Web Services Security Architectures for Secure Service Oriented Analysis and Design

  IJCOT-book-cover
 
International Journal of Computer Trends and Technology (IJCTT)          
 
© March to April Issue 2011 by IJCTT Journal
Volume-1 Issue-1                          
Year of Publication : 2011
Authors : D.Shravani, Dr.P.Suresh Varma, Dr.B.Padmaja Rani, K.Venkateswar Rao, M.Upendra Kumar.

MLA

D.Shravani, Dr.P.Suresh Varma, Dr.B.Padmaja Rani, K.Venkateswar Rao, M.Upendra Kumar. "Web Services Security Architectures for Secure Service Oriented Analysis and Design"International Journal of Computer Trends and Technology (IJCTT),V1(1):119-122 March to April Issue 2011 .ISSN 2231-2803.www.ijcttjournal.org. Published by Seventh Sense Research Group.

Abstract—T his paper discusses the researc h methodology on Web Services Security Architectures for Secure Service Oriented Analysis and Design. Initially we discuss about the Research Methodology for Designing Dependable Agile Layered Security Architecture Solutions for Web Services Security Archi tectures . Finally we discuss an implementation case study of ensuring data security architecture on Web Services Cloud.

References-

[1] Athula Ginge and San Murugesan, “Web Engineering: A Methodology for Developing Scalable, Maintainable Web Applications”, Cutter IT Journal Vol.14, No.7 pp. 24 - 35, July 2001
[2] Cenzic Inc., “Web Application Security Tren d Reports”, 2009.
[3] David Geer, “Taking Steps to Secure Web Services”, IEEE, October 2003.
[4] D.K.Smetters, R.E.Grinter, “Moving from the design of usable security technologies to the design of useful secure applications”, ACM New Security paradigms workshop Se ptember 2002 pp 82 – 89
[5] Durai Pandian M et.al., “Information Security Architecture – Context aware Access control model for Educational applications”, International Journal of Computer Science and Network Security, December 2006
[6] Ferda Tartanoglu et al, ”De pendability in the Web Services Architecture”, Architecting Dependable Systems, LNCS 2677, pp. 90 – 109, 2003
[7] Gunnar Peterson, “Security Architecture Blueprint”, Arctec Group, LLC, 2007
[8] Halvard Skogsrud,” Modeling Trust Negotiation for Web Services”, IEEE February 2009
[9] Heiko Tillwick, Martin S Olivier, “A Layered Security Architecture: Design Issues”, in Proceedings of the Fourth Annual Information Security South Africa Conference (ISSA 2004), July 2004.
[10] Jim Highsmith, Alistair Cockburn “Agile Software Deve lopment: The Business of Innovation”, IEEE Computer September’2001 pp: 120:122
[11] J.J.Whitmore,”A method for designing secure solutions”, IBM systems Journal, Vol 40 No 3 2001 pp. 747 - 768
[12] John Hunt, “Agile Software Construction”, Springer Verlag publishers 2 006
[13] Lorenzo D Martino, Elisa Bertino, “ Security for Web Services: Standards and Research Issues”, International Journal of Web Services Research, Oct - Dec 2009, pp. 48 - 74, Idea Group Publishing USA 2009
[14] Mark Harman, Afshin Mansouri,”Search based Software Engineering: Introduction to the special issue of the IEEE Transactions on Software Engineering”, November December 2010, pp. 737 – 741
[15] Martin Naedele, “Standards for XML and Web Services Security”, IEEE April 2003
[16] Massimo Barloletti, et. al.” Semantics - B ased Design for Secure Web Services”, IEEE Transactions on Software Engineering, Vol 34, No.1, January 2008
[17] Matt Bishop, “Computer Security: Art and Science”, Pearson Education, 2003
[18] NIST Draft, “ Guide to Secure Web Services”, September 2006
[19] Ross Anderson ,” Security Engineering: A guide to building Dependable Distributed Systems”, Wiley publishers, 2003.
[20] Satoshi Makino, Takeshi Imamura, Yuichi Nakamura. ”Implementation and Performance of WS - Security”, International Journal of Web Services Research, Jan - Mar ch 2004, pp. 58 - 72, Idea Group Publishing USA 2004
[21] Sasikanth Avancha, “A Framework for Trustworthy Service Oriented Computing”, ICISS 2008, pp. 124 – 132.
[22] Sandeep Chatterjee,” Developing Enterprises Web Services an Architects Guide”, Pearson, 2004
[23] Sarah Sp iekermann, Lorrie Cranor,”Engineering Privacy”, IEEE Transactions on Software Engineering”, Vol 35 No 1 January February 2009 pp. 67 – 82
[24] Spyros T Halkidis et. al., “Architecture Risk Analysis of Software Systems based on Security Patterns”, IEEE Transacti ons on Dependable and Secure Computing Vol 5 No. 3, July – September 2008, pp. 129 – 142
[25] Vipul Gupta, et. al., “Sizzle: A standards - based end - to - end security architecture for the embedded Internet”, Elsevier, Pervasive and Mobile Computing, 2005
[26] Wei She, e t. al. ,”Enhancing Security Modeling for Web Services using Delegation and Pass - on”, International Journal of Web Services Research, Jan - March 2010, pp. 1 - 21, Idea Group Publishing USA 2010
[27] Wembo Mao, “Modern Cryptography: Theory and Practice”, Pearson edu cation, 2004

Keywords—Web Services, Security Architectures, Agile Modeling, Dependability.