Database Reference
In-Depth Information
Summary
In this chapter, we learned the various options to design and implement a security
solution for securing a BPEL process. We explored the security options and industry-
leading practices to implement authentication, authorization, data security in transit,
and denial of service attacks for SOA composite applications. In the next chapter, we
will learn the architecture options to implement high availability for business services.
Search WWH ::




Custom Search