{"id":"https://openalex.org/W2523014973","doi":"https://doi.org/10.1109/ssic.2016.7571813","title":"Securing tactical service oriented architectures","display_name":"Securing tactical service oriented architectures","publication_year":2016,"publication_date":"2016-07-01","ids":{"openalex":"https://openalex.org/W2523014973","doi":"https://doi.org/10.1109/ssic.2016.7571813","mag":"2523014973"},"language":"en","primary_location":{"id":"doi:10.1109/ssic.2016.7571813","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ssic.2016.7571813","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2016 International Conference on Security of Smart Cities, Industrial Control System and Communications (SSIC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"http://hdl.handle.net/11250/2485672","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5071334624","display_name":"Vasileios Gkioulos","orcid":"https://orcid.org/0000-0001-7304-3835"},"institutions":[{"id":"https://openalex.org/I204778367","display_name":"Norwegian University of Science and Technology","ror":"https://ror.org/05xg72x27","country_code":"NO","type":"education","lineage":["https://openalex.org/I204778367"]}],"countries":["NO"],"is_corresponding":true,"raw_author_name":"Vasileios Gkioulos","raw_affiliation_strings":["Norwegian Information Security Laboratory, NTNU Norwegian University of Science and Technology, Norway"],"affiliations":[{"raw_affiliation_string":"Norwegian Information Security Laboratory, NTNU Norwegian University of Science and Technology, Norway","institution_ids":["https://openalex.org/I204778367"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5013455841","display_name":"Stephen D. Wolthusen","orcid":null},"institutions":[{"id":"https://openalex.org/I184558857","display_name":"Royal Holloway University of London","ror":"https://ror.org/04g2vpn86","country_code":"GB","type":"education","lineage":["https://openalex.org/I124357947","https://openalex.org/I184558857"]},{"id":"https://openalex.org/I204778367","display_name":"Norwegian University of Science and Technology","ror":"https://ror.org/05xg72x27","country_code":"NO","type":"education","lineage":["https://openalex.org/I204778367"]}],"countries":["GB","NO"],"is_corresponding":false,"raw_author_name":"Stephen D. Wolthusen","raw_affiliation_strings":["Norwegian Information Security Laboratory, NTNU Norwegian University of Science and Technology, Norway","Royal Holloway, University of London, United Kingdom"],"affiliations":[{"raw_affiliation_string":"Norwegian Information Security Laboratory, NTNU Norwegian University of Science and Technology, Norway","institution_ids":["https://openalex.org/I204778367"]},{"raw_affiliation_string":"Royal Holloway, University of London, United Kingdom","institution_ids":["https://openalex.org/I184558857"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5071334624"],"corresponding_institution_ids":["https://openalex.org/I204778367"],"apc_list":null,"apc_paid":null,"fwci":1.7719,"has_fulltext":false,"cited_by_count":8,"citation_normalized_percentile":{"value":0.87121405,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":"7221","issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11896","display_name":"Opportunistic and Delay-Tolerant Networks","score":0.9940000176429749,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11896","display_name":"Opportunistic and Delay-Tolerant Networks","score":0.9940000176429749,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9897000193595886,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10772","display_name":"Distributed systems and fault tolerance","score":0.9847000241279602,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6494379043579102},{"id":"https://openalex.org/keywords/service-oriented-architecture","display_name":"Service-oriented architecture","score":0.4978184700012207},{"id":"https://openalex.org/keywords/service","display_name":"Service (business)","score":0.41259047389030457},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3228132128715515},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.3215717077255249},{"id":"https://openalex.org/keywords/web-service","display_name":"Web service","score":0.19088098406791687},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.15803980827331543},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.11484122276306152}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6494379043579102},{"id":"https://openalex.org/C57041688","wikidata":"https://www.wikidata.org/wiki/Q220644","display_name":"Service-oriented architecture","level":3,"score":0.4978184700012207},{"id":"https://openalex.org/C2780378061","wikidata":"https://www.wikidata.org/wiki/Q25351891","display_name":"Service (business)","level":2,"score":0.41259047389030457},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3228132128715515},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.3215717077255249},{"id":"https://openalex.org/C35578498","wikidata":"https://www.wikidata.org/wiki/Q193424","display_name":"Web service","level":2,"score":0.19088098406791687},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.15803980827331543},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.11484122276306152},{"id":"https://openalex.org/C162853370","wikidata":"https://www.wikidata.org/wiki/Q39809","display_name":"Marketing","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/ssic.2016.7571813","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ssic.2016.7571813","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2016 International Conference on Security of Smart Cities, Industrial Control System and Communications (SSIC)","raw_type":"proceedings-article"},{"id":"pmh:oai:brage.bibsys.no:11250/2485672","is_oa":true,"landing_page_url":"http://hdl.handle.net/11250/2485672","pdf_url":null,"source":{"id":"https://openalex.org/S4306401716","display_name":"Duo Research Archive (University of Oslo)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I184942183","host_organization_name":"University of Oslo","host_organization_lineage":["https://openalex.org/I184942183"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"info:eu-repo/semantics/doctoralThesis"}],"best_oa_location":{"id":"pmh:oai:brage.bibsys.no:11250/2485672","is_oa":true,"landing_page_url":"http://hdl.handle.net/11250/2485672","pdf_url":null,"source":{"id":"https://openalex.org/S4306401716","display_name":"Duo Research Archive (University of Oslo)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I184942183","host_organization_name":"University of Oslo","host_organization_lineage":["https://openalex.org/I184942183"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"info:eu-repo/semantics/doctoralThesis"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/12","display_name":"Responsible consumption and production","score":0.6100000143051147}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":22,"referenced_works":["https://openalex.org/W16086859","https://openalex.org/W152287746","https://openalex.org/W292857952","https://openalex.org/W1492598074","https://openalex.org/W1559424115","https://openalex.org/W1791702618","https://openalex.org/W1862028050","https://openalex.org/W2096736367","https://openalex.org/W2120524437","https://openalex.org/W2127839201","https://openalex.org/W2147196595","https://openalex.org/W2147872058","https://openalex.org/W2162003101","https://openalex.org/W2163077124","https://openalex.org/W2530425404","https://openalex.org/W2531752537","https://openalex.org/W2565809403","https://openalex.org/W6629265166","https://openalex.org/W6638317698","https://openalex.org/W6638963800","https://openalex.org/W6728206351","https://openalex.org/W6730995707"],"related_works":["https://openalex.org/W3007967230","https://openalex.org/W2030496847","https://openalex.org/W4313313264","https://openalex.org/W1522116655","https://openalex.org/W34821888","https://openalex.org/W2096524829","https://openalex.org/W2075555097","https://openalex.org/W2578468119","https://openalex.org/W2095337749","https://openalex.org/W2164832979"],"abstract_inverted_index":{"Service":[0],"Oriented":[1],"Architectures":[2],"have":[3],"been":[4],"increasingly":[5],"evaluated":[6],"and":[7,39,59,77],"applied":[8],"within":[9],"military":[10],"networks.":[11],"However,":[12],"existing":[13],"implementations":[14],"tend":[15],"to":[16,35,44,95],"overlook":[17],"the":[18,21,45,51,66,72,102,106,114],"constraints":[19,38,67],"of":[20,27,53,68,81,105,117],"tactical":[22,46,69],"environment,":[23],"generating":[24],"unsuitable":[25],"requirements":[26],"network":[28,97],"resources.":[29],"The":[30],"ongoing":[31],"TACTICS":[32],"project":[33],"aims":[34],"study":[36],"these":[37],"propose":[40],"solutions":[41],"suitably":[42],"adjusted":[43],"ecosystem.":[47],"Under":[48],"this":[49,62],"scope,":[50],"implementation":[52],"security":[54,84,89,108],"architectures":[55],"presents":[56],"significant":[57],"challenges":[58],"limitations.":[60],"In":[61],"article":[63],"we":[64,100],"analyse":[65],"SoA":[70],"over":[71],"entire":[73],"mission":[74],"life":[75],"cycle":[76],"derive":[78],"a":[79,88],"set":[80],"fine":[82],"granularity":[83],"requirements,":[85],"such":[86],"that":[87],"policy":[90,118],"mechanism":[91],"may":[92],"optimally":[93],"adjust":[94],"dynamic":[96],"conditions.":[98],"Furthermore,":[99],"present":[101],"requisite":[103],"characteristics":[104],"developed":[107],"mechanisms,":[109],"which":[110],"are":[111],"crucial":[112],"for":[113],"real-time":[115],"computation":[116],"decisions":[119],"based":[120],"on":[121],"current":[122],"situational":[123],"knowledge.":[124]},"counts_by_year":[{"year":2022,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2017,"cited_by_count":4},{"year":2016,"cited_by_count":2}],"updated_date":"2026-04-05T17:49:38.594831","created_date":"2025-10-10T00:00:00"}
