1,222
Views
1
CrossRef citations to date
0
Altmetric
Articles

Security framework for dynamic service-oriented IT systems

&
Pages 428-448 | Received 29 Nov 2017, Accepted 20 May 2018, Published online: 04 Jun 2018

Figures & data

Figure 1. SOA layered architecture.

Figure 1. SOA layered architecture.

Table 1. The security evaluation requirements for each of the SOA functional layers (selection) (Kołaczek, Citation2013).

Figure 2. Architecture of multi-agent system for evaluation of the security level in service-oriented systems.

Figure 2. Architecture of multi-agent system for evaluation of the security level in service-oriented systems.

Figure 3. The opinion triangle (Josang, Citation1999).

Figure 3. The opinion triangle (Josang, Citation1999).

Figure 4. Structure of the composite services. (a) ring, (b) ring + additional connection, (c) ring + two additional connections and (d) random connections.

Figure 4. Structure of the composite services. (a) ring, (b) ring + additional connection, (c) ring + two additional connections and (d) random connections.

Table 2. Moran-I test results for examined topologies.

Table 3. Local Moran-I test results summary.

Figure 5. Correlation of spatial data communication traffic generated for the four selected structures of complex service. (a) ring network correlogram, (b) ring +1 network correlogram, (c) ring +2 network correlogram and (d) random network correlogram.

Figure 5. Correlation of spatial data communication traffic generated for the four selected structures of complex service. (a) ring network correlogram, (b) ring +1 network correlogram, (c) ring +2 network correlogram and (d) random network correlogram.