Please use this identifier to cite or link to this item:
http://ir.futminna.edu.ng:8080/jspui/handle/123456789/28483
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Ahmad, Suleiman | - |
dc.date.accessioned | 2024-05-16T12:38:04Z | - |
dc.date.available | 2024-05-16T12:38:04Z | - |
dc.date.issued | 2012 | - |
dc.identifier.citation | Ahmad Suleiman (2012) Cryptographic Modeling In Service Level Agreement, International journal of engineering science & advanced technology [ijesat], Volume 2, Issue 3, Page 754 - 759 | en_US |
dc.identifier.issn | http://www.ijesat.org | - |
dc.identifier.uri | http://repository.futminna.edu.ng:8080/jspui/handle/123456789/28483 | - |
dc.description.abstract | Supporting business services through Electronic Service Delivery System (ESDS) as part of service-oriented architectures (SOA) involves business performance monitoring requirements, and their implementation results in developmental activities. A model-driven approach to the development of monitored of a well secured E-Messaging which focus on supporting the specification and transformation of information to an executable implementation in a secured order was designed. | en_US |
dc.language.iso | en | en_US |
dc.publisher | INTERNATIONAL JOURNAL OF ENGINEERING SCIENCE & ADVANCED TECHNOLOGY [IJESAT] | en_US |
dc.relation.ispartofseries | ISSN: 2250–3676;Page 754 - 759 | - |
dc.subject | E- Messaging | en_US |
dc.subject | Cryptography | en_US |
dc.subject | SOA | en_US |
dc.subject | ESDS | en_US |
dc.subject | PANDA | en_US |
dc.subject | SBS | en_US |
dc.subject | SLA | en_US |
dc.title | CRYPTOGRAPHIC MODELING IN SERVICE LEVEL AGREEMENT | en_US |
dc.type | Article | en_US |
Appears in Collections: | Cyber Security Science |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
IJESAT_2012_02_03_59.pdf | 533.77 kB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.