Review of Literature on Web Services Security Architecture extended to Cloud, Big Data and IOT

  IJPTT-book-cover
 
International Journal of P2P Network Trends and Technology (IJPTT)          
 
© 2016 by IJPTT Journal
Volume - 6 Issue - 4
Year of Publication : 2016
Authors : Dr.D.Shravani
DOI :  10.14445/22492615/IJPTT-V27P403

Citation

Dr.D.Shravani "Review of Literature on Web Services Security Architecture extended to Cloud, Big Data and IOT". International Journal of P2P Network Trends and Technology (IJPTT), V6(4):7-12 Jul - Aug 2016, ISSN:2249-2615, www.ijpttjournal.org, Published by Seventh Sense Research Group.

Abstract

This Literature Review paper consists of Web Services Security Architecture extended to Cloud, Big Data and IOT.

References

Christos Douligeris, George P.Ninios [2007], “Security in Web Services”, Network Security: Current Status and Future Directions, IEEE Inc. Book, pp. 179 – 204.
[1] Constance L Heitmeyer [2008], “Applying Formal Methods to a Certifiably Secure Software System”, IEEE Transactions on Software Engineering, January 2008, Vol 34 No1 1.
[2] Coppolino L, Romano L, Vianello V [2011],“Security Engineering of SOA applications via Reliability Patterns”, Journal of Software Engineering and Applications, pp. 1 – 8.
[3] David Geer, [2003], “Taking Steps to Secure Web Services”, IEEE, October 2003, pp. 1 – 4.
[4] Deepthi parachuri, Dr.Sudeep Mallick [2009], “Security Policies in Web Services”, IGI Global, Information Science Reference, DOI:10.4018/978-1-60566-950-2.ch007, pp. 134 – 151.
[5] Dimitris Gritzalis, Javier Lopez [2009],“Emerging Challenges for Security, Privacy and Trust”, 24th IFIP TC 11 proceedings Springer, pp. 1 – 4.
[6] Douglas Rodigues, Julio C Estrella, Kalinka R.L.J.C.Branco [2011] “Analysis of Security and Performance aspects in Service Oriented architectures” In International Journal of Security and its application, Vol 5 No 1 pp. 13-30
[7] Durai Pandian M et.al. [2006], “Information Security Architecture – Context aware Access control model for Educational applications”, International Journal of Computer Science and Network Security, December 2006, pp. 1 – 6.
[8] D.K.Smetters, R.E.Grinter [2002], “Moving from the design of usable security technologies to the design of useful secure applications”, ACM New Security paradigms workshop September 2002 pp 82 – 89.
[9] Eduardo B.Fernandez, Maria M. Larrondo-Petrie et.al. [2009], “Web Services Security: Standards and Industrial Practice”, IGI Global, Information Science Reference, DOI:10.4018/978-1-60566-950-2.ch008. pp. 152 - 186.
[10] Eduardo B.Fernandez, Nobukazu Yoshika, Hironori Washizaki, Jan Jurjens, Michael VanHilst, Guenther Pernul [2011], “Using Security Patterns to Develop Secure Systems”, DOI: 10.4018/978-1-61520-837-1.ch002, IGI Global, pp. 16 – 31.
[11] Elisa Bertino, Lorenzo D.Martino, Federica Paci, Anna Squicciarini [2010], “Security for Web Services and Service-Oriented Architectures”, Springer Book, Appendix A - Access Control, ISBN 978-3-540-87741-7, pp. 202-204.
[12] Erich Gamma [2009], “Design Patterns Elements of Reusable Object Oriented Software”, Addison Wesley Publishers, pp. 1 - 12.
[13] Ferda Tartanoglu, Valerie Issarny, Alexander Romanovsky, Nicole Levy [2003], “Dependability in the Web Services Architecture. Architecting Dependable Systems”, LNCS 2677, pp 90-109, 2003, Springer Verlag Heidelberg, pp. 202-204.
[14] Florian Kersch Baum, Philip Robinson [2008], “Security Architectures for Virtual Organizations of Business Web Services”, Journal of System Architecture, 11 September 2008, pp. 1 – 23.

Keywords
Security Engineering, Security Architectures, Web Services, Cloud Computing, Big Data, IOT.