Research Article
Dependable Solutions Design by Agile Modeled Layered Security Architectures
@INPROCEEDINGS{10.1007/978-3-642-27299-8_53, author={M. Kumar and D. Kumar and B. Rani and K. Rao and A. Prasad and D. Shravani}, title={Dependable Solutions Design by Agile Modeled Layered Security Architectures}, proceedings={Advances in Computer Science and Information Technology. Networks and Communications. Second International Conference, CCSIT 2012, Bangalore, India, January 2-4, 2012. Proceedings, Part I}, proceedings_a={CCSIT PART I}, year={2012}, month={11}, keywords={Security Architectures Agile Modeling Layered Pattern Designing Solutions Dependable Privacy Requirements Web Services}, doi={10.1007/978-3-642-27299-8_53} }
- M. Kumar
D. Kumar
B. Rani
K. Rao
A. Prasad
D. Shravani
Year: 2012
Dependable Solutions Design by Agile Modeled Layered Security Architectures
CCSIT PART I
Springer
DOI: 10.1007/978-3-642-27299-8_53
Abstract
Our research entitled “Designing Dependable Agile Layered Security Architecture Solutions” addresses the innovative idea and novel implementations of Security Engineering for Software Engineering using Agile Modeled Layered Security Architectures for Dependable Privacy Requirements, with a validation of an exemplar case study of Web Services Security Architectures. Securing the Software Architecture in any application at design phase is known as Security Architectures, and we focus on authentication and authorization of the user. Now a day most of the applications are developed as a Layered Security Architecture Pattern, typically we have user presentation layer, Business Logic Layer and Database access layer. Now Agile modeling is used in all applications design (but Agile Modeled Architectures are given little importance) because of shortened developed time, with customer collaborations with developers and importantly with Test Driven Development approaches. Securing Agile Modeled architectures, which being an iterative development, will provide enhanced Dependable Security Requirements in terms of Privacy of user, in its successive iterations. All this research paves a way for Secure Web Engineering.