Introduction to Web Services Security Architectures extended to Cloud, Big Data and Internet of Things IOT

International Journal of Computer Trends and Technology (IJCTT)          
© 2016 by IJCTT Journal
Volume-37 Number-3
Year of Publication : 2016
Authors : Dr.D.Shravani


Dr.D.Shravani "Introduction to Web Services Security Architectures extended to Cloud, Big Data and Internet of Things IOT". International Journal of Computer Trends and Technology (IJCTT) V37(3):123-132, July 2016. ISSN:2231-2803. Published by Seventh Sense Research Group.

Abstract -
This research paper provides introduction to the Web Services Security Architectures extended to Cloud, Big data and Internet of Things is given, with some main concepts like security, MDA, agile methodology and software architecture, Web Services Security Design etc.

[1] Alastair Airchison [2009], “Beginning Spatial with SQL Server 2008”, Apress Publisher, ISBN 978-1-4302-1829-6, Chapter 1, pp. 1 – 37.
[2] Alessandra Bagnato (Eds.), SEC MDA [2009], “Security in Model-Driven Architecture”, European workshop on Security in MDA 2009, Netherlands, ISSN No. 0929 – 0672. pp. 01 – 56.
[3] Anders Mattsson, Bjorm Lundell, Brian Lings, Brian Fitzgerald [2009], January/February 2009, “Linking Model-Driven Development and Software Architecture: A Case Study”, IEEE Transactions on Software Engineering, vol. 35, no. 1. pp. 83-93.
[4] Anoop Singhal, Theodore Winograd [2006], September 2006, "Guide to Secure Web Services”, National Institute of Standards and Technology (NIST) Draft, (800-95).
[5] Annekayem [2009], “Security in Service-Oriented Architectures: Standards and Challenges”, IGI Global, Information Science Reference, DOI:10.4018/978-1-60566-950-2.ch009, pp. 187 –211.
[6] Antonio Mano, Gimena Pujol, Antonio Munaz [2009], “Policy based Security Engineering of Service Oriented Systems”, IGI Global, Information Science Reference, DOI:10.4018/978-1-60566-950-2.ch006, pp. 118 – 133.
[7] Asoke K. Talukder and Manish Chaitanya [2009], “Architecting Secure Software System” CRC Press, chapter 2, pp. 45 – 90.
[8] A Mohammad, G.Kannan, R.Kannan, T Khdour, S.Bani-ahmad, A.Alarabeyyat, [2011], “Toward Access Control Model for Web Services applications” in International Journal of Research and Reviews in Computer Science (IJRRCS) Vol 2 No 2 pp. 253- 264.
[9] Barbara Russo, Maro Scotto, Alberto Silliti [2010], “Agile Technologies in Open Source Development” IGI Global publishers 2010, pp. 217 – 244.
[10] Basin D, Burri S J, Karjoth G [2011] ,“Separation of duties as a service”, Proceedings of the Sixth ACM Symposium on Information, Computer and Communications Security, ACM, China, pp. 1 – 7 .
[11] Bernard Menezes [2010], “Network Security and Cryptography”, Cengage Learning India Pvt. Ltd., ISBN 978-81-315-1349-1, pp. 245 – 290.
[12] Bhavani Thuraisingham [2011], “Secure Semantic Service Oriented Systems”, Auerbach Publications, Chapter 1, pp. 1 – 17.
[13] Bruce Powel Douglass [2009], “Real-Time Agility, the Harmony/ESW Method for Real-Time and Embedded Systems Development”, Copyright at 2009 Pearson Education, Inc., pp. 1-31.
[14] Carlos Gutierrez, Eduardo Fernandez-Medina, Mario Piattini [2009], “Web Services Security Development and Architecture: Theoretical and Practical issues”, IGI Global, Information Science Reference. ISBN 978-1-60566-950-2, pp. 1 – 14.
[15] Cenzic Inc., [2009], “Web Application Security Trend Reports”, A White Paper, pp. 1 – 4.

Security Engineering, Security Architectures, Web Services, Cloud Computing, Big Data, IOT.