intelligent Programming Education Powered by LLMs
by: J., Ranjith, et al.
Published: (2025)