Review of Literature on Web Services Security Architecture extended to Cloud, Big Data and IOT
Citation
Dr.D.Shravani "Review of Literature on Web Services Security Architecture extended to Cloud, Big Data and IOT". International Journal of P2P Network Trends and Technology (IJPTT), V6(4):7-12 Jul - Aug 2016, ISSN:2249-2615, www.ijpttjournal.org, Published by Seventh Sense Research Group.
Abstract
This Literature Review paper consists of Web Services Security Architecture extended to Cloud, Big Data and IOT.
References
Christos Douligeris, George P.Ninios [2007], “Security in Web Services”, Network Security: Current Status and Future Directions, IEEE Inc. Book, pp. 179 – 204.
[1] Constance L Heitmeyer [2008], “Applying Formal Methods to a Certifiably Secure Software System”, IEEE Transactions on Software Engineering, January 2008, Vol 34 No1 1.
[2] Coppolino L, Romano L, Vianello V [2011],“Security Engineering of SOA applications via Reliability Patterns”, Journal of Software Engineering and Applications, pp. 1 – 8.
[3] David Geer, [2003], “Taking Steps to Secure Web Services”, IEEE, October 2003, pp. 1 – 4.
[4] Deepthi parachuri, Dr.Sudeep Mallick [2009], “Security Policies in Web Services”, IGI Global, Information Science Reference, DOI:10.4018/978-1-60566-950-2.ch007, pp. 134 – 151.
[5] Dimitris Gritzalis, Javier Lopez [2009],“Emerging Challenges for Security, Privacy and Trust”, 24th IFIP TC 11 proceedings Springer, pp. 1 – 4.
[6] Douglas Rodigues, Julio C Estrella, Kalinka R.L.J.C.Branco [2011] “Analysis of Security and Performance aspects in Service Oriented architectures” In International Journal of Security and its application, Vol 5 No 1 pp. 13-30
[7] Durai Pandian M et.al. [2006], “Information Security Architecture – Context aware Access control model for Educational applications”, International Journal of Computer Science and Network Security, December 2006, pp. 1 – 6.
[8] D.K.Smetters, R.E.Grinter [2002], “Moving from the design of usable security technologies to the design of useful secure applications”, ACM New Security paradigms workshop September 2002 pp 82 – 89.
[9] Eduardo B.Fernandez, Maria M. Larrondo-Petrie et.al. [2009], “Web Services Security: Standards and Industrial Practice”, IGI Global, Information Science Reference, DOI:10.4018/978-1-60566-950-2.ch008. pp. 152 - 186.
[10] Eduardo B.Fernandez, Nobukazu Yoshika, Hironori Washizaki, Jan Jurjens, Michael VanHilst, Guenther Pernul [2011], “Using Security Patterns to Develop Secure Systems”, DOI: 10.4018/978-1-61520-837-1.ch002, IGI Global, pp. 16 – 31.
[11] Elisa Bertino, Lorenzo D.Martino, Federica Paci, Anna Squicciarini [2010], “Security for Web Services and Service-Oriented Architectures”, Springer Book, Appendix A - Access Control, ISBN 978-3-540-87741-7, pp. 202-204.
[12] Erich Gamma [2009], “Design Patterns Elements of Reusable Object Oriented Software”, Addison Wesley Publishers, pp. 1 - 12.
[13] Ferda Tartanoglu, Valerie Issarny, Alexander Romanovsky, Nicole Levy [2003], “Dependability in the Web Services Architecture. Architecting Dependable Systems”, LNCS 2677, pp 90-109, 2003, Springer Verlag Heidelberg, pp. 202-204.
[14] Florian Kersch Baum, Philip Robinson [2008], “Security Architectures for Virtual Organizations of Business Web Services”, Journal of System Architecture, 11 September 2008, pp. 1 – 23.
Keywords
Security Engineering, Security Architectures, Web Services, Cloud Computing, Big Data, IOT.