Abstract
This paper provides an overview of the security features and attributes presented in the software communications architecture (SCA) security supplement along with implementation recommendations. Hardware based security policy enforcement and flexible downloadable security policy mechanisms are also discussed. The paper concludes by presenting an innovative communications architecture that is compliant with the SCA security supplement.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have