CFP last date
22 April 2024
Reseach Article

Mining for Secure Web based Business Intelligence Applications

Published on November 2011 by A.V.Krishna Prasad, Dr.S.Ramakrishna, Dr.P.Suresh Varma, D.Shravani
International Conference on Web Services Computing
Foundation of Computer Science USA
ICWSC - Number 1
November 2011
Authors: A.V.Krishna Prasad, Dr.S.Ramakrishna, Dr.P.Suresh Varma, D.Shravani
30ce925f-e75b-422c-9ba2-6eea0ef0d551

A.V.Krishna Prasad, Dr.S.Ramakrishna, Dr.P.Suresh Varma, D.Shravani . Mining for Secure Web based Business Intelligence Applications. International Conference on Web Services Computing. ICWSC, 1 (November 2011), 60-66.

@article{
author = { A.V.Krishna Prasad, Dr.S.Ramakrishna, Dr.P.Suresh Varma, D.Shravani },
title = { Mining for Secure Web based Business Intelligence Applications },
journal = { International Conference on Web Services Computing },
issue_date = { November 2011 },
volume = { ICWSC },
number = { 1 },
month = { November },
year = { 2011 },
issn = 0975-8887,
pages = { 60-66 },
numpages = 7,
url = { /proceedings/icwsc/number1/3979-wsc012/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 International Conference on Web Services Computing
%A A.V.Krishna Prasad
%A Dr.S.Ramakrishna
%A Dr.P.Suresh Varma
%A D.Shravani
%T Mining for Secure Web based Business Intelligence Applications
%J International Conference on Web Services Computing
%@ 0975-8887
%V ICWSC
%N 1
%P 60-66
%D 2011
%I International Journal of Computer Applications
Abstract

Web Based Business Intelligence applications uses integrated and intensified technologies like Web 2.0 architectures, Agile Modeling, and Service-orientation (or Web Services). Applying Mining strategies to Web based Business Intelligence application will eventually provide benefits to Business Intelligence users, Decision makers, and importantly Web application architects. In this paper, we discuss about Mining for Web based Business Intelligence Applications. We validate our approach with a suitable exemplar CRM Application. This research entitled “Designing Dependable Web Services Security Architecture Solutions” addresses the innovative idea of Web Services Security Engineering using Web Services Security Architectures with a research motivation of Secure Service Oriented Analysis and Design. It deals with Web Services Security Architectures for Composition and Contract design in general, and Authentication and authorization (access control) in particular, using Agile Modeled Layered Security Architecture design, which eventually results in enhanced dependable privacy requirements, Secure Policies and Trust negotiations. All the above findings are validated with appropriate case studies of Web 2.0 Services, BPEL for Role Based Access Control, a secure stock market financial application, and their extension for spatial mobile application for cloud etc. All this research paves a way to Secure Web Engineering (or) Secure Web Science.

References
  1. Athula Ginge and San Murugesan, “Web Engineering: A Methodology for Developing Scalable, Maintainable Web Applications”, Cutter IT Journal Vol.14, No.7 pp. 24-35, July 2001
  2. Cenzic Inc., “Web Application Security Trend Reports”, 2009.
  3. David Geer, “Taking Steps to Secure Web Services”, IEEE, October 2003.
  4. D.K.Smetters, R.E.Grinter, “Moving from the design of usable security technologies to the design of useful secure applications”, ACM New Security paradigms workshop September 2002 pp 82 – 89
  5. Durai Pandian M et.al., “Information Security Architecture – Context aware Access control model for Educational applications”, International Journal of Computer Science and Network Security, December 2006
  6. Ferda Tartanoglu et al, ”Dependability in the Web Services Architecture”, Architecting Dependable Systems, LNCS 2677, pp. 90 – 109, 2003
  7. Gunnar Peterson, “Security Architecture Blueprint”, Arctec Group, LLC, 2007
  8. Halvard Skogsrud,” Modeling Trust Negotiation for Web Services”, IEEE February 2009
  9. Heiko Tillwick, Martin S Olivier, “A Layered Security Architecture: Design Issues”, in Proceedings of the Fourth Annual Information Security South Africa Conference (ISSA 2004), July 2004.
  10. Jim Highsmith, Alistair Cockburn “Agile Software Development: The Business of Innovation”, IEEE Computer September’2001 pp: 120:122
  11. J.J.Whitmore,”A method for designing secure solutions”, IBM systems Journal, Vol 40 No 3 2001 pp. 747-768
  12. John Hunt, “Agile Software Construction”, Springer Verlag publishers 2006
  13. Lorenzo D Martino, Elisa Bertino, “ Security for Web Services: Standards and Research Issues”, International Journal of Web Services Research, Oct-Dec 2009, pp. 48-74, Idea Group Publishing USA 2009
  14. Mark Harman, Afshin Mansouri,”Search based Software Engineering: Introduction to the special issue of the IEEE Transactions on Software Engineering”, November December 2010, pp. 737 – 741
  15. Martin Naedele, “Standards for XML and Web Services Security”, IEEE April 2003
  16. Massimo Barloletti, et. al.” Semantics-Based Design for Secure Web Services”, IEEE Transactions on Software Engineering, Vol 34, No.1, January 2008
  17. Matt Bishop, “Computer Security: Art and Science”, Pearson Education, 2003
  18. NIST Draft, “ Guide to Secure Web Services”, September 2006
  19. Ross Anderson,” Security Engineering: A guide to building Dependable Distributed Systems”, Wiley publishers, 2003.
  20. Satoshi Makino, Takeshi Imamura, Yuichi Nakamura. ”Implementation and Performance of WS-Security”, International Journal of Web Services Research, Jan-March 2004, pp. 58-72, Idea Group Publishing USA 2004
  21. Sasikanth Avancha, “A Framework for Trustworthy Service Oriented Computing”, ICISS 2008, pp. 124 – 132.
  22. Sandeep Chatterjee,” Developing Enterprises Web Services an Architects Guide”, Pearson, 2004
  23. Sarah Spiekermann, Lorrie Cranor,”Engineering Privacy”, IEEE Transactions on Software Engineering”, Vol 35 No 1 January February 2009 pp. 67 – 82
  24. Spyros T Halkidis et. al., “Architecture Risk Analysis of Software Systems based on Security Patterns”, IEEE Transactions on Dependable and Secure Computing Vol 5 No. 3, July – September 2008, pp. 129 – 142
  25. Vipul Gupta, et. al., “Sizzle: A standards-based end-to-end security architecture for the embedded Internet”, Elsevier, Pervasive and Mobile Computing, 2005
  26. Wei She, et. al. ,”Enhancing Security Modeling for Web Services using Delegation and Pass-on”, International Journal of Web Services Research, Jan-March 2010, pp. 1-21, Idea Group Publishing USA 2010
  27. Wembo Mao, “Modern Cryptography: Theory and Practice”, Pearson education, 2004.
Index Terms

Computer Science
Information Sciences

Keywords

Web Services Security Architectures Dependability