Security in Service Oriented Architectures – Volatility-Based Hedging Support System


  • Cristina Ana Toderoiu IT&C Security Master Department of Economic Informatics and Cybernetics The Bucharest University of Economic Studies


Architecture, Service Orientation, Restful APIs, Certificates, Database Security, Cross-Site Request Forgery, Cross-Origin Resource Sharing


The nature of today’s communication pattern has reverberated on all technical aspects, making them distributed in order to satisfy the need for immediate consumption of quality content. This is especially visible in the enterprise world, where latency reflects directly into financial results and, potentially, the survival of specific entities that are in tight competition. As people has discovered that by intertwining their thoughts through the means of social media is beneficial, enterprises have evolved towards a similar direction, of communicating with each other using services. Securing such Service Oriented Architectures presents a series of concerns, which are the main topic of the following paper.


Mulesoft, "Service Oriented Architecture - Security Matters," Mulesoft, [Online]. Available: [Accessed 3 May 2015]

C. P. Pfleeger, S. L. Pfleeger and J. Margulies, Security in Computing, Fifth Edition, Upper Saddle River: Prentice Hall, 2015

E. C. Foster and S. V. Godbole, Database Administration, New York City: Apress, 2014

OWASP, "OWASP Top 10," OWASP, 16 December 2014. [Online]. Available: [Accessed 3 May 2015]

R. Enríquez and A. Salazar, RESTful Java Web Services Security, Birmingham: Packt Publishing, 2014

Y. E. Liang, JavaScript Security, Birmingham: Packt Publishing, 2014.

S. Natenberg, Option Volatility and Pricing: Advanced Trading Strategies and Techniques, 2nd Edition, New York City: McGraw-Hill, 2014.

Google, "Mustache Security," Google, 26 September 2014. [Online]. Available: [Accessed 3 May 2015]




How to Cite

Toderoiu, C. A. (2015). Security in Service Oriented Architectures – Volatility-Based Hedging Support System. Journal of Mobile, Embedded and Distributed Systems, 7(3), 136-141. Retrieved from