2016 IEEE Symposium Series on Computational Intelligence (SSCI) 2016
DOI: 10.1109/ssci.2016.7850077
|View full text |Cite
|
Sign up to set email alerts
|

Interoperability of security and quality of Service Policies Over Tactical SOA

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 29 publications
0
2
0
Order By: Relevance
“…Hence, the Current Value Matrices corresponding to the two subjects are respectively CV A = [5,5,4,1] and CV B = [6,8,4,7]. The same normalization technique and the same weights are applied also to these matrices as denoted in Equation ( 4).…”
Section: An Example Use Casementioning
confidence: 99%
See 1 more Smart Citation
“…Hence, the Current Value Matrices corresponding to the two subjects are respectively CV A = [5,5,4,1] and CV B = [6,8,4,7]. The same normalization technique and the same weights are applied also to these matrices as denoted in Equation ( 4).…”
Section: An Example Use Casementioning
confidence: 99%
“…Moreover, the fact that the edge nodes generally present substantial constraints, in terms related to the size of memory and buffers, computational power, battery life and available interfaces [2], can also be an obstruction in the policy enforcement. Thus, protecting and regulating access over the data, as mentioned above, becomes a challenging task [5][6][7][8]. Managing security policies in such an environment requires an effective and efficient access control mechanism to be in place in order to provide suitable monitoring, control and audit solutions for managing data flows across communication and control links but also access to services.…”
Section: Introductionmentioning
confidence: 99%