CFP last date
20 May 2024
Reseach Article

Performance Evaluation of Add-On Security Services Incorporated on Business Services

by Thirumaran. M, Dhavachelvan. P, Aishwarya. D, Shanmugapriya. R
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 64 - Number 18
Year of Publication: 2013
Authors: Thirumaran. M, Dhavachelvan. P, Aishwarya. D, Shanmugapriya. R
10.5120/10734-5577

Thirumaran. M, Dhavachelvan. P, Aishwarya. D, Shanmugapriya. R . Performance Evaluation of Add-On Security Services Incorporated on Business Services. International Journal of Computer Applications. 64, 18 ( February 2013), 22-31. DOI=10.5120/10734-5577

@article{ 10.5120/10734-5577,
author = { Thirumaran. M, Dhavachelvan. P, Aishwarya. D, Shanmugapriya. R },
title = { Performance Evaluation of Add-On Security Services Incorporated on Business Services },
journal = { International Journal of Computer Applications },
issue_date = { February 2013 },
volume = { 64 },
number = { 18 },
month = { February },
year = { 2013 },
issn = { 0975-8887 },
pages = { 22-31 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume64/number18/10734-5577/ },
doi = { 10.5120/10734-5577 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:16:47.445540+05:30
%A Thirumaran. M
%A Dhavachelvan. P
%A Aishwarya. D
%A Shanmugapriya. R
%T Performance Evaluation of Add-On Security Services Incorporated on Business Services
%J International Journal of Computer Applications
%@ 0975-8887
%V 64
%N 18
%P 22-31
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

As more and more services come under the purview of internet, online businesses have also made a flourishing start, so much so that a bulk of the business transactions have become web- based. Web services have found their way into sectors like banking, finance, construction, airlines, marketing, and telecommunication and so on. We propose to design an add-on security model which provides interoperable security for the business services. It will be flexible enough to adapt itself to the security requirements of a specific business. This add-on security service models will increase the security levels of the business services. The model designed is evaluated after integrating the add-on security services with the business services. The fundamental approach we follow, for creating our project is Model Driven Security Service Enforcement, SLA based Security Service Negotiation, Automatic Security Service Integration, Performance Evaluation, and Impact Analysis. This is a definite way to achieve better performance, consistency and cost effectiveness in business services by making it invulnerable to hacker attacks.

References
  1. Model-driven business process security requirement specification. Christian Wolter , Michael Menzel Andreas Schaad , Philip Miseldine , ChristophMeinel
  2. Expressive and Deployable Access Control in Open Web Service Applications. Claudio A. Ardagna, Sabrina De Capitani di Vimercati, Member, IEEE, Stefano Paraboschi , Eros Pedrini, Pierangela Samarati, Senior Member, IEEE, and Mario Verdicchio
  3. Christian Wolter, Michael Menzel, Andreas Schaad, Philip Miseldine and ChristophMeinel, "Model-driven Business Process Security Requirement Specification", (ELSEVIER) Journal of Systems Architecture 55, (2009) 211-223.
  4. ShaziaWasimSadiq, Guido Governatori, KioumarsNamiri," Modeling Control Objectives for Business Process Compliance", in BPM, 2007, pp. 149–164.
  5. Michiaki Tatsubori, Takeshi Imamura, Yuhichi Nakamura," Best-Practice Patterns and Tool Support for Con?guring Secure Web Services Messaging", in ICWS, IEEE Computer Society, 2004. pp. 244–251
  6. N. Nagaratnam, A. Nadalin, M. Hondo, M. McIntosh, P. Austel, "Business-driven Application Security: from Modeling to Managing Secure Applications", IBM Syst. J. 44 (4) (2005).
Index Terms

Computer Science
Information Sciences

Keywords

Web Services Security Negotiation SLA attacks Hacker Attacks