Dependable Privacy Management for Web Services extended to Cloud Big Data and IOT
International Journal of Geoinformatics and Geological Science |
© 2016 by SSRG - IJGGS Journal |
Volume 3 Issue 3 |
Year of Publication : 2016 |
Authors : Dr.D.Shravani |
How to Cite?
Dr.D.Shravani, "Dependable Privacy Management for Web Services extended to Cloud Big Data and IOT," SSRG International Journal of Geoinformatics and Geological Science, vol. 3, no. 3, pp. 18-27, 2016. Crossref, https://doi.org/10.14445/23939206/IJGGS-V3I6P102
Abstract:
This research paper deals with Dependable privacy management for Web Services Security Architecture Design extended to Cloud, Big Data and IOT.
Keywords:
Security Engineering, Security Architectures, Web Services, Cloud Computing, Big Data, IOT.
References:
[1] Martin Naedele [2003], “Standards for XML and Web Services Security”, IEEE April 2003, pp. 6 – 14.
[2] Mark Harman, Afshin Mansouri [2010], “Search based Software Engineering Introduction to the special issue of the IEEE Transactions on Software Engineering”, November December 2010, pp. 737 – 741.
[3] Massimo Barloletti, Pierpaolo Degano, Gian Luigi Ferrari, Roberto Zunino [2008] , “Semantics-Based Design for Secure Web Services”, IEEE Transactions on Software Engineering, Vol 34, No.1, January 2008, pp. 33 – 49.
[4] Matt Bishop [2003], “Computer Security Art and Science”, Pearson education, pp. 56 – 97.
[5] Meiko Jenson, Nils Gruschke, Ralph Herkenhoner [2009], “A Survey on attack of Web Services Classification and Counter measures”, Journal Computer Science Research and Development Vol 24 No 4, November 2009, pp. 185 – 197.
[6] Michael S Kirkpatrick, Elisa Betrino [2010], “Enforcing Spatial Constraints for Mobile RBAC Systems”, ACM 2010 SACMAT10, June 9-11, 2010, Pittsburg, USA, 99. 1 –6.
[7] Michael Juntao Yuan, 2004, “Enterprise J2ME Developing Mobile Java Applications”, Pearson Education Inc., ISBN 81-297-0694-6, pp. 145 – 196.
[8] Michele Barletta, Alberto Calvi, Silvio Ranise, Luca Vigano, Luca Zanetti [2011], “Workflow and access control reloaded. A declarative specification framework for the automated analysis of web services” Scalable Computing Volume 12 Number 1 pp. 1-20.
[9] Mokbel M.S., Jiajin. L, [2005 – 2008] “Integrated Security Architecture for Web Services and this challenging”, Journal of Theoretical and Applied Information Technology JATIT, pp 518 – 525.
[10] Mouratidis and Giorgini [2007], “Security and Software Engineering: Advances and Future Vision.” Idea Group Publishing Inc., pp. 1 – 17.
[11] Mordinyi, R.Kuhn, E Schatten [2010], “Towards an Architectural Framework for Agile Software Development” in IEEE 17th International Conference and Workshop on Engineering of Computer Based Systems (ECBS), pp. 276-280.
[12] Munindar P.Singh, Michael N.Huhns [2005], “Service Oriented Computing, Semantics, Processes, Agents”, John Wiley & Sons, Ltd, pp. 45 – 97..
[13] Murat Gunestas, Dumminda Wijesekera [2009], “Forensics over Web Services: The FWS”, IGI Global, Information Science Reference, DOI:10.4018/978-1-60566-950- 2.ch005, 83 – 98.
[14] Nakamura Y, Tatsubori M, Imamura T, Ono K, SCC [2005] ,“Model driven Security based on a Web Services Security Architecture”, proceedings of the 2005 IEEE International Conferences on Services Computing, pp. 1 – 15.
[15] Nico Brehm, JorgeMarx Gomez [2009] , “Secure Service Rating in Federated Software Systems based on SOA”, IGI Global, Information Science Reference, DOI:10.4018/978- 1-60566-950-2.ch004, pp. 83 - 98. R. E. Sorace, V. S. Reinhardt, and S. A. Vaughn, “High-speed digital-to-RF converter,” U.S. Patent 5 668 842, Sept. 16, 1997.