Chapter 20 Service Interaction Security Patterns

When designing mission-critical enterprise solutions, which are often comprised of complex service compositions, services can be subjected to a variety of different usage scenarios, each of which can introduce unique security risks and requirements. Designing effective compositions therefore requires that services be prepared for a range of runtime interaction security challenges.

The upcoming Data Confidentiality (641) and Data Origin Authentication (649) patterns focus on applying security ...

Get SOA Design Patterns now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.