×
Log in
Upload File
Most Popular
Study
Business
Design
Technology
Travel
Explore all categories
The top documents tagged [invoked services]
Monitoring-Based System for E2E Security Auditing and Enforcement in Trusted and Untrusted SOA
223 views
Introduction to UDDI From: OASIS, Introduction to UDDI: Important Features and Functional Concepts.
232 views
Northrop Grumman Cybersecurity Research Consortium (NGCRC) Spring 2014 Symposium 28 May 2014 Bharat Bhargava Purdue University End-to-End Security Policy
216 views
Automating SLA Modelling
52 views