International Journal of Computer
& Organization Trends

Research Article | Open Access | Download PDF

Volume 6 | Issue 4 | Year 2016 | Article Id. IJCOT-V35P304 | DOI : https://doi.org/10.14445/22492593/IJCOT-V35P304

Model Driven Architecture based Agile Modelled Layered Security Architecture for Web Services Extended to Cloud, Big Data and IOT


Dr.D.Shravani

Citation :

Dr.D.Shravani, "Model Driven Architecture based Agile Modelled Layered Security Architecture for Web Services Extended to Cloud, Big Data and IOT," International Journal of Computer & Organization Trends (IJCOT), vol. 6, no. 4, pp. 55-64, 2016. Crossref, https://doi.org/10.14445/22492593/IJCOT-V35P304

Abstract

This research paper consists of Model Driven Architecture based Agile Security Architecture for Web Services extended to Cloud, Big Data and IOT.

Keywords

Security Engineering, Security Architectures, Web Services, Cloud Computing, Big Data, IOT.

References

[1] Frank Innerhofer-Oberperfler, Markus Mitterer, et al [2009], “Security Analysis of Service Oriented Systems – A Methodical Approach and Case Study”, IGI Global, Information Science Reference, DOI:10.4018/978-1-60566-950-2.ch002, pp. 33 – 56.
[2] George Spanoudakis and Andrea Zisman [2010] ,“Discovering Services during Service-Based System Design Using UML”, IEEE Transactions on Software Engineering, Vol 36, No.3, May/June 2010, PP 371 – 389.
[3] Giorgia Lodi, Leonardo Querzoni, Roberto Beraldi, Roberto Baldoni [2008], “Combining Service-Oriented and Event-driven architectures for Designing Dependable systems”, pp. 1 – 13.
[4] Gunnar Peterson, LLC, 2007 “Security Architecture Blueprint”, Arctec Group, a White Paper, pp. 1 - 6.
[5] G.Rayana Gouds, M.Sriivasa Rao and Akhilesh Soni [2009], “Semantic Firewall: An approach towards Autonomous Web Security in Service Oriented Environments”, International Journal of Recent Trends in Engineering, Vol. 1, No. 1,ACEEE Academy Publishers pp. May 2009 454— 458.
[6] Halvard Skogsrud [2009], “Modeling Trust Negotiation for Web Services”, IEEE, February 2009, pp. 1 – 6.
[7] Heiko Tillwick and Martin S Olivier [2004], “A Layered Security Architecture: Design Issues”, in Proceedings of the Fourth Annual Information Security South Africa Conference (ISSA2004) July 2004, pp. 1 – 4.
[8] Hiren Bhatt, Arup Dasgupta [2011],“The Disruptive Cloud”, Geo Spatial World, May 2011 pp. 20 – 28.
[9] Hohn S, Lowis L, Jurjens J, Accorsi R,, [2009], “Identification of vulnerabilities in Web Services using Model-based architecture”, IGI Global publishers, 2009, pp. 1 -32.
[10] Hossein Keramati, Seyed-Hassan Mirian-Hosseinabadi [2008], “Integrating software development security activities with agile methodologies," aiccsa, IEEE/ACS International Conference on Computer Systems and Applications pp.749-754.
[11] I. Lazar, B. Parv, S. Motogna, I.-G. Czibula, C.-L. Lazar [2007], “An Agile MDA approach for Executable UML Structured Activities”, Studia Univ. Babes-bolyai, Informatics, vol. LII, No. 2, , pp.111-114.
[12] Jameela Al-Jaroodi, Alyaziyah Al-dhaheri [2011) “Security issues of Service-oriented middleware”, In International Journal of Computer Science and Network Security Vol 2 No 1, pp. 153 – 160.
[13] James S.Tiller [2011], “Adaptive Security management Architecture”, Auerbach Publications, pp. 1 – 14.
[14] Jeremy Epstein, Scott Matsumotto and Gary McGraw [2006], “Software Security and SOA: Danger, Will Robinson”, IEEE Security and Privacy, January/February 2006, pp. 80–83.