Literature Survey on Agile Security Architecture Model

International Journal of Mobile Computing and Application
© 2014 by SSRG - IJMCA Journal
Volume 1 Issue 1
Year of Publication : 2014
Authors : M.Upendra Kumar
pdf
How to Cite?

M.Upendra Kumar, "Literature Survey on Agile Security Architecture Model," SSRG International Journal of Mobile Computing and Application, vol. 1,  no. 1, pp. 20-24, 2014. Crossref, https://doi.org/10.14445/23939141/IJMCA-V1I1P106

Abstract:

In this paper a detailed literature survey on significant topics of Agile Security Engineering are provided to find out the problem statement and find out basis of research.

Keywords:

Literature Survey, Agile Modelling, Security Architecture.

References:

[1] Siv Hilde Houmb, Shareeful Islam, Eric Knauss, Jan Jurjens, Kurt Schneider,” Eliciting Security Requirements and Tracing them to Design: An Integrating of Common Criteria, Heuristics, and UMLsec”, 2009, PP. 1-6. 
[2] Joao Antunes, Nuno Neves, Miguel Correla, Paulo Verissimo, Rui Neves, ”Vulnerability Discovery with Attack Injection”, IEEE Transactions on Software Engineering, Vol. 36, No. 3, May/June 2010, PP. 357-369.
[3] Michaela bunke and Karsten Sohr, “An Architecture Centric approach to Detecting Security Patterns in Software”, Springer, ESSoS LNCS 6542, 2011, PP. 156 – 166.
[4] Santiago Moral-Garcia, Roberto Ortiz, Santiago Moral Rubil, Javier Garzia, “A new pattern template to support the design of security architectures: A case study”, International Journal on Advances in security, Vol 4 no 3&4, year 2011, PP. 173 - 184.
[5] Shahram Jalaliniya, Farzaneh Fakhredin, “Enterprise Architecture and Security Architecture Development”, Master Thesis, Department of Informatics, Lund University, June 2011, PP.1 -95.
[6] Heiko Tillwick, Martin S Olivier, “A Layered Security Architecture: Design Issues”, in Proceedings of the Fourth Annual Information Security South Africa Conference (ISSA 2004), July 2004, PP. 1 -6.
[7] Vibhu Saujanya Sharma, Pankaj Jalote, Kishor S.Trivedi,”Evaluating Performance Attributes of Layered Software Architecture”, CBSE 2005 LNCS 3489 PP. 66-81.
[8] Yann-Gael Gueheneuc, Giuliano Antoniol, “DeMIMA: A Multilayered Approach for Design Pattern Identification”, September October 2008, IEEE Transactions on Software Engineering, vol. 34, no. 5, PP.667-684.
[9] George Farah,” Information Systems Security Architecture: A Novel Approach to Layered Protection”, SANS Institute, September 2009, PP. 15-16. 
[10] Marshall Abrams and David Bailey, “Abstraction and Refinement of Layered Security Policy”, Information Security, PP. 126-135.