Q: 13
The Data Origin Authentication pattern is applied to services throughout a service inventory. As a
result, if malicious service intermediaries change data within messages exchanged by these services,
such changes will be detected.
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.