Abstract

This paper provides an overview of the security features and attributes presented in the software communications architecture (SCA) security supplement along with implementation recommendations. Hardware based security policy enforcement and flexible downloadable security policy mechanisms are also discussed. The paper concludes by presenting an innovative communications architecture that is compliant with the SCA security supplement.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call