Please use this identifier to cite or link to this item: http://ir.futminna.edu.ng:8080/jspui/handle/123456789/28483
Full metadata record
DC FieldValueLanguage
dc.contributor.authorAhmad, Suleiman-
dc.date.accessioned2024-05-16T12:38:04Z-
dc.date.available2024-05-16T12:38:04Z-
dc.date.issued2012-
dc.identifier.citationAhmad Suleiman (2012) Cryptographic Modeling In Service Level Agreement, International journal of engineering science & advanced technology [ijesat], Volume 2, Issue 3, Page 754 - 759en_US
dc.identifier.issnhttp://www.ijesat.org-
dc.identifier.urihttp://repository.futminna.edu.ng:8080/jspui/handle/123456789/28483-
dc.description.abstractSupporting business services through Electronic Service Delivery System (ESDS) as part of service-oriented architectures (SOA) involves business performance monitoring requirements, and their implementation results in developmental activities. A model-driven approach to the development of monitored of a well secured E-Messaging which focus on supporting the specification and transformation of information to an executable implementation in a secured order was designed.en_US
dc.language.isoenen_US
dc.publisherINTERNATIONAL JOURNAL OF ENGINEERING SCIENCE & ADVANCED TECHNOLOGY [IJESAT]en_US
dc.relation.ispartofseriesISSN: 2250–3676;Page 754 - 759-
dc.subjectE- Messagingen_US
dc.subjectCryptographyen_US
dc.subjectSOAen_US
dc.subjectESDSen_US
dc.subjectPANDAen_US
dc.subjectSBSen_US
dc.subjectSLAen_US
dc.titleCRYPTOGRAPHIC MODELING IN SERVICE LEVEL AGREEMENTen_US
dc.typeArticleen_US
Appears in Collections:Cyber Security Science

Files in This Item:
File Description SizeFormat 
IJESAT_2012_02_03_59.pdf533.77 kBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.