Figures & data
Table 1. The security evaluation requirements for each of the SOA functional layers (selection) (Kołaczek, Citation2013).
Figure 2. Architecture of multi-agent system for evaluation of the security level in service-oriented systems.
![Figure 2. Architecture of multi-agent system for evaluation of the security level in service-oriented systems.](/cms/asset/605baf96-8cf3-4dde-9f25-bc5373a961d0/tjit_a_1479926_f0002_ob.jpg)
Figure 3. The opinion triangle (Josang, Citation1999).
![Figure 3. The opinion triangle (Josang, Citation1999).](/cms/asset/ef40e04f-456b-41e8-8dac-613b6595af33/tjit_a_1479926_f0003_ob.jpg)
Figure 4. Structure of the composite services. (a) ring, (b) ring + additional connection, (c) ring + two additional connections and (d) random connections.
![Figure 4. Structure of the composite services. (a) ring, (b) ring + additional connection, (c) ring + two additional connections and (d) random connections.](/cms/asset/d6508dd5-c7f1-4746-8add-4dfcb7b32231/tjit_a_1479926_f0004_oc.jpg)
Table 2. Moran-I test results for examined topologies.
Table 3. Local Moran-I test results summary.
Figure 5. Correlation of spatial data communication traffic generated for the four selected structures of complex service. (a) ring network correlogram, (b) ring +1 network correlogram, (c) ring +2 network correlogram and (d) random network correlogram.
![Figure 5. Correlation of spatial data communication traffic generated for the four selected structures of complex service. (a) ring network correlogram, (b) ring +1 network correlogram, (c) ring +2 network correlogram and (d) random network correlogram.](/cms/asset/5c95ffb8-b268-4d0f-9229-212a24485802/tjit_a_1479926_f0005_ob.jpg)