Model Driven Architecture based Agile Modelled Layered Security Architecture for Web Services Extended to Cloud, Big Data and IOT

International Journal of Computer & Organization Trends  (IJCOT)          
© 2016 by IJCOT Journal
Volume - 6 Issue - 4
Year of Publication : 2016
Authors :  Dr.D.Shravani
DOI : 10.14445/22492593/IJCOT-V35P304


Dr.D.Shravani " Model Driven Architecture based Agile Modelled Layered Security Architecture for Web Services Extended to Cloud, Big Data and IOT ", International Journal of Computer & organization Trends (IJCOT), V6(4):55-64 Jul - Aug 2016, ISSN:2249-2593, Published by Seventh Sense Research Group.

AbstractThis research paper consists of Model Driven Architecture based Agile Security Architecture for Web Services extended to Cloud, Big Data and IOT.


[1] Frank Innerhofer-Oberperfler, Markus Mitterer, et al [2009], “Security Analysis of Service Oriented Systems – A Methodical Approach and Case Study”, IGI Global, Information Science Reference, DOI:10.4018/978-1-60566-950-2.ch002, pp. 33 – 56.
[2] George Spanoudakis and Andrea Zisman [2010] ,“Discovering Services during Service-Based System Design Using UML”, IEEE Transactions on Software Engineering, Vol 36, No.3, May/June 2010, PP 371 – 389.
[3] Giorgia Lodi, Leonardo Querzoni, Roberto Beraldi, Roberto Baldoni [2008], “Combining Service-Oriented and Event-driven architectures for Designing Dependable systems”, pp. 1 – 13.
[4] Gunnar Peterson, LLC, 2007 “Security Architecture Blueprint”, Arctec Group, a White Paper, pp. 1 - 6.
[5] G.Rayana Gouds, M.Sriivasa Rao and Akhilesh Soni [2009], “Semantic Firewall: An approach towards Autonomous Web Security in Service Oriented Environments”, International Journal of Recent Trends in Engineering, Vol. 1, No. 1,ACEEE Academy Publishers pp. May 2009 454— 458.
[6] Halvard Skogsrud [2009], “Modeling Trust Negotiation for Web Services”, IEEE, February 2009, pp. 1 – 6.
[7] Heiko Tillwick and Martin S Olivier [2004], “A Layered Security Architecture: Design Issues”, in Proceedings of the Fourth Annual Information Security South Africa Conference (ISSA2004) July 2004, pp. 1 – 4.
[8] Hiren Bhatt, Arup Dasgupta [2011],“The Disruptive Cloud”, Geo Spatial World, May 2011 pp. 20 – 28.
[9] Hohn S, Lowis L, Jurjens J, Accorsi R,, [2009], “Identification of vulnerabilities in Web Services using Model-based architecture”, IGI Global publishers, 2009, pp. 1 -32.
[10] Hossein Keramati, Seyed-Hassan Mirian-Hosseinabadi [2008], “Integrating software development security activities with agile methodologies," aiccsa, IEEE/ACS International Conference on Computer Systems and Applications pp.749-754.
[11] I. Lazar, B. Parv, S. Motogna, I.-G. Czibula, C.-L. Lazar [2007], “An Agile MDA approach for Executable UML Structured Activities”, Studia Univ. Babes-bolyai, Informatics, vol. LII, No. 2, , pp.111-114.
[12] Jameela Al-Jaroodi, Alyaziyah Al-dhaheri [2011) “Security issues of Service-oriented middleware”, In International Journal of Computer Science and Network Security Vol 2 No 1, pp. 153 – 160.
[13] James S.Tiller [2011], “Adaptive Security management Architecture”, Auerbach Publications, pp. 1 – 14.
[14] Jeremy Epstein, Scott Matsumotto and Gary McGraw [2006], “Software Security and SOA: Danger, Will Robinson”, IEEE Security and Privacy, January/February 2006, pp. 80–83.

Security Engineering, Security Architectures, Web Services, Cloud Computing, Big Data, IOT.