This work presents a detailed analysis of the security requirements for Service Oriented Architecture in mobile computing, still missing in the current literature. The purpose of this work is twofold. First, to provide protocol architects and software engineers with a map of security requirements in ubiquitous computing, through the evaluation of existing protocols and architectures. Second, to highlight architectural issues, including technologies and trade offs, in the design and implementation of a secure service oriented architecture for ubiquitous computing.
Security Requirements in Service Oriented Architectures for Ubiquitous Computing / Cotroneo, Domenico; A., Graziano; Russo, Stefano. - STAMPA. - (2004), pp. 172-177. (Intervento presentato al convegno Int. Workshop on Middleware for Pervasing and Ad-Hoc Computing tenutosi a Toronto, Canada nel ottobre 2004) [10.1145/1028509.1028522].
Security Requirements in Service Oriented Architectures for Ubiquitous Computing
COTRONEO, DOMENICO;RUSSO, STEFANO
2004
Abstract
This work presents a detailed analysis of the security requirements for Service Oriented Architecture in mobile computing, still missing in the current literature. The purpose of this work is twofold. First, to provide protocol architects and software engineers with a map of security requirements in ubiquitous computing, through the evaluation of existing protocols and architectures. Second, to highlight architectural issues, including technologies and trade offs, in the design and implementation of a secure service oriented architecture for ubiquitous computing.I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.