Dependable Privacy Management for Web Services extended to Cloud Big Data and IOT

International Journal of Geoinformatics and Geological Science
© 2016 by SSRG - IJGGS Journal
Volume 3 Issue 3
Year of Publication : 2016
Authors : Dr.D.Shravani
: 10.14445/23939206/IJGGS-V3I6P102
pdf
Citation:
MLA Style:

Dr.D.Shravani, "Dependable Privacy Management for Web Services extended to Cloud Big Data and IOT" SSRG International Journal of Geoinformatics and Geological Science 3.3 (2016): 18-27.

APA Style:

Dr.D.Shravani,(2016). Dependable Privacy Management for Web Services extended to Cloud Big Data and IOT. SSRG International Journal of Geoinformatics and Geological Science 3(3), 18-27.

Abstract:

This research paper deals with Dependable privacy management for Web Services Security Architecture Design extended to Cloud, Big Data and IOT.

References:

[1] Martin Naedele [2003], “Standards for XML and Web Services Security”, IEEE April 2003, pp. 6 – 14.
[2] Mark Harman, Afshin Mansouri [2010], “Search based Software Engineering Introduction to the special issue of the IEEE Transactions on Software Engineering”, November December 2010, pp. 737 – 741.
[3] Massimo Barloletti, Pierpaolo Degano, Gian Luigi Ferrari, Roberto Zunino [2008] , “Semantics-Based Design for Secure Web Services”, IEEE Transactions on Software Engineering, Vol 34, No.1, January 2008, pp. 33 – 49.
[4] Matt Bishop [2003], “Computer Security Art and Science”, Pearson education, pp. 56 – 97.
[5] Meiko Jenson, Nils Gruschke, Ralph Herkenhoner [2009], “A Survey on attack of Web Services Classification and Counter measures”, Journal Computer Science Research and Development Vol 24 No 4, November 2009, pp. 185 – 197.
[6] Michael S Kirkpatrick, Elisa Betrino [2010], “Enforcing Spatial Constraints for Mobile RBAC Systems”, ACM 2010 SACMAT10, June 9-11, 2010, Pittsburg, USA, 99. 1 –6.
[7] Michael Juntao Yuan, 2004, “Enterprise J2ME Developing Mobile Java Applications”, Pearson Education Inc., ISBN 81-297-0694-6, pp. 145 – 196.
[8] Michele Barletta, Alberto Calvi, Silvio Ranise, Luca Vigano, Luca Zanetti [2011], “Workflow and access control reloaded. A declarative specification framework for the automated analysis of web services” Scalable Computing Volume 12 Number 1 pp. 1-20.
[9] Mokbel M.S., Jiajin. L, [2005 – 2008] “Integrated Security Architecture for Web Services and this challenging”, Journal of Theoretical and Applied Information Technology JATIT, pp 518 – 525.
[10] Mouratidis and Giorgini [2007], “Security and Software Engineering: Advances and Future Vision.” Idea Group Publishing Inc., pp. 1 – 17.
[11] Mordinyi, R.Kuhn, E Schatten [2010], “Towards an Architectural Framework for Agile Software Development” in IEEE 17th International Conference and Workshop on Engineering of Computer Based Systems (ECBS), pp. 276-280.
[12] Munindar P.Singh, Michael N.Huhns [2005], “Service Oriented Computing, Semantics, Processes, Agents”, John Wiley & Sons, Ltd, pp. 45 – 97..
[13] Murat Gunestas, Dumminda Wijesekera [2009], “Forensics over Web Services: The FWS”, IGI Global, Information Science Reference, DOI:10.4018/978-1-60566-950- 2.ch005, 83 – 98.
[14] Nakamura Y, Tatsubori M, Imamura T, Ono K, SCC [2005] ,“Model driven Security based on a Web Services Security Architecture”, proceedings of the 2005 IEEE International Conferences on Services Computing, pp. 1 – 15.
[15] Nico Brehm, JorgeMarx Gomez [2009] , “Secure Service Rating in Federated Software Systems based on SOA”, IGI Global, Information Science Reference, DOI:10.4018/978- 1-60566-950-2.ch004, pp. 83 - 98. R. E. Sorace, V. S. Reinhardt, and S. A. Vaughn, “High-speed digital-to-RF converter,” U.S. Patent 5 668 842, Sept. 16, 1997.

Key Words:

 Security Engineering, Security Architectures, Web Services, Cloud Computing, Big Data, IOT.