A Novel Service Oriented Architecture (SOA) to Secure Services in E-City

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Service Oriented Architecture Maturity Models: A guide to SOA Adoption?

To support the difficult process of SOA adoption, SOA maturity models are published. In this thesis a literature analysis introduces the area of SOA maturity models and highlights benefits and criticism. As a result, the combined SOA maturity model (CSOAMM), a model to facilitate the interpretation and comparison of SOA maturity models, is proposed. CSOAMM is a model with 10 levels that describ...

متن کامل

Service Oriented Architecture ( SOA ) Adoption Phases : A Case Study

The paper argues that attitudes to SOA follow a typical hype cycle from Technological Trigger, Peak of Inflated Expectations, and a Trough of Disillusionment to the more recent realisation that SOA is a concept that may offer certain benefits but has several limitations. The main research question studies how the attitude to SOA changes in various phases of the hype cycle, how the SOA implement...

متن کامل

Towards a Service-Oriented Architecture (SOA) for Performance-Aware Mobile Grid Services

When using grid technologies for scientific and nonscientific applications, ubiquitous access to these applications is useful for many scenarios. Hereby mobile devices provide a technology supporting this aim. By addressing multimedia integration into these services (like video streaming), the Quality of Service (QoS) is a major cause for user experience (QoE) and acceptance. The aim of this pa...

متن کامل

investigating security in developed information systems through service oriented architecture (soa)

the advantages and special characteristics of service oriented architecture and expansion of employing such architecture have brought security topics which are different in some cases from the security principles of traditional information systems. in this article our aim is the examination of various indices of security and the presentation of strategies for security in information systems by ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Security, Privacy and Trust Management

سال: 2013

ISSN: 2319-4103,2277-5498

DOI: 10.5121/ijsptm.2013.2602