Orchestrator model for system security

0Citations
Citations of this article
3Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Service Oriented Architecture recommends a better flexibility & increase efficiency by reusing the services. But it also increases the complexity w.r.t. Security. In today's era Orchestration is basic requirement for the service based security. Orchestration is a key control mechanism that invokes Services to work, as well as to provide control. In this paper we are going to represent the service interface for security constraints which will make their composition safe. Main aim is to the increase reusability and quickness, bring down difficulty, increase advanced extensibility and improved scalability and reliability. In this paper we are introducing a new model which consists of Services, security and Orchestration together to improve the Security services. © 2011 Springer-Verlag Berlin Heidelberg.

Author supplied keywords

Cite

CITATION STYLE

APA

Goutam, A., Rajkamal, & Ingle, M. (2011). Orchestrator model for system security. In Communications in Computer and Information Science (Vol. 125 CCIS, pp. 195–199). https://doi.org/10.1007/978-3-642-18440-6_24

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free