Government agencies and enterprises operates and runs their
business on networked-yet-distributed computing systems as they
seek for improved scalability, availability, portability and
connectivity. Information on-transit (messaging, SOA, EDI and EAI
data) and at-rest (local and network persistence data) are critical
and confidential data that should never be seen or tampered by
unauthorized parties. Naturally, these systems do not provide
effective security measures in view of data confidentiality,
privacy, integrity and source identity.