Introduction to Agile Security Architecture Model
International Journal of Computer Science and Engineering |
© 2014 by SSRG - IJCSE Journal |
Volume 1 Issue 5 |
Year of Publication : 2014 |
Authors : M.Upendra Kumar |
How to Cite?
M.Upendra Kumar, "Introduction to Agile Security Architecture Model," SSRG International Journal of Computer Science and Engineering , vol. 1, no. 5, pp. 9-13, 2014. Crossref, https://doi.org/10.14445/23488387/IJCSE-V1I5P103
Abstract:
In this paper, Introduction to paper title is presented, with some main concepts like Software Engineering, Security Engineering, Software Architecture, Security Architecture, Layered Pattern, Model Driven Architecture (MDA), Agile Software Development, Designing Solutions, Dependable Privacy Requirements, Next Generation Secure Web Engineering Applications Case Study using Agile Modelling, Web Services, and Web 2.0. Finally, motivation of the paper, organization of the paper is provided in this paper.
Keywords:
Security Architecture, Agile Modelling
References:
1. Grady Booch, James Rumbaugh, Ivar Jacobson,” The Unified Modeling Language User Guide”, Pearson education, ISBN 81-7808- 169-5, 1999, PP. 167.
2. Remco C de Boer, Hans van Vliet,” On the Similarity between Requirements and Architecture”, the Journal of Systems and Software, August 2008, PP. 1-6.
3. Erich Gamma, “Design Patterns Elements of Reusable Object Oriented Software”, Addison Wesley Publishers 2009, PP. 102.
4. Marwan Abi-Antoun, Jeffrey M.Barnes,”Enforcing Conformance between Security Architecture and Implementation”, CMU-ISR-09-113, April 2009, PP. 1-16.
5. Pekka Abrahamsson, Michele Marchesi, Frank Maurer,” Agile Processes in Software Engineering and Extreme Programming”, 10 th International Conference XP 2009, Springer Proceedings book Italy May 25-29 2009, PP. 2-3.
6. Patrizio pellicccione, Paolo Inverardi, Henry Muccini, ”CHARMY: A Framework for design and verifying architectural specifications”, IEEE Transactions on Software Engineering, Vol. 36, No. 3, May/June 2009, PP. 325 – 346.
7. Sabine Buckl, Ulrik Franke, Oliver Holschke, Florian Mattjes, Christian M.Schweda, Teodor Sommestad,”A Pattern-based Approach to Quantitative Enterprise Architecture Analysis”, Proceedings of 15 th American Conference on Information Systems, San Francisco, California, August 6 – 9 2009 PP. 1-11.
8. Amund Hunstad, Jonas Hallberg, “Design for securability – Applying Engineering Principles to the design of security architectures”, 2002, PP. 1-6.
9. Muchai Mutlugam, Ibrahim Sogukpinar, “Security Architecture for web based Health Insurance Systems”, IEEE International Conference, 2006, PP. 24.
10. Simon G.Brown, Frederick Yip, “Integrating Pattern Concepts & Network Security Architecture” IEEE 2006, PP. 1-8.
11. Durai Pandian M et. al, ”Information Security Architectures – Context aware Access Control Model for Educational Applications”, International Journal of Computer Science and Network Security, December 2006, PP. 112 - 118.
12. Gunnar Peterson, “Security Architecture Blueprint”, Arctec Group LLC, 2007, PP 1-12.
13. E.B. Fernandez, M.M. Larrondo, M. Vanhilst, “A Methodology to Develop Secure Systems Using Patterns”, Idea Group Inc. 2007, PP. 107-126.
14. Nobukazu Yoshioka, Hironori Washizaki and Katsuhisa Marutama, “A Survey on security patterns”, National Institute of informatics special issue No.5 2008, PP. 35-47.
15. Spyros T. Halkidis, Nikolaos Tsantalis, Alexander Chatzigeorgiou, George Stephanides, “Architectural Risk Analysis of Software Systems Based on Security Patterns”, 2008, IEEE Transactions on dependable and secure computing, vol. 5, no. 3, PP. 129-142.
16. S. Aravind Krishna, “Secure Application Architecture for Mobile Police Force”, CSI Communications May, 2009, PP. 56-58.
17. Stephan Bode, Anja Fischer, Winfried Kuhnhauser, Matthais Riebisch,”Software Architectural Design meets Security Engineering”, IEEE 2009 16 th Annual IEEE Conference and Workshop on the Engineering of Computer Based Systems, PP. 109 – 118.
18. S.Mischelle Oda, Huirong Fu, Ye Zhu, ”Enterprise Information Security Architecture A Review of Frameworks, Methodology, and Case Studies”, IEEE 2009 (978-1-4244-4520-2/09), PP. 333-337.
19. A.Cenys, A.Mormantas, L.Radvilavicius, “Designing role-based access control policies with UML”, Journal of Engineering Science and Technology Review 2009 PP. 48-50.
20. Michael VanHilst, Eduuardo B.Fernandez,” A Multi-Dimensional Classification for Users of Security Patterns”, Journal and Research and Practice in Information Technology, Vol.41, No.2, May 2009, PP.87-97.