Research Article | Open Access
Volume 1 | Issue 1 | Year 2014 | Article Id. IJMCA-V1I1P106 | DOI : https://doi.org/10.14445/23939141/IJMCA-V1I1P106

Literature Survey on Agile Security Architecture Model


M.Upendra Kumar

Citation :

M.Upendra Kumar, "Literature Survey on Agile Security Architecture Model," International Journal of Mobile Computing and Application, vol. 1, no. 1, pp. 20-24, 2014. Crossref, https://doi.org/10.14445/23939141/IJMCA-V1I1P106

Abstract

In this paper a detailed literature survey on significant topics of Agile Security Engineering are provided to find out the problem statement and find out basis of research.

Keywords

Literature Survey, Agile Modelling, Security Architecture.

References

[1] Siv Hilde Houmb, Shareeful Islam, Eric Knauss, Jan Jurjens, Kurt Schneider,” Eliciting Security Requirements and Tracing them to Design: An Integrating of Common Criteria, Heuristics, and UMLsec”, 2009, PP. 1-6. 
[2] Joao Antunes, Nuno Neves, Miguel Correla, Paulo Verissimo, Rui Neves, ”Vulnerability Discovery with Attack Injection”, IEEE Transactions on Software Engineering, Vol. 36, No. 3, May/June 2010, PP. 357-369.
[3] Michaela bunke and Karsten Sohr, “An Architecture Centric approach to Detecting Security Patterns in Software”, Springer, ESSoS LNCS 6542, 2011, PP. 156 – 166.
[4] Santiago Moral-Garcia, Roberto Ortiz, Santiago Moral Rubil, Javier Garzia, “A new pattern template to support the design of security architectures: A case study”, International Journal on Advances in security, Vol 4 no 3&4, year 2011, PP. 173 - 184.
[5] Shahram Jalaliniya, Farzaneh Fakhredin, “Enterprise Architecture and Security Architecture Development”, Master Thesis, Department of Informatics, Lund University, June 2011, PP.1 -95.
[6] Heiko Tillwick, Martin S Olivier, “A Layered Security Architecture: Design Issues”, in Proceedings of the Fourth Annual Information Security South Africa Conference (ISSA 2004), July 2004, PP. 1 -6.
[7] Vibhu Saujanya Sharma, Pankaj Jalote, Kishor S.Trivedi,”Evaluating Performance Attributes of Layered Software Architecture”, CBSE 2005 LNCS 3489 PP. 66-81.
[8] Yann-Gael Gueheneuc, Giuliano Antoniol, “DeMIMA: A Multilayered Approach for Design Pattern Identification”, September October 2008, IEEE Transactions on Software Engineering, vol. 34, no. 5, PP.667-684.
[9] George Farah,” Information Systems Security Architecture: A Novel Approach to Layered Protection”, SANS Institute, September 2009, PP. 15-16. 
[10] Marshall Abrams and David Bailey, “Abstraction and Refinement of Layered Security Policy”, Information Security, PP. 126-135.