Research Article | Open Access
Volume 3 | Issue 3 | Year 2016 | Article Id. IJMCA-V3I6P101 | DOI : https://doi.org/10.14445/23939141/IJMCA-V3I6P101Web 2.0 Mashup Spatial Web Service Architecture Agile Modeled Privacy Design – Case Study Evaluations and Validations extended to Cloud Big Data and IOT
Dr.D.Shravani
Citation :
Dr.D.Shravani, "Web 2.0 Mashup Spatial Web Service Architecture Agile Modeled Privacy Design – Case Study Evaluations and Validations extended to Cloud Big Data and IOT," International Journal of Mobile Computing and Application, vol. 3, no. 3, pp. 27-33, 2016. Crossref, https://doi.org/10.14445/23939141/IJMCA-V3I6P101
Abstract
This research paper deals with Web 2.0 Mashup Spatial Web Service Architecture Agile Modeled Privacy Design with case studies evaluations and validations extended to Cloud Big Data and IOT.
Keywords
Security Engineering, Security Architectures, Web Services, Cloud Computing, Big Data, IOT
References
[1] Nina Godbole [2009], “Information Systems: Security Management, Metrics, Frameworks and Best Practices”, Wiley India Publishers, Preface pp. 1 – 14.
[2] Nils Agne Narbotten [2009] , “XML and Web Services Security Standards”, IEEE Communications Survey and tutorials, Vol 11, No 3, Third Quarter, pp. 4 – 21
[3] Ozgur Erol et al, [2009], “A Framework for Enterprise Resilience using Service Oriented Architecture approach”, IEEE Sys Con 2009, 3 rd annual IEEE International Conference March 23 – 26.
[4] Patrick Stuedi, Iqbal Mohammed, Doug Terry, [2010], “Where Store: Location-based Data Storage for Mobile devices Interacting with the Cloud”, MCS 10, ,San Francisco USA, ACM 2010 , (Microsoft Research) , June 15, 2010 , pp. 1 – 10.
[5] Rafuel Accorsi, Claus Wonnemann: Indico. “Information flow analysis of Business Processes for confidentiality requirements”, pp. 1-16
[6] Reza B’Far [2005], “Mobile Computing Principals – Designing and Developing Mobile Applications with UML and XML”, Cambridge University Press, ISBN: 0-521-69623-2, pp. 146 – 198.
[7] Ross Anderson, 2003, “Security Engineering: A guide to building Dependable Distributed Systems”, Wiley publishers, pp. 1 – 19.
[8] Sami Baydeda, Matthias Book, Volker Gruhn (Eds.) [2005], “Model-Driven Software Development”, © Springer-Verlag Berlin Heidelberg, pp. 18-22.
[9] Sandeep Chatterjee [2004], “Developing Enterprises Web Services An Architects Guide”, Pearson, pp. 67 – 98.
[10] Sasikanth Avancha [2008], “A Framework for Trustworthy Service Oriented Computing”, ICISS 2008, pp. 124 – 132.
[11] Sarah Spiekermann, Lorrie Cranor [2009], “Engineering Privacy”, IEEE Transactions on Software Engineering”, Vol 35 No 1 January February 2009 pp. 67 – 82
[12] Satoshi Makino, Takeshi Imamura, Yuichi Nakamura [2004], “Implementation and Performance of WS-Security”, International Journal of Web Services Research, Jan-March 2004, Idea Group Publishing, pp. 58-72.
[13] Sebastian Hohn, Lutz Lowis, Rafael Accorsi, Albert- Ludwig [2009], “Identification of Vulnerability Effects in Web Services using Model-Based Security” IGI Global, Information Science Reference, DOI:10.4018/978-1-60566-950-2.ch001, pp. 1 – 32.
[14] Soumya Simanta, Ed Morris, Sriram Balasubramaniam, Jeff Davenport and Dennis B.Smith [2009], “Information Assurance Challenges and Strategies for Securing SOA Environments and Web Services”, IEEE SysCon 2009—3 rd Annual IEEE International Systems Conference, Vancouver, Canada, March 23 – 26, pp 1 – 4.
[15] Spyvain Halle, Roger Villemaire, Omar Cherkaoui [2009], “Specifying and Validating Data-Aware Temporal Web Services properties”, IEEE Transactions J. Breckling, Ed., The Analysis of Directional Time Series: Applications to Wind Speed and Direction, ser. Lecture Notes in Statistics. Berlin, Germany: Springer, 1989, vol. 61.