O'Reilly logo

SOA Design Patterns by Thomas Erl

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 20 Service Interaction Security Patterns

When designing mission-critical enterprise solutions, which are often comprised of complex service compositions, services can be subjected to a variety of different usage scenarios, each of which can introduce unique security risks and requirements. Designing effective compositions therefore requires that services be prepared for a range of runtime interaction security challenges.

The upcoming Data Confidentiality (641) and Data Origin Authentication (649) patterns focus on applying security ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required